CCNA semester 3 final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?

#page100

Which number represents the most severe level of syslog logging?

0

Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?

209.165.200.225

Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?

65

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is removed from the running configuration.

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

Ask the user to issue the ipconfig command.

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?

Change the IP address on S0/0 of router R2 to 192.168.20.2.

Which two statements describe remote access VPNs?

Client software is usually required to be able to access the network. Remote access VPNs support the needs of telecommuters and mobile users.

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

Which three statements are generally considered to be best practices in the placement of ACLs?

Filter unwanted traffic before it travels onto a low-bandwidth link. Place standard ACLs close to the destination IP address of the traffic. Place extended ACLs close to the source IP address of the traffic.

Which statement describes a feature of site-to-site VPNs?

Internal hosts send normal, unencapsulated packets.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

What is a feature of an IPS?

It can stop malicious packets.

Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?

LLQ

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions?

Layer 2 Layer 3

Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer?

R1 Gi0/1.12 outbound

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?

R2# show ip nat statistics

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?

Router R4 will become the DR and router R1 will become the BDR.

What defines a two-tier spine-leaf topology

The Cisco APICs and all other devices in the network physically attach to leaf switches.

A network technician has used the access-list 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255

A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255

Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?

The sequence of the ACEs is incorrect.

Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?

The serial interfaces are not in the same area.

What is the function of ASICs in a multilayer switch?

They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

Traffic Marking

Which SNMP message type informs the network management system (NMS) immediately of certain specified events

Trap

Which SNMP message type informs the network management system (NMS) immediately of certain specified events?

Trap

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

YAML

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server.Which extended ACL would be used to filter this traffic, and how would this ACL be applied?

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any R1(config)# interface gi0/0R1(config-if)# ip access-group 105 out

Which two types of devices are specific to WAN environments and are not found on a LAN?

broadband modem CSU/DSU​

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

building the topology table

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

Which two types of VPNs are examples of enterprise-managed remote access VPNs?

clientless SSL VPN client-based IPsec VPN

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy startup-config tftp

Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?

database description

When JSON data format is being used, what characters are used to hold objects?

double braces { }

When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?

every 30 minutes

Which two methods help to prevent the disruption of network services?

installing duplicate equipment to provide failover services using redundant connections to provide alternate physical paths

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

protocol analyzer

What is a characteristic of the distribution layer in the three layer hierarchical model?

provides access to the rest of the network through switching, routing, and network access policies

Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?

show ip ospf interface serial 0/0/0

Which type of NAT maps a single inside local address to a single inside global address?

static

What is the port density of a switch?

the number of available ports on a switch

Why would a network administrator use the config-register 0x2102 command on a Cisco network device?

to ensure that the device loads the startup configuration file during startup

What are the two purposes of an OSPF router ID?

to facilitate router participation in the election of the designated router to uniquely identify the router within the OSPF domain

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

What are the two purposes of an OSPF router ID? (Choose two.)

to uniquely identify the router within the OSPF domain to facilitate router participation in the election of the designated router

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

type 2

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus


संबंधित स्टडी सेट्स

EXIT HESI Comprehensive B Evolve Practice Questions

View Set

Pediatric Hematological immunological and neoplastic disorders

View Set