CIT203 Study ENSA Practice

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?

#page100

Which two statements are characteristics of a virus? (Choose two.)

*A virus typically requires end-user activation. *A virus can be dormant and then activate at a specific time or date.

Which two scenarios are examples of remote access VPNs? (Choose two.)

*An employee who is working from home uses VPN client software on a laptop in order to connect to the company network. *A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

Which two statements describe remote access VPNs? (Choose two.)

*Client software is usually required to be able to access the network. *Remote access VPNs support the needs of telecommuters and mobile users.

What are two syntax rules for writing a JSON array? (Choose two.)

*Each value in the array is separated by a comma. *Values are enclosed in square brackets.

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

*Filter unwanted traffic before it travels onto a low-bandwidth link. *Place standard ACLs close to the destination IP address of the traffic. *Place extended ACLs close to the source IP address of the traffic.

In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

*It can be viewed by using the show ip ospf database command *All routers within an area have an identical link-state database.

What are three benefits of cloud computing? (Choose three.)

*It streamlines the IT operations of an organization by subscribing only to needed services. *It eliminates or reduces the need for onsite IT equipment, maintenance, and management. *It enables access to organizational data anywhere and at any time.

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)

*Router(config)# access-list 95 permit any *Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255

Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)

*amount of traffic *security needs *type of traffic

Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)

*broadband modem *CSU/DSU

Which two methods help to prevent the disruption of network services? (Choose two.)

*installing duplicate equipment to provide failover services *using redundant connections to provide alternate physical paths

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

*interface identifier *connection type

What are three advantages of using private IP addresses and NAT? (Choose three.)

*permits LAN expansion without additional public IP addresses *conserves registered public IP addresses *hides private LAN addressing from outside devices that are connected to the Internet

A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)

*show ip ospf interface *show ip ospf neighbor

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

*the startup configuration file *the configuration register value

What are the two purposes of an OSPF router ID? (Choose two.)

*to uniquely identify the router within the OSPF domain *to facilitate router participation in the election of the designated router

Which number represents the most severe level of syslog logging?

0

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.16.91.0 255.255.255.192. What wildcard mask would the administrator use in the OSPF network statement?

0.0.0.63

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

A network administrator modified an OSPF-enabled router to have a hello timer setting of 20 seconds. What is the new dead interval time setting by default?

80 seconds

What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

What is a characteristic of a single-area OSPF network?

All routers are in the backbone area.

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

Ask the user to issue the ipconfig command.

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

DHCP spoofing

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

DSL

Delete

Delete

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

Ethernet WAN leased line

Which queuing mechanism has no provision for prioritizing or buffering but simply forwards packets in the order they arrive?

FIFO

Exchange state

Fifth state

Down state

First state

Exstart state

Fourth state

What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?

Full

Read

Get

Which statement accurately describes a characteristic of IPsec?

IPsec is a framework of open standards that relies on existing algorithms.

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

IPsec virtual tunnel interface

Which statement describes a feature of site-to-site VPNs?

Internal hosts send normal, unencapsulated packets.

What functionality does mGRE provide to the DMVPN technology?

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

What is a feature of an IPS?

It can stop malicious packets.

What is a purpose of establishing a network baseline?

It creates a point of reference for future network evaluations.

What is correct in relation to NAT for IPv6?

It is a temporary mechanism to assist in the migration from IPv4 to IPv6.

What is the main function of a hypervisor?

It is used to create and manage multiple VM instances on a host machine.

Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?

LLQ

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

Layer 2 Layer 3

A network administrator is troubleshooting an OSPF problem that involves neighbor adjacency. What should the administrator do?

Make sure that the hello and dead interval timers are the same on all routers.

What is a characteristic of a Trojan horse as it relates to network security?

Malware is contained in a seemingly legitimate executable program.

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Narrow the scope

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

New Cisco Catalyst 2960-C switches support PoE pass-through.

Create

Post

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?

R2# show ip nat statistics

What protocol allows the manager to poll agents to access information from the agent MIB?

SNMP

Init state

Second state

Full state

Seventh state

What defines a two-tier spine-leaf topology?

The Cisco APICs and all other devices in the network physically attach to leaf switches.

A network technician has used the access-list 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255

Which statement describes a characteristic of standard IPv4 ACLs?

They filter traffic based on source IP addresses only

What is the function of ASICs in a multilayer switch?

They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.

Two way state

Third state

Which SNMP message type informs the network management system (NMS) immediately of certain specified events?

Trap

Put/Patch

Update

Which statement describes a VPN?

VPNs use virtual connections to create a private network through a public network.

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

Voice and video communications are more sensitive to latency

Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?

a less-structured approach based on an educated guess

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

building the topology table

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

What type of network uses one common infrastructure to carry voice, data, and video signals?

converged

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy startup-config tftp

Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?

database description

When JSON data format is being used, what characters are used to hold objects?

double braces { }

When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?

every 30 minutes

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

hello

What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?

ip nat inside source list 14 pool POOL-STAT overload

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

jitter delay

Which technology provides laptops the ability to function on a cellular network?

mobile hotspot

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

private

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

protocol analyzer

What is a characteristic of the distribution layer in the three layer hierarchical model?

provides access to the rest of the network through switching, routing, and network access policies

Which QoS technique retains excess packets in a separate queue for later transmission?

shaping

What command would be used as part of configuring NAT or PAT to display all static translations that have been configured?

show ip nat translations

Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?

show ip ospf interface serial 0/0/0

Loading state

sixth state

Which type of NAT maps a single inside local address to a single inside global address?

static

What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?

the ARP table

What is the port density of a switch?

the number of available ports on a switch

Why would a network administrator use the config-register 0x2102 command on a Cisco network device?

to ensure that the device loads the startup configuration file during startup

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

traffic marking

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

type 2

What type of traffic is described as requiring at least 384 Kbps of bandwidth?

video

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

virtualization

ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?

virtualization

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus

What type of traffic is described as predictable and smooth?

voice

When will an OSPF-enabled router transition from the Down state to the Init state?

when the router receives a hello packet from a neighbor router


Set pelajaran terkait

MIS 301 Chapter 11 Customer Relationship Management

View Set

Cellular Respiration Chapter 7 Part 2

View Set

Part 2: The Strange Case of Dr. Jekyll and Mr. Hyde: Plot Development and Conflict Assignment

View Set

female reproductive system - sherpath

View Set

BIO 204 Lab 18 - Litmus Milk Reactions

View Set

AZ-900 Microsoft Azure Fundamentals Dumps Online is valid for passing | DumpsBase

View Set