Practice Exam Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?

#page100

What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

First OSPF state

Down

Fifth OSPF state

Exchange

Which statement describes a feature of site-to-site VPNs?

Internal hosts send normal, unencapsulated packets.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

Sixth OSPF state

Loading

What is the function of ASICs in a multilayer switch?

They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.

Third OSPF state

Two-way

Which two methods help to prevent the disruption of network services? (Choose two.)

installing duplicate equipment to provide failover services using redundant connections to provide alternate physical paths

Which type of NAT maps a single inside local address to a single inside global address?

static

What is the port density of a switch?

the number of available ports on a switch

Which number represents the most severe level of syslog logging?

0

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

Second OSPF state

Init

What is a feature of an IPS?

It can stop malicious packets.

A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255

Which SNMP message type informs the network management system (NMS) immediately of certain specified events?

Trap

Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)

broadband modem CSU/DSU​

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

building the topology table

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy startup-config tftp

Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?

database description

Which technology provides laptops the ability to function on a cellular network?

mobile hotspot

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

protocol analyzer

What is a characteristic of the distribution layer in the three layer hierarchical model?

provides access to the rest of the network through switching, routing, and network access policies

Which QoS technique retains excess packets in a separate queue for later transmission?

shaping

Why would a network administrator use the config-register 0x2102 command on a Cisco network device?

to ensure that the device loads the startup configuration file during startup

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

Fourth OSPF state

Exstart

Seventh OSPF state

Full

What defines a two-tier spine-leaf topology?

The Cisco APICs and all other devices in the network physically attach to leaf switches.

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

Ask the user to issue the ipconfig command.

Which two statements describe remote access VPNs? (Choose two.)

Client software is usually required to be able to access the network. Remote access VPNs support the needs of telecommuters and mobile users.

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-bandwidth link. Place extended ACLs close to the source IP address of the traffic. Place standard ACLs close to the destination IP address of the traffic.

What is correct in relation to NAT for IPv6?

It is a temporary mechanism to assist in the migration from IPv4 to IPv6.

Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?

LLQ

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

Layer 2 Layer 3

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?

R2# show ip nat statistics

When JSON data format is being used, what characters are used to hold objects?

double braces { }

When an OSPF network is converged and no network topology change has been detected by a router, How often will LSU packets be sent to neighboring routers?

every 30 mins

Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?

show ip ospf interface serial 0/0/0

What are the two purposes of an OSPF router ID? (Choose two.)

to uniquely identify the router within the OSPF domain to facilitate router participation in the election of the designated router

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

traffic marking

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

type 2

Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)

type of traffic amount of traffic security needs

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus


Set pelajaran terkait

Liberty University Integration Exam

View Set

Exam FX: Taxes, Retirement, and other Insurance Concepts

View Set

Psych Testing and Measure Chapter 8

View Set