Networking II - NET133_301

Ace your homework & exams now with Quizwiz!

In addition to AH, IPsec is composed of which other service?

Encapsulating Security Payload (ESP)

13.6.6

13.6.6

13.7.4

13.7.4

13.8.5

13.8.5

13.9.6

13.9.6

A configured threshold has been exceeded by a network host that is being monitored by an SNMP agent. The agent sends a trap to its SNMP manager with a notification that the threshold has been exceeded. Which IP port does the agent use to send the trap?

162

Consider the output from the show ip cache flow command shown. Which statements are true regarding the flow represented in the statistics? (Select two.)

255 packets were monitored. Most of the packets monitored were 1536 bytes in size.

During a heavy network traffic period, the maximum traffic rate is exceeded. To handle this, QoS drops all incoming traffic.Which QoS method is being used?

Policing

Consider the following log message generated by a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?

%LINEPROTO

Data on the network is being processed as it comes in. Which QoS method is being used?

Best Effort

Consider the following log message generated by a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What is the severity level of this message?

-5-

How many packets per minutes are required to keep two machines synchronized to an accuracy of a millisecond of each other?

1

Many queue schedulers are able to identify a low-latency queue. What do queue schedulers do when processing low-latency queues?

Before the scheduler moves on to other queues, the low-latency queue must first be cleared.

Which of the following cannot be analyzed using the data collected by NetFlow?

CPU usage

The following image shows a standard Object Identifier Tree structure. Based on this structure, what would the OID be for a Microsoft device?

1.3.6.1.4.1.311

13.10.5

13.10.5

13.2.4

13.2.4

13.3.4

13.3.4

13.4.4

13.4.4

13.5.3

13.5.3

What is true regarding the following partial output in the running configuration file? (Select two.) Router#show run !interface fa 0/0 ip address 10.2.30.2 255.255.255.224 ! <output omitted> ! logging on logging host 10.2.30.253 logging trap 4 logging source-interface fa 0/0 !

A syslog server will receive warning messages sent from 10.2.30.2. A syslog server will receive error messages sent from 10.2.30.2.

Which of the following best describes the various HSRP group roles? (Select two.)

An active router forwards traffic destined to the virtual IP address. A standby router will become the active router should the existing active router fail.

Your router generates a log message with a severity level of 6. What does this indicate?

An informational message only.

Which of the following are configuration management tools? (Select two.)

Ansible SaltStack

You need to set the time zone for Pacific Daylight Time. Which two of the following commands will allow you to do this?

Clock timezone PST Clock timezone -8

Which of the following are benefits a VPN provides? (Select two.)

Cost savings Compatibility

A user is playing an online game. When they press a key to perform an action, it takes at least one second for the action to be performed on screen. Which QoS metric is having issues?

Delay

Cloud resources are implemented in several ways. Match the cloud implementations listed on the left with the appropriate descriptions on the right. (Each implementation type may be used once, more than once, or not at all.)

Designed to be shared by several organizations. Community cloud Examples: Gmail and Google Docs. Public cloud Provides resources to a single organization. Private cloud Accessible to everyone. Public cloud Accessible only by users within the single organization. Private cloud

Drag each network plane on the left to the appropriate troubleshooting task on the right. Each plane may be used once, more than one, or not at all.

Determine how traffic moves from one place to another. Control plane Determine whether VLANs are configured on each switch. Data plane Examine the forwarding logic on each device. Data plane Use SNMP to monitor network switches. Management plane Isolate filtering and port security problems. Data plane

IPSec uses which method for key exchange?

Diffie-Hellman

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

ESP AH

Which of the following troubleshooting methods is based on the troubleshooting experience and the ability of the technician?

Educated Guess

Which IPsec subprotocol provides data encryption?

Encapsulating Security Payload (ESP)

You have a small network as shown. You are troubleshooting connectivity issues at Wrk1. From Wrk1, you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office, but you cannot ping any host in the main office. What is the most likely cause of the problem? (Select two.)

Fa0/24 on the switch is bad. Bad cable between the switch and the SFO router.

Which of the following gateway redundancy protocols are Cisco proprietary? (Select two.)

GLBP HSRP

You are providing a VPN solution for employees who work remotely. When these employees change locations, they lose their VPN connection, so you want them to automatically reconnect if the VPN connection is lost or disconnected. Which VPN security protocol supports VPN reconnect functionality?

IKEv2

In which of the following scenarios would a router send a resign message?

If a preempted active router fails, the standby router becomes the active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message.

How does standby preemption affect the router configured with the highest priority in the HSRP group? (Select two.)

If the active router fails and then regains service, it does not become the active router again when preemption is not enabled. If the active router fails and then regains service, it becomes the active router again if preemption is enabled.

Your router generates a log message with a severity level of 1. What does this indicate?

Immediate action is needed.

Quality of Service (QoS) prioritizes traffic from different data streams by using two classification systems. Match the name of the QoS classification system on the left with the appropriate descriptions on the right. (Each classification system may be used once, more than once, or not at all.)

Individual frames are marked and classified at Layer 2. Class of Service (COS) Classification occurs at Layer 3 Differentiated Services Code Point (DSCP) Precedence values are inserted in the DiffServ field of an IP packet. Differentiated Services Code Point (DSCP) A priority value between 0 and 7 is assigned to a 3-bit field. Class of Service (COS) Up to 64 different classifications are possible. Differentiated Services Code Point (DSCP)

You have implemented a QoS model where each application must request network resources. The router will approve or deny the request based on available resources. Which QoS model is being used?

Integrated Services

Which of the following are common network traffic types that QoS is used to manage? (Select two.)

Interactive applications Streaming video

What are the main types of cloud services? (Select two.)

Internal cloud services External cloud services

In reference to cloud computing, what does the term cloud mean?

It is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network.

Queue schedulers are used for congestion management and define how a device will work through its queue. Match the names of the most commonly used queue schedulers on the left with the appropriate description on the right. (Each name can only be used once.)

Labels one queue as priority. Rotates through the queues and sends out multiple packets from the priority queue. WEIGHTED ROUND ROBIN Rotates through each queue and processes and sends the next available packet. ROUND ROBIN Assigns each queue a minimum bandwidth percentage. CLASS-BASED WEIGHTED FAIR QUEUING

Which of the following statements are true regarding NTP when implemented on Cisco devices? (Select two.)

NTP runs over UDP port 123. When NTP is enabled, NTP packets are received on all interfaces.

The storage area where NetFlow data is stored on a device is known as what?

NetFlow Ccche

Which device does NetFlow operate on?

Network device

Which method is used by the SNMP manager when it contacts an SNMP agent and requests information about a monitored network device?

Poll

Cloud resource service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Match each service model listed on the left with the appropriate description on the right. (Each service model may be used once, more than once, or not at all.)

Provider delivers everything a developer needs to build an application. PaaS Providers deliver processing, storage, networks, and virtualized environment services. IaaS Clients deploy and run software without purchasing servers, data center space, or network equipment. IaaS Provider delivers applications to the client either over the internet or on a local area network. SaaS Client avoids the cost and complexity of buying and managing the underlying hardware and software layers. PaaS

Put the 7-step troubleshooting process in order.

Put the 7-step troubleshooting process in order. 1. Define the problem 2. Gather information 3. Analyze information 4. Eliminate probable causes 5. Propose hypothesis 6. Test hypothesis 7. Solve the problem

Which of the following allows multiple virtual machines to exist on the same physical machine and share its underlying physical resources?

Virtualization

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router. A(config)#int fa 0/2 A(config-if)#ip address 172.16.1.2 A(config-if)#standby 2 priority 150 A(config-if)#standby 2 ip 172.16.1.2 A(config-if)#standby 2 preempt A(config-if)#standby 5 priority 110 B(config)#int fa 0/2 B(config-if)#ip address 172.16.1.1 B(config-if)#standby 2 priority 110 B(config-if)#standby 5 ip 172.16.2.1 B(config-if)#standby 5 preempt B(config-if)#standby 5 priority 150

Router A will serve as the active router for HSRP group 2 and the backup router for HSRP group 5. Router B will serve as the active router for HSRP group 5 and the backup router for HSRP group 2.

Which SNMP component monitors individual network devices?

SNMP Agent

Which component is responsible for collecting and consolidating data from network devices that are being monitored with SNMP?

SNMP Manager

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through the VPN tunnel to the VPN gateway at the target site?

Site-to-site IPsec VPN

Which of the following are true regarding SNMP? (Select two.)

SNMPv2c can be compromised because the community string for authentication is sent in clear text. SNMPv3 employs the encryption of packets to prevent unauthorized sources from snooping.

You implemented SNMPv2 as a part of your overall network management plan. You configured an SNMP manager to gather traps from SNMP agents that run on monitored network devices. To secure communications between the manager and the agents, you configured a trap community name of abc123. After running the system for some time, you notice that traps containing questionable events are being sent to the SNMP manager. Upon investigation, you discover that a malicious insider has been spoofing these events, attempting to cover her tracks as she tried to compromise several network hosts. What could have been done to prevent this from happening?

SNMPv3 should have been implemented instead of SNMPv2.

You need to implement a solution for the sales reps who complain that they are unable to establish VPN connections when they travel because the hotel or airport firewalls block the necessary VPN ports. Which VPN security protocol can you use to resolve this issue?

SSTP

The National Institute of Standards and Technology (NIST) has established five characteristics that a true cloud service must have. Match each characteristic to its description.

Seamlessly increasing and decreasing resources as needed. Rapid elasticity The service needs to be provided over a network and be available in multiple platforms. Broad network access Resources can be controlled and optimized automatically. Measured service On-demand self service users must be able to dynamically obtain resources. On-demand self service Multiple resources can be used by multiple users and can scale dynamically. Resource pooling

Consider the following output from the show ip cache flow command. Which type of service was accessed on the destination host?

Secure HTTP web server

Consider the following log message generated by a router: *00019: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What is being used to identify when the message is generated?

Sequence number

You check the time on a router and find that it is off by several minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. The time difference is large, and it is taking some time for NTP to synchronize the time on the local router. To speed synchronization, you use NTP commands to immediately synchronize the time on the router with the time on the time provider. Which NTP term best describes this process?

Slam

You check the time on a router and find that it is off by about 10 minutes. To fix this issue, you configure NTP on the router to get time from a Stratum 2 time provider on the internet. It is taking some time for NTP to synchronize the time on the local router. After about 15 minutes, the time finally synchronizes. Which NTP term best describes this process?

Slew

Enterprise networks are simplifying network management by moving away from the distributed architecture model for managing network communications. What is the name of the network management model that replaces the distributed architecture model?

Software-defined networking (SDN)

A VPN (Virtual Private Network) is primarily used for which purpose?

Support secured communications over an untrusted network.

Which effect does the standby 2 priority 110 interface configuration command have?

The group priority is increased above the default.

What happens to the history table and log files when the device loses power?

The history table and log files are all lost.

A router serving as the AVG in a GLBP group has which of the following responsibilities? (Select two.)

The AVG assigns a virtual MAC address to each router of the GLBP group. The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address.

What happens when an HSRP active router fails? (Select two.)

The HSRP standby router becomes the active router after the holdtime expires on the hello message. Additional HSRP member routers transition from the listen state after the holdtime expires on the hello message.

What effect does the standby 2 track serial 0/0 25 interface configuration command have? (Select two.)

The HSRP standby router will become the active router if both routers have default configurations. It decrements the HSRP group priority by 25 if the interface goes down.

Which of the following solutions can help with security when you are implementing an external cloud service?

VPN

Quality of Service (QoS) is particularly important when implementing Voice over IP (VoIP), Video over IP, online gaming, or unified communications, in which delay or data loss make the overall experience unacceptable. QoS uses certain metrics to determine communication quality. Match the names of the metrics on the left with the appropriate description on the right. (Each metric name can only be used once.)

The amount of time that passes from when a packet is sent to when it arrives. Delay The percentage of packets that do not arrive at their destination. Loss The variation in delay when sending multiple packets from the same device. Jitter The capacity of a connection between two or more devices. Bandwidth

Packet switching, packet routing, and packet interpretation are examples of network communications. On which plane do these network communications occur?

The data plane

Software-defined networking (SDN) works by using software to configure and control the network, rather than relying on device-specific static configurations. The SDN model creates a centralized architecture that replaces the distributed architecture model. How does this shift to a centralized architecture affect the three planes of network communication?

The data plane and control plane have to be separated.

You have two routers that should be configured for gateway redundancy. The following commands are entered for each router: A(config)#int fa 0/2 A(config-if)#ip address 172.16.1.2 A(config-if)#standby 2 priority 150 A(config-if)#standby 2 ip 172.16.0.1 B(config)#int fa 0/2 B(config-if)#ip address 172.16.1.3 B(config-if)#standby 2 priority 150

The virtual IP address is 172.16.0.1. Router B will serve as active router, and Router A will serve as standby router.

When additional resources are needed on a virtual machine, the hypervisor increases available resources up to the maximum set amount. What is this process called?

Thin provisioning

You have noticed that every two weeks or so, a client's clock is off by two minutes, even after you have adjusted it. What is this issue known as?

Time drift

Which method is used when an SNMP agent detects that the system it monitors has exceeded a configured threshold and sends an event to the SNMP manager?

Trap

Real-time voice and video communications require a minimum level of quality in order to provide adequate services. The tables shown below contain the minimum metric specifications for real-time voice and video. From the drop-down lists below each table, select the communication type that the table pertains to.

Video Bandwidth N/A VOIP

Which of the following are IPsec methods of operation? (Select two.)

Tunnel Mode Transport Mode

Which fields in an IP packet header are examined by NetFlow to determine whether or not a given packet is part of a flow? (Select two.)

Type of service Source address

Match each component of the software-defined network (SDN) model on the left with the appropriate description on the right. Each component may be used more than once.

Used by the applications on the controller to obtain information about the network. Northbound controller interface Performs the function of monitoring network traffic. Controller Used to communicate with all of the physical network devices on the network. Southbound controller interface Used by software applications on the controller to obtain information about the network. API Performs the function of learning about the network topology. Controller Designates the accepted method of communication between the controller, network devices, and installed applications. API

Cloud services can also offer virtual network infrastructures, which include a variety of virtual components. Match each virtual component on the left with the appropriate description on the right. (Each component may be used only once.)

Uses Ethernet standards to transmit and receive frames on the network. Virtual network interface Implemented within the hypervisor to monitor and filter traffic on the virtual network as it flows between virtual machines. Virtual firewall Can be defined within the virtual switch and associated with specific hosts. Virtual VLAN Can support multiple networks on each of its interfaces, unlike the physical version. Virtual router Builds a table that identifies which MAC addresses are connected to each of its ports. Virtual switch

You have a small network as shown. Wrk1 is unable to communicate with Wrk2. Wrk1 can ping the router and all internet hosts. Wrk2 can ping Wrk3. What is the most likely cause of the problem?

Wrk1 and Wrk2 are on separate VLANs.

Which SNMPv3 security level requires MD5 or SHA authentication and implements DES encryption?

authPriv

What type of resources offer the following advantages? Flexibility of access Ease of use Self-service provisioning of resources API availability Metering of services Ability to try out software applications

cloud

In traditional networking models, the date plane, control plane, and management plane are all contained within the firmware of networking devices. This is known as what kind of architecture?

distributed

You are configuring NetFlow on a router. You want to monitor both incoming and outgoing traffic on an interface. You've used the interface command to allow you to configure the interface. What commands should you use next? (Select two. Both responses are part of the complete solution.)

ip flow egress ip flow ingress

You have set up a NetFlow collector using IP address 172.17.8.25 on UDP port 2055. Which of the following commands will redirect records to the new collector?

ip flow-export destination 172.17.8.25 2055

Currently, your NetFlow router is configured to redirect records to a NetFlow Collector with an IP address of 172.17.8.25 on UDP port 2055. By default, NetFlow uses the IP address of the interface that packets are sent from as the source IP address for records. However, for security reasons, you want to obscure the source address of the NetFlow router by specifying that all NetFlow records originate from the loopback interface of the router. Which command should you use?

ip flow-export source loopback 0

Your NetFlow records are currently formatted for version 5. You need to change to version 9. Which of the following commands would you use?

ip flow-export version 9

You check the time on a router and find that it is behind by several minutes. To fix this issue, you decide to configure NTP on the router to get time from a Stratum 2 time provider on the internet with a hostname of 0.pool.ntp.org. Which command should you use?

ntp server 0.pool.ntp.org

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 192.168.1.2. You want only serious log messages with a severity level of Emergency, Alert, or Critical to be redirected. Notification, Error, Warning, Informational, and Debug messages should not be redirected. Which commands are used to accomplish this? (Select three. All responses are part of the complete solution.)

logging on logging host 192.168.1.2 logging trap 2

You are configuring a router to redirect and consolidate log messages to a Syslog server. The router has multiple interfaces. However, you want all log messages being sent to the Syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router from. Which command is used to accomplish this?

logging source-interface <interface>

You want to redirect log messages from a router to a Syslog server. The IP address of the Syslog server is 172.17.8.5. You want only serious log messages with a severity level of emergency, alert, critical, error, or warning to be redirected. Notifications and informational messages as well as debug messages should not be redirected. You just entered the logging on command. Which other commands must be used to accomplish this task? (Select two. Both responses are part of the complete solution.)

logging trap 4 logging host 172.17.8.

Which SNMPv3 security level requires authentication with a username, but does not implement encryption?

noAuthnoPriv

Currently, all of the routers in your network are configured to use NTP to synchronize time with a public Stratum 2 time provider on the internet. To reduce redundant network traffic, you decide to configure one internal router as an authoritative NTP time provider with a stratum value of 5 and then configure all other routers to synchronize time with it. This router has an IP address of 172.17.8.254 assigned. Which commands should you use? (Select two. Each response is a part of the complete solution.)

ntp master 5 on the NTP time provider router. ntp server 172.17.8.254 on all routers except the time provider.

You check the time on a router and find that it is out of sync with the time on the other routers and switches in your network. To fix this issue, you decide to configure NTP on the router to get time from an internal authoritative (master) NTP server with an IP address of 172.17.8.254. Which command should you use?

ntp server 172.17.8.254

You need to verify that time is synchronized on a router. Which commands could you use to do this? (Select two. Each response is a complete solution.)

show ntp associations show ntp status


Related study sets

Chapter 27: practice test, tophat, mastering biology

View Set

Ch. 23 Fundamentals- Legal Implications Nursing

View Set

Assignment 18 - Diamond Simulants

View Set

Chapter 4. State Insurance Statutes, Rules, and Regulations (Primerica)

View Set

Weeks 8-9 Quiz- Personal Finance

View Set