9tut Exam Questions Flashcards
Which type of encryption does WPA1 use for data protection ?
TKIP
What is the temporary state that switch port always enter immediately after the boot process when RAPID PVST+ is used ?
Discarding
Which components are contained within a virtual machine ?
A. Physical resources inflicting NIC, RAM, disk
B.configuration files backed by physical resources from the hypervisor
C.application running on hypervisor
D. Processes running on the hypervisor and a guest OS
B
Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an APP?
A. Service
B. Trunk
C. AP-manager
D. Virtual AP connection
What does a switch search for in the CAM table when forwarding a frame?
A. Source MAC address and aging time
B. Destination MAC address and flush time
C. Source MAC address and source port
D. Destination MAC address and destination port
D
Which type of hypervisor operates without an underlying OS to host for host machines?
A. Type 1
B. Type 2
C. Type 3
D. Type 12
A
What does the host do when using the IPv4 preferred function?
A. It continues to use a statically assigned IPV4 address.
B.it forces the DNS server to provide the same IPV4 at each renewal
C. It requests the same IPv4 address when it renews it lease with the dhcp server
D. It prefers a pool of addresses when renewing the IPv4 host up address
C
Drag and drop characteristics
Unique local :
Global unicast address:
-counterpart of private IPv4 addresses
-publicly routable in the same way as IPv4 addresses
-provides for one-to-one communication
-may be used by multiple organizations at the same time
Unique local: counterpart of private IPv4 addresses , May be used by multiple organizations at the same time
Global unicast address: publicly routable in the same way as IPv4 addresses , provides for a one-to-one communication
How does MAC learning function?
A. Restrict porch to a maximum of 10 dynamically learned addresses.
B. Increases security on the management VLAN
C. Associated the MAC address with the port on which it is received
D. Drop received mac address not listed in the address table
C
What are the two capabilities provided by VRRP within a LAN network? (Choose two)
A. Load sharing
B. Bandwidth optimization
C. Dynamic routing updates
D. Redundancy
E. Granular QoS
A D
Drag and drop the statement about AAA
Authentication:
Authorization:
- it grants access to network assets such as ftp servers
- it restricts the CLI commands that a user is able to perform
- it performs user validation via TACAS+
-it records the duration of each connection
-it verifies who you are
Authentication- it performs user validation via TACAS+, it verifies who you are
Authorization- it grants access to network assets , such as ftp servers , it restricts the CLI command that a user is able to perform
Which AP mode is used for capturing wireless traffic and forwarding that traffic to a PC that is running a packet analyzer?
A. Monitor
B. Sniffer
C. Bridge
D. Rouge detector
B
What is a characteristic of a layer 2 switch?
A. Provides a single broadcast domain for all connected devices
B. Tracks the number of active TCP connections
C. Offers one collision domain for all connected devices
D. Makes forwarding decision based on MAC address
D
What is a characteristic of frame switching?
A inspects and drops frames from unknown destination
B floods unknown destination to all ports except the receiving port
C forwards frames to a neighbor port using UDP
D protect against denial of service attacks
B
Which interface is used for out-of-band management on a WLC?
A dynamic
B management
C service port
D virtual
C
Which two QoS tools are used to guarantee minimum bandwidth to certain traffic (choose two)?
A FIFO
B CBWFQ
C LLC
D WFQ
E RSVP
B D
A network administrator needs to aggregate four ports into a single logical link, which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?
A .1q trunk
B cisco vPC
C LLDP
D LACP
D
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A there is limited unique address space and traffic on the new subnet will stay local within the organization
B the network has multiple endpoint listeners, and it is desired to limit the number of broadcast
C traffic on the subnet must traverse a site to site VPN to an outside organization
D the ISP requires the new submit to advertise to the Internet for web services
A
Aside from discarding, which two states does the switchboard transition through while using RSTP (802.1w) (choose two)
A listening
B blocking
C forwarding
D learning
E speaking
C D
What is a role of wireless controllers in an enterprise network?
A serve as the first line of defense in an enterprise network
B support standalone or controller-based architecture
C centralized the management of access points in an enterprise network
D provide secure user logins to device on the network
C
How do servers connect to the network in a virtual environment?
A wireless to an access point that is physically connected to the network
B a cable connected to a physical switch on the network
C a virtual switch that links to an access point that is physically connected to the network
D a software switch in a hypervisor that is physically connected to the network
D
Which CRUD operation corresponds to the HTTP GET method?
A read
B update
C create
D delete
A
What causes a port to be placed in an err-disable state?
A latency
B nothing plugged into the port
C shutdown command issued in the port
D port security violation
D
Which switch technology establishes, and they were connection immediately when it is plugged in?
A uplinkfast
B portfast
C BPDU GUARD
D backbonefast
B
What is a network appliance that check the state of a packet to determine whether the packet is legitimate?
A layer 2 switch
B lan controller
C load balancer
D firewall
D
When dhcp is configured on a router , which command must be configured so that default gateway is automatically distributed?
A default-router
B defualt-gateway
C ip helper address
D dns-server
A
Why does a switch flood a frame to all ports?
A the destination MAC address of the frame is unknown
B the source MAC address of the frame is unknown
C the source and destination mad address of the frame are the same
D the frame has zero destination MAC addresses
A
Which resource is able to be shared amount virtual machines deployed on the same physical server?
A application
B OS
C VM configuration file
D disk
D