9tut Exam Questions Flashcards

1
Q

Which type of encryption does WPA1 use for data protection ?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the temporary state that switch port always enter immediately after the boot process when RAPID PVST+ is used ?

A

Discarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which components are contained within a virtual machine ?
A. Physical resources inflicting NIC, RAM, disk
B.configuration files backed by physical resources from the hypervisor
C.application running on hypervisor
D. Processes running on the hypervisor and a guest OS

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an APP?

A

A. Service
B. Trunk
C. AP-manager
D. Virtual AP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a switch search for in the CAM table when forwarding a frame?
A. Source MAC address and aging time
B. Destination MAC address and flush time
C. Source MAC address and source port
D. Destination MAC address and destination port

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of hypervisor operates without an underlying OS to host for host machines?
A. Type 1
B. Type 2
C. Type 3
D. Type 12

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the host do when using the IPv4 preferred function?
A. It continues to use a statically assigned IPV4 address.
B.it forces the DNS server to provide the same IPV4 at each renewal
C. It requests the same IPv4 address when it renews it lease with the dhcp server
D. It prefers a pool of addresses when renewing the IPv4 host up address

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Drag and drop characteristics
Unique local :
Global unicast address:

-counterpart of private IPv4 addresses
-publicly routable in the same way as IPv4 addresses
-provides for one-to-one communication
-may be used by multiple organizations at the same time

A

Unique local: counterpart of private IPv4 addresses , May be used by multiple organizations at the same time
Global unicast address: publicly routable in the same way as IPv4 addresses , provides for a one-to-one communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does MAC learning function?
A. Restrict porch to a maximum of 10 dynamically learned addresses.
B. Increases security on the management VLAN
C. Associated the MAC address with the port on which it is received
D. Drop received mac address not listed in the address table

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two capabilities provided by VRRP within a LAN network? (Choose two)
A. Load sharing
B. Bandwidth optimization
C. Dynamic routing updates
D. Redundancy
E. Granular QoS

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drag and drop the statement about AAA
Authentication:
Authorization:
- it grants access to network assets such as ftp servers
- it restricts the CLI commands that a user is able to perform
- it performs user validation via TACAS+
-it records the duration of each connection
-it verifies who you are

A

Authentication- it performs user validation via TACAS+, it verifies who you are
Authorization- it grants access to network assets , such as ftp servers , it restricts the CLI command that a user is able to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which AP mode is used for capturing wireless traffic and forwarding that traffic to a PC that is running a packet analyzer?
A. Monitor
B. Sniffer
C. Bridge
D. Rouge detector

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a characteristic of a layer 2 switch?
A. Provides a single broadcast domain for all connected devices
B. Tracks the number of active TCP connections
C. Offers one collision domain for all connected devices
D. Makes forwarding decision based on MAC address

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a characteristic of frame switching?
A inspects and drops frames from unknown destination
B floods unknown destination to all ports except the receiving port
C forwards frames to a neighbor port using UDP
D protect against denial of service attacks

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which interface is used for out-of-band management on a WLC?
A dynamic
B management
C service port
D virtual

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two QoS tools are used to guarantee minimum bandwidth to certain traffic (choose two)?
A FIFO
B CBWFQ
C LLC
D WFQ
E RSVP

A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network administrator needs to aggregate four ports into a single logical link, which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?
A .1q trunk
B cisco vPC
C LLDP
D LACP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A there is limited unique address space and traffic on the new subnet will stay local within the organization
B the network has multiple endpoint listeners, and it is desired to limit the number of broadcast
C traffic on the subnet must traverse a site to site VPN to an outside organization
D the ISP requires the new submit to advertise to the Internet for web services

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Aside from discarding, which two states does the switchboard transition through while using RSTP (802.1w) (choose two)
A listening
B blocking
C forwarding
D learning
E speaking

A

C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a role of wireless controllers in an enterprise network?
A serve as the first line of defense in an enterprise network
B support standalone or controller-based architecture
C centralized the management of access points in an enterprise network
D provide secure user logins to device on the network

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do servers connect to the network in a virtual environment?
A wireless to an access point that is physically connected to the network
B a cable connected to a physical switch on the network
C a virtual switch that links to an access point that is physically connected to the network
D a software switch in a hypervisor that is physically connected to the network

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which CRUD operation corresponds to the HTTP GET method?
A read
B update
C create
D delete

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What causes a port to be placed in an err-disable state?
A latency
B nothing plugged into the port
C shutdown command issued in the port
D port security violation

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which switch technology establishes, and they were connection immediately when it is plugged in?
A uplinkfast
B portfast
C BPDU GUARD
D backbonefast

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a network appliance that check the state of a packet to determine whether the packet is legitimate?
A layer 2 switch
B lan controller
C load balancer
D firewall

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When dhcp is configured on a router , which command must be configured so that default gateway is automatically distributed?
A default-router
B defualt-gateway
C ip helper address
D dns-server

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Why does a switch flood a frame to all ports?
A the destination MAC address of the frame is unknown
B the source MAC address of the frame is unknown
C the source and destination mad address of the frame are the same
D the frame has zero destination MAC addresses

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which resource is able to be shared amount virtual machines deployed on the same physical server?
A application
B OS
C VM configuration file
D disk

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which implementation provides the strongest encryption combination for the wireless environment ?
A WPA2 + AES
B WPA + AES
C WEP
D WPA + TKIP

A

A

30
Q

What is a characteristic of a SOHO network?
A connected each switch to every other switch in the network
B enables multiple users to share a single broadband connection
C provides high throughput access for 1000 or more users
D includes at least tree tiers of devices to provide load balancing and redundancy

A

B

31
Q

What does a routers do when configured with the default DNS lookup settings , and a url is entered ?
A initiates a ping request to the url
B prompts the user to specify the desired IP address
C continuously attempts to resolve the URL until the command is cancelled
D sends a broadcast message in an attempt to resolve the url

A

D

32
Q

Which network plane is centralized and manages routing decisions ?
A policy plane
B control plane
C management plane
D data plane

A

B

33
Q

What does a switch use to build its MAC address table ?
A VTP
B DTP
C egree traffic
D ingress traffic

A

D

34
Q

What is the maximum bandwidth of a T1 point to point connection ?
A 1.544 Mbps
B 2.048 Mbps
C 34.368 Mbps
D 43.7 Mbps

A

A

35
Q

How does a Cisco unified wireless network respond to WiFi channel overlap?
A it alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
B it allows the administrator to assign channels on a per-device or per-interface basis
C it segregates devices from different manufacturers onto different channels
D it analyzes client load and background noise and dynamically assigns a channel

A

A

36
Q

Which device controls the forwarding of authentication request for users when connecting to the network using a lightweight AP?
A TACACS server
B wireless access point
C RADIUS server
D wireless LAN controller

A

D

37
Q

Which device tracks the state of active connections in order to make a decision to forward packets through?
A firewall
B wireless access point
C router
D wireless lan controller

A

A

38
Q

A network admin must enable DHCP service between two sites . What must be configured for the router to pass DHCPDISCOVER message on to the server?
A dhcp relay agent
B dhcp binding
C dhcp pool
D dhcp snooping

A

A

39
Q

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link which command should be used ?
A switch port trunk allowed VLAN 10
B switch port trunk native VLAN 10
C switch port mode trunk
D switch port trunk encapsulation dot1q

A

B

40
Q

What is a benefit of vrrp?
A it provides traffic load balancing to destinations that are more than two hops from the source
B it provides the default gateway redundancy on a lan using two or more routers
C it allows neighbors to share routing table information between each other
D it prevents loops in a layer 2 lan by forwarding all traffic to a root bridge which then makes the final forwarding decision

A

B

41
Q

Which protocol does an IPv4 host use to obtain a dynamically assigned ip address?
A arp
B dns
C cdp
D dhcp

A

D

42
Q

What are two functions of an SDN controllers (choose two )?
A coordinating vtns
B layer 2 forwarding
C tracking hosts
D managing the topology
E protecting against ddos attacks

A

A D

43
Q

Which WAN topology provides a combination of simplicity quality, and availability?
A partial mesh
B full mesh
C point-to-point
D hub to spoke

A

C

44
Q

An engineer observes high usage on 2.4 GHz channels and lower usage on the 5 GHz channels. What must be configured to allow clients to preferentially use 5 GHz access points?
A client band select
B OEAP split tunnel
C 11ac MU-MIMO
D are-Anchor Roamed Clients

A

A

45
Q

When a WLAN with WPA2 PSK is configured in the wireless LAN controller GUI which format is supported ?
A Unicode
B base64
C ASCII
D decimal

A

C

46
Q

What networking function occurs on the data plane?
A facilities spanning-tree election
B processing inbound SSH management traffic
C forwarding remote client/server traffic
D sending and receiving OSPF Hello packets

A

C

47
Q

What does an SDN controller use as a communication protocol to relay forwarding changes to a south bound API?
A XML
B Java
C REST
D open flow

A

D

48
Q

What is the benefit of using FHRP?
A balancing traffic across multiple gateways in proportion to their loads
B reduced management overhead on network routers
C reduced ARP traffic on the network
D higher degree of availability

A

D

49
Q

Which 802.11 management frame type is sent when a client roams between access points on the same SSID?
A authentication Request
B Probe request
C Reassociation Request
D Association Request

A

C

50
Q

Which global command group, all passwords in the running configuration ?
A enable secret
B enable password-encryption
C service password-encryption
D password-encrypt

A

C

51
Q

What is the function of a hub-and-spoke WAN topology?
A supports application optimization
B provides direct connection between subscribers
C supports Layer 2 VPNS
D allow access restrictions to be implemented between subscribers sits

A

D

52
Q

Which two protocols are supported on service-port interfaces (choose two) ?
A RADIUS
B TACACS+
C Telnet
D SCP
E SSH

A

C E

53
Q

An engineering team ask an implementer to configure syslog for warning, condition and air condition which command does the implementer configure to achieve the desired result?
A logging trap 2
B logging trap3
C logging trap 4
D logging trap 5

A

C

54
Q

What is a similar between OM3 and OM4 fiber optic cable ?
A both have a 50 micron core diameter
B both have a 9 micron core diameter
C both have a 62.5 micron core diameter
D both have a 100 micron core diameter

A

A

55
Q

Which protocol does an AP use to draw power from a connected switch?
A internet group management protocol
B Cisco discovery protocol
C adaptive wireless path protocol
D neighbor discovery protocol

A

B

56
Q

When deploying syslog, which severity level logs informational message?
A 0
B 2
C 4
D 6

A

6

57
Q

What describes the operation of virtual machines?
A virtual machines are responsible for managing an allocating host hardware resources
B virtual machines are operating systems instance that are decoupled from server hardware
C virtual machines are the physical hardware that supports virtual environment
D virtual machine environment physical service must run one operating system at a time

A

B

58
Q

Which technology allows for multiple operating system to be run on a single host computer?
A virtual device contexts
B network port ID visualization
C virtual routing and forwarding
D server virtualization

A

D

59
Q

Which two QoS tools provide congestion management? (Choose two)
A FRTS
B CAR
C PQ
D PBR
E CBWFQ

A

C E

60
Q

What occurs when overlapping WiFi channels are implement?
A the wireless network become vulnerable to unauthorized access
B wireless devices are unable to distinguish between different SSID
C network communication are open to eavesdropping
D users experience poor wireless network performance

A

D

61
Q

Which JSON data type is an unordered set of attribute-value pairs?
A array
B string
C object
D Boolean

A

C

62
Q

An engineer needs to add an old switch back into the network. To prevent this switch from corrupting the VLAN database which action must be taken ?
A add the switch in the VTP domain with a lower revision number
B add the switch in the VTP domain with a higher revision number
C add the switch with DTP set to dynamic desirable
D add the switch with DTP set to desirable

A

A

63
Q

Which WLC port connects to a switch to past normal access-point traffic?
A distribution system
B service
C redundancy
D console

A

A

64
Q

Which level of severity must be set to get informational syslogs?
A alert
B critical
C notice
D debug

A

D

65
Q

What is a characteristic of cloud-based network topology?
A physical workstations are configured to share resources
B services are provided by a public, private, or hybrid deployment
C onsite network services are provided with physical layer 2 and layer 3 components
D wireless connections provide the sole access method to services

A

B

66
Q

A network analyst is tasked with configured the date and time on a router using EXEC MODE. The date must be set to 12 AM . Which command should be used?
A clock timezone
B clock summer-time-recurring
C clock summer-time date
D clock set

A

D

67
Q

Which http status code is returned after a successful REST API request?
A 200
B 301
C 404
D 500

A

A

68
Q

What is used as a solution for protecting an individual network endpoint from attack?
A router
B wireless contollee
C antivirus software
D Cisco DNA Center

A

C

69
Q

Which two http methods are suitable for action performed by REST-based API’s ( choose two )
A remove
B redirect
C post
D get
E pop

A

C D

70
Q

Which provides connection redundancy increased bandwidth and load sharing between a wireless LAN controller and a layer 2 switch?
A VLAN trunking
B Tunneling
C First hop redundancy
D link aggregation

A

D

71
Q

When the LAG configuration is updated on a Cisco WLC, which additional task must be performed when changes are complete ?
A flush all MAC addresses from the WLC
B Re-associate the WLC with the access point
C re-enable the WLC interface
D reboot the WLC

A

D