CCNAv7 Flashcards

1
Q

Which design feature will limit the size of a failure domain in an enterprise network?

the purchase of enterprise equipment that is designed for large traffic volume
the installation of redundant power supplies
the use of a collapsed core design
the use of the building switch block approach

A

the use of the building switch block approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

the system image file
the NVRAM file system
the configuration register value
the startup configuration file
system ROM
A

the configuration register value

the startup configuration file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of network uses one common infrastructure to carry voice, data, and video signals?

borderless
converged
managed
switched

A

converged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three advantages of using private IP addresses and NAT? (Choose three.)

hides private LAN addressing from outside devices that are connected to the Internet
permits LAN expansion without additional public IP addresses
reduces CPU usage on customer routers
creates multiple public IP addresses
improves the performance of the router that is connected to the Internet
conserves registered public IP addresses

A

hides private LAN addressing from outside devices that are connected to the Internet
permits LAN expansion without additional public IP addresses
conserves registered public IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two scenarios are examples of remote access VPNs? (Choose two.)

All users at a large branch office can access company resources through a single VPN connection.
A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.
A toy manufacturer has a permanent VPN connection to one of its parts suppliers.
A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

A

A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three benefits of cloud computing? (Choose three.)

It utilizes end-user clients to do a substantial amount of data preprocessing and storage.
It uses open-source software for distributed processing of large datasets.
It streamlines the IT operations of an organization by subscribing only to needed services.
It enables access to organizational data anywhere and at any time.
It turns raw data into meaningful information by discovering patterns and relationships.
It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

A

It streamlines the IT operations of an organization by subscribing only to needed services.
It enables access to organizational data anywhere and at any time.
It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a characteristic of a single-area OSPF network?

All routers share a common forwarding database.
All routers have the same neighbor table.
All routers are in the backbone area.
All routers have the same routing table.

A

All routers are in the backbone area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a WAN?

a network infrastructure that spans a limited physical area such as a city
a network infrastructure that provides access to other networks over a large geographic area
a network infrastructure that provides access in a small geographic area
a network infrastructure designed to provide data storage, retrieval, and replication

A

a network infrastructure that provides access to other networks over a large geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?

data center
virtualization
dedicated servers
software defined networking

A

data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

link-state update
hello
database description
link-state request

A

hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements are characteristics of a virus? (Choose two.)

A virus has an enabling vulnerability, a propagation mechanism, and a payload.
A virus can be dormant and then activate at a specific time or date.
A virus provides the attacker with sensitive data, such as passwords.
A virus replicates itself by independently exploiting vulnerabilities in networks.
A virus typically requires end-user activation.

A

A virus typically requires end-user activation.

A virus can be dormant and then activate at a specific time or date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

ISDN
DSL
cable
dialup

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?

packet-switched network
Ethernet WAN
circuit-switched network
MPLS

A

Ethernet WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?

to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to obtain specially designed operating systems preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a computer or network

A

to reverse engineer binary files when writing exploits and when analyzing malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

R1#
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 match)

Two devices connected to the router have IP addresses of 192.168.10. x .
Two devices were able to use SSH or Telnet to gain access to the router.
Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.
Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.

A

Two devices were able to use SSH or Telnet to gain access to the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?

clear ip dhcp
clear ip nat translation
clear access-list counters
clear ip pat statistics

A

clear ip nat translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two characteristics of video traffic? (Choose two.)

Video traffic consumes less network resources than voice traffic consumes.
Video traffic latency should not exceed 400 ms.
Video traffic is more resilient to loss than voice traffic is.
Video traffic requires a minimum of 30 kbs of bandwidth.
Video traffic is unpredictable and inconsistent.

A

Video traffic latency should not exceed 400 ms.

Video traffic is unpredictable and inconsistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?

UPnP
MAC filtering
NAT
QoS

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

online collaboration
BYOD
virtualization
maintaining communication integrity

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which two IPsec protocols are used to provide data integrity?

MD5
DH
AES
SHA
RSA
A

MD5

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

The Cisco AnyConnect client is installed by default on most major operating systems.
The host initiates a clientless VPN connection using a compliant web browser to download the client.
The host initiates a clientless connection to a TFTP server to download the client.
The host initiates a clientless connection to an FTP server to download the client.

A

The host initiates a clientless VPN connection using a compliant web browser to download the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

leased line
cable
digital subscriber line
Ethernet WAN
municipal Wi-Fi
A

leased line

Ethernet WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which type of QoS marking is applied to Ethernet frames?
IP precedence
DSCP
ToS
CoS
A

CoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which is a characteristic of a Type 2 hypervisor?​

does not require management console software
has direct access to server hardware resources
best suited for enterprise environments
installs directly on hardware

A

does not require management console software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the two types of VPN connections? (Choose two.)

PPPoE
Frame Relay
site-to-site
remote access
leased line
A

site-to-site

remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

. What functionality does mGRE provide to the DMVPN technology?

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
It provides secure transport of private information over public networks, such as the Internet.
It is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.
It creates a distributed mapping database of public IP addresses for all VPN tunnel spokes.

A

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?

the FIB
the routing table
the ARP table
the DSP

A

the ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

. What command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?

show running-config
show ip nat statistics
show ip cache
show version

A

show ip nat statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a purpose of establishing a network baseline?

It provides a statistical average for network performance.
It creates a point of reference for future network evaluations.
It manages the performance of network devices.
It checks the security configuration of network devices

A

It creates a point of reference for future network evaluations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which statement describes a characteristic of standard IPv4 ACLs?

They filter traffic based on source IP addresses only.
They can be created with a number but not with a name.
They are configured in the interface configuration mode.
They can be configured to filter traffic based on both source IP addresses and source ports.

A

They filter traffic based on source IP addresses only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?

to capture and analyze packets within traditional Ethernet LANs or WLANs
to probe and test the robustness of a firewall by using specially created forged packets
to make repeated guesses in order to crack a password

A

to make repeated guesses in order to crack a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are two syntax rules for writing a JSON array? (Choose two.)

Each value in the array is separated by a comma.
The array can include only one value type.
A space must separate each value in the array.
A semicolon separates the key and list of values.
Values are enclosed in square brackets.

A

Each value in the array is separated by a comma.

Each value in the array is separated by a comma.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a characteristic of a Trojan horse as it relates to network security?

An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
Malware is contained in a seemingly legitimate executable program.
Extreme quantities of data are sent to a particular network device interface.
Too much information is destined for a particular memory block, causing additional memory areas to be affected

A

Malware is contained in a seemingly legitimate executable program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

TCP SYN flood
DNS tunneling
DHCP spoofing
ARP cache poisoning

A

DHCP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?

data integrity
non-repudiation
origin authentication
data confidentiality

A

origin authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?

to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to detect any evidence of a hack or malware in a computer or network
to probe and test the robustness of a firewall by using specially created forged packets
to capture and analyze packets within traditional Ethernet LANs or WLANs

A

to capture and analyze packets within traditional Ethernet LANs or WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.15.255
  2. 0.3.255
  3. 0.7.255
  4. 0.1.255
A

0.0.3.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Match the HTTP method with the RESTful operation.

A

POST –» Create
GET –» Read
PUT/PATCH –» Update/Replace?Modify
Delete –» Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?

to activate the OSPF neighboring process
to influence the DR/BDR election process
to provide a backdoor for connectivity during the convergence process
to streamline and speed up the convergence process

A

to influence the DR/BDR election process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?

A

permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

The spine and leaf switches are always linked through core switches.
The spine switches attach to the leaf switches and attach to each other for redundancy.
The leaf switches always attach to the spines and they are interlinked through a trunk line.
The leaf switches always attach to the spines, but they never attach to each other.

A

The leaf switches always attach to the spines, but they never attach to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which two scenarios would result in a duplex mismatch? (Choose two.)

connecting a device with autonegotiation to another that is manually set to full-duplex
starting and stopping a router interface during a normal operation
connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps
configuring dynamic routing incorrectly
manually setting the two connected devices to different duplex modes

A

connecting a device with autonegotiation to another that is manually set to full-duplex
manually setting the two connected devices to different duplex modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?

authenticates a packet by a string match of the username or community string
authenticates a packet by using either the HMAC with MD5 method or the SHA method
authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms
authenticates a packet by using the SHA algorithm only

A

authenticates a packet by using either the HMAC with MD5 method or the SHA method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are two types of attacks used on DNS open resolvers? (Choose two.)

amplification and reflection
resource utilization
fast flux
ARP poisoning
cushioning
A

amplification and reflection

resource utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet .
If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which type of resources are required for a Type 1 hypervisor?

a dedicated VLAN
a management console
a host operating system

A

a management console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In JSON, what is held within square brackets [ ]?

nested values
key/value pairs
an object
an array

A

an array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are three components used in the query portion of a typical RESTful API request? (Choose three.)

resources
protocol
API server
format
key
parameters
A

format
key
parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?

top-down
bottom-up
divide-and-conquer
substitution

A

divide-and-conquer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

MD5
AES
IPsec
ESP

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

They are best used as distribution layer switches.
New Cisco Catalyst 2960-C switches support PoE pass-through.
They are modular switches.
They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

A

New Cisco Catalyst 2960-C switches support PoE pass-through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

. Which component of the ACI architecture translates application policies into network programming?

the hypervisor​
the Application Policy Infrastructure Controller
the Nexus 9000 switch
the Application Network Profile endpoints

A

the Application Policy Infrastructure Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

device type
cable specification
interface identifier
OS/IOS version
connection type
cable type and identifier
A

interface identifier

connection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are two benefits of using SNMP traps? (Choose two.)

They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.

A

They eliminate the need for some periodic polling requests.

They reduce the load on network and agent resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which statement accurately describes a characteristic of IPsec?

IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.

A

IPsec is a framework of open standards that relies on existing algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)

connect users to the network
provide a high-speed network backbone
connect remote networks
provide Power over Ethernet to devices
provide data traffic security
A

connect remote networks

provide data traffic security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which two statements describe the use of asymmetric algorithms? (Choose two.)

Public and private keys may be used interchangeably.
If a public key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
If a private key is used to encrypt the data, a private key must be used to decrypt the data.

A

If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options
A

reduced costs

increased flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

to scan for accessibility
to retrieve and modify data
to gather information about the network and devices
to prevent other users from accessing the system
to escalate access privileges

A

to scan for accessibility

to gather information about the network and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

botnet
spyware
virus
rootkit

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .
If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What QoS step must occur before packets can be marked?

classifying
shaping
queuing
policing

A

classifying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the main function of a hypervisor?

It is used to create and manage multiple VM instances on a host machine.
It is a device that filters and checks security credentials.
It is a device that synchronizes a group of sensors.
It is software used to coordinate and prepare data for analysis.
It is used by ISPs to monitor cloud computing resources.

A

It is used to create and manage multiple VM instances on a host machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?

Frame Relay
Ethernet WAN
VSAT
ISDN

A

Ethernet WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns .
If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?

A

denied

66
Q

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

12
4
8
16
6
A

8

67
Q

. Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?

a less-structured approach based on an educated guess
an approach comparing working and nonworking components to spot significant differences
a structured approach starting with the physical layer and moving up through the layers of the OSI model until the cause of the problem is identified
an approach that starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified

A

a less-structured approach based on an educated guess

68
Q

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

Data communications must be given the first priority.
Voice and video communications are more sensitive to latency.
Legacy equipment is unable to transmit voice and video without QoS.
Data communications are sensitive to jitter

A

Voice and video communications are more sensitive to latency

69
Q

Which statement describes a VPN?

VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through the Internet.
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use virtual connections to create a private network through a public network.

A

VPNs use virtual connections to create a private network through a public network

70
Q

In which OSPF state is the DR/BDR election conducted?

ExStart
Init
Two-Way
Exchange

A

Two-Way

71
Q

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

Cisco Secure Mobility Clientless SSL VPN
Frame Relay
remote access VPN using IPsec
Cisco AnyConnect Secure Mobility Client with SSL
site-to-site VPN
A

site-to-site VPN

72
Q

What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?

loading
established
full
two-way

A

full

73
Q

Which type of server would be used to keep a historical record of messages from monitored network devices?

DNS
print
DHCP
syslog
authentication
A

syslog

74
Q

. When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

packet addressing
delay
jitter
packet routing
link speed
A

delay

jitter

75
Q

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Determine ownership.
Determine the symptoms.
Narrow the scope.
Document the symptoms.
Gather information.
A

Narrow the scope.

76
Q

What protocol sends periodic advertisements between connected Cisco devices in order to learn device name, IOS version, and the number and type of interfaces?

CDP
SNMP
NTP
LLDP

A

CDP

77
Q

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.127
  2. 0.0.31
  3. 0.3.255
  4. 0.0.63
A

0.0.3.255

78
Q

Which type of OSPFv2 packet is used to forward OSPF link change information?

link-state acknowledgment
link-state update
hello
database description

A

link-state update

79
Q

What protocol synchronizes with a private master clock or with a publicly available server on the internet?

MPLS
CBWFQ
TFTP
NTP

A

NTP

80
Q

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec

A

GRE over IPsec

81
Q

An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?

router(config-router)# network 10.1.0.0 0.0.255.255 area 0
router(config-router)# network 10.1.0.0 0.0.15.255 area 0
router(config-router)# network 10.1.0.0 255.255.255.0 area 0
router(config-router)# network 10.1.0.0 0.0.0.0 area 0

A

router(config-router)# network 10.1.0.0 0.0.255.255 area 0

82
Q

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.7.255
  2. 0.1.255
  3. 0.3.255
  4. 0.15.255
A

0.0.1.255

83
Q

How does virtualization help with disaster recovery within a data center?

improvement of business practices
supply of consistent air flow
support of live migration
guarantee of power

A

support of live migration

84
Q

How does virtualization help with disaster recovery within a data center?

Hardware does not have to be identical.
 Hardware at the recovery site does not have to be identical to production equipment.
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
A

Hardware does not have to be identical.

(Other case) Hardware at the recovery site does not have to be identical to production equipment.

85
Q

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet​​

A

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

86
Q

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

executing the SPF algorithm
building the topology table
selecting the router ID
declaring a neighbor to be inaccessible

A

building the topology table

87
Q

What protocol uses agents, that reside on managed devices, to collect and store information about the device and its operation?

SYSLOG
TFTP
CBWFQ
SNMP

A

SNMP

88
Q

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 10.27.27.0 255.255.255.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.63
  2. 0.0.255
  3. 0.0.31
  4. 0.0.15
A

0.0.0.255

89
Q

When will an OSPF-enabled router transition from the Down state to the Init state?

when an OSPF-enabled interface becomes active
as soon as the router starts
when the router receives a hello packet from a neighbor router
as soon as the DR/BDR election process is complete

A

when the router receives a hello packet from a neighbor router

90
Q

What type of traffic is described as having a high volume of data per packet?

data
video
voice

A

video

91
Q

What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

LLDP
NTP
TFTP
SNMP

A

LLDP

92
Q

Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?

building the topology table
selecting the router ID
declaring a neighbor to be inaccessible
executing the SPF algorithm

A

executing the SPF algorithm

93
Q

Which type of VPN connects using the Transport Layer Security (TLS) feature?

SSL VPN
IPsec virtual tunnel interface
GRE over IPsec
dynamic multipoint VPN

A

SSL VPN

94
Q

Which group of APIs are used by an SDN controller to communicate with various applications?

eastbound APIs
westbound APIs
northbound APIs
southbound APIs

A

northbound APIs

95
Q

A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement?

Cisco ACI
software defined networking
Type-1 hypervisor
APIC-EM

A

Type-1 hypervisor

96
Q

What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?

ip nat inside source list 24 interface serial 0/1/0 overload
ip nat inside source list 14 pool POOL-STAT overload
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside source list ACCTNG pool POOL-STAT

A

access-list 10 permit 172.19.89.0 0.0.0.255

97
Q

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement?

-Cloud services
Data center
APIC-EM
Cisco ACI

A

Cloud services

98
Q

Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.)

Layer 3 MPLS VPN
IPsec VPN
Cisco Dynamic Multipoint VPN
GRE over IPsec VPN
clientless SSL VPN
client-based IPsec VPN
A

IPsec VPN
Cisco Dynamic Multipoint VPN
GRE over IPsec VPN

99
Q

In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

It can be viewed by using the show ip ospf database command.
A neighbor table is created based on the LSDB.
It contains a list of only the best routes to a particular network.
It contains a list of all neighbor routers to which a router has established bidirectional communication.
All routers within an area have an identical link-state database.

A

It can be viewed by using the show ip ospf database command.

All routers within an area have an identical link-state database.

100
Q

In an OSPF network which OSPF structure is used to create the neighbor table on a router?

adjacency database
link-state database
routing table
forwarding database

A

adjacency database

101
Q

What protocol is used in a system that consists of three elements–a manager, agents, and an information database?

MPLS
SYSLOG
SNMP
TFTP

A

SNMP

102
Q

What type of traffic is described as not resilient to loss?

data
video
voice

A

video

103
Q

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

open
partner
public
private

A

private

104
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet .

If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?

A

denied

105
Q

What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

NTP
LLDP
SNMP
MPLS

A

LLDP

106
Q

Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?

MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

dynamic multipoint VPN

107
Q

What is a characteristic of the REST API?

evolved into what became SOAP
used for exchanging XML structured information over HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services

A

most widely used API for web services

108
Q

. A student, doing a summer semester of study overseas, has taken hundreds of pictures on a smartphone and wants to back them up in case of loss. What service or technology would support this requirement?

Cisco ACI
cloud services
software defined networking
dedicated servers

A

cloud services

109
Q

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-bandwidth link.
Place standard ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the source IP address of the traffic.
Place extended ACLs close to the destination IP address of the traffic.
Place extended ACLs close to the source IP address of the traffic.
For every inbound ACL placed on an interface, there should be a matching outbound ACL.

A

Filter unwanted traffic before it travels onto a low-bandwidth link.
Place standard ACLs close to the destination IP address of the traffic.
Place extended ACLs close to the source IP address of the traffic.

110
Q

What command would be used as part of configuring NAT or PAT to display all static translations that have been configured?

show ip nat translations
show ip pat translations
show ip cache
show running-config

A

show ip nat translations

111
Q

A network administrator modified an OSPF-enabled router to have a hello timer setting of 20 seconds. What is the new dead interval time setting by default?

40 seconds
60 seconds
80 seconds
100 seconds

A

80 seconds

112
Q

Which type of VPN is the preferred choice for support and ease of deployment for remote access?

SSL VPN
GRE over IPsec
dynamic multipoint VPN
IPsec virtual tunnel interface

A

SSL VPN

113
Q

What type of traffic is described as predictable and smooth?

video
data
voice

A

voice

114
Q

Which queuing mechanism has no provision for prioritizing or buffering but simply forwards packets in the order they arrive?

FIFO
LLQ
CBWFQ
WFQ

A

FIFO

115
Q

A network administrator is troubleshooting an OSPF problem that involves neighbor adjacency. What should the administrator do?

Make sure that the router priority is unique on each router.
Make sure that the DR/BDR election is complete.
Make sure that the router ID is included in the hello packet.
Make sure that the hello and dead interval timers are the same on all routers.

A

Make sure that the hello and dead interval timers are the same on all routers.

116
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 100 permit tcp 192.168.10.0 0.0.0.255 172.17.200.0 0.0.0.255 eq www .
If a packet with a source address of 192.168.10.244, a destination address of 172.17.200.56, and a protocol of 80 is received on the interface, is the packet permitted or denied?

A

permitted

117
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?

to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to detect any evidence of a hack or malware in a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to probe network devices, servers, and hosts for open TCP or UDP ports

A

to probe network devices, servers, and hosts for open TCP or UDP ports

118
Q

What command would be used as part of configuring NAT or PAT to display any dynamic PAT translations that have been created by traffic?

show ip pat translations
show ip cache
show running-config
show ip nat translations

A

show ip nat translations

119
Q

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.16.91.0 255.255.255.192. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.31.255
  2. 0.0.63
  3. 0.15.255
  4. 0.7.255
A

0.0.0.63

120
Q

What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?

video
data
voice

A

video

121
Q

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)

Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 172.16.0.0 255.255.255.255
Router(config)# access-list 95 deny any

A

Router(config)# access-list 95 permit any

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255

122
Q

What protocol uses smaller stratum numbers to indicate that the server is closer to the authorized time source than larger stratum numbers?

TFTP
SYSLOG
NTP
MPLS

A

NTP

123
Q

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?

video
voice
data

A

video

124
Q

What type of traffic is described as consisting of traffic that requires a higher priority if interactive?

voice
data
video

A

data

125
Q

Which type of VPN provides a flexible option to connect a central site with branch sites?

IPsec virtual tunnel interface
MPLS VPN
dynamic multipoint VPN
GRE over IPsec

A

dynamic multipoint VPN

126
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use fuzzers?

to discover security vulnerabilities of a computer
to detect any evidence of a hack or malware in a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network

A

to discover security vulnerabilities of a computer

127
Q

Two OSPF-enabled routers are connected over a point-to-point link. During the ExStart state, which router will be chosen as the first one to send DBD packets?

the router with the highest router ID
the router with the lowest IP address on the connecting interface
the router with the highest IP address on the connecting interface
the router with the lowest router ID

A

the router with the highest router ID

128
Q

Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?

exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies

A

establishing neighbor adjacencies

129
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?

to obtain specially designed operating systems preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a computer or network
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware

A

to detect any evidence of a hack or malware in a computer or network

130
Q

ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?

dedicated servers
software defined networking
virtualization
Cisco ACI

A

virtualization

131
Q

A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)

show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
A

show ip ospf neighbor

show ip ospf interface

132
Q

Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers?

MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

MPLS VPN

133
Q

Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?

SSL VPN
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface

A

GRE over IPsec

134
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems?

to detect any evidence of a hack or malware in a computer or network
to obtain specially designed operating systems preloaded with tools optimized for hacking
to encode data, using algorithm schemes, to prevent unauthorized access to the encrypted data
to reverse engineer binary files when writing exploits and when analyzing malware

A

to obtain specially designed operating systems preloaded with tools optimized for hacking

135
Q

What command would be used as part of configuring NAT or PAT to identify an interface as part of the external global network?

ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside

A

ip nat outside

136
Q

To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

data center
cloud services
virtualization
dedicated servers

A

virtualization

137
Q

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec

A

IPsec virtual tunnel interface

138
Q

Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link?

building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default routeWhat type of traffic is described as using either TCP or UDP depending on the need for error recovery?

video
voice
data

A

exchanging link-state advertisements

139
Q

What type of traffic is described as using either TCP or UDP depending on the need for error recovery?

video
voice
data

A

data

140
Q

What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?

ip nat inside source static 172.19.89.13 198.133.219.65
ip nat inside source list 24 interface serial 0/1/0 overload
ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240
ip nat outside

A

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

141
Q

What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?

data link
access
core
network
network access
A

core

142
Q

An ACL is applied inbound on router interface. The ACL consists of a single entry:

access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp
If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?

A

permitted

143
Q

What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?

video
data
voice

A

data

144
Q

Which OSPF table is identical on all converged routers within the same OSPF area?

routing
neighbor
adjacency
topology

A

topology

145
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www .

If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?

A

permitted

146
Q

What protocol allows the manager to poll agents to access information from the agent MIB?

CBWFQ
SYSLOG
TFTP
SNMP

A

SNMP

147
Q

What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?

voice
video
data

A

voice

148
Q

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

policing
traffic marking
weighted random early detection (WRED)
traffic shaping
tail drop
A

traffic marking

149
Q

Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)

cost of the link
amount of traffic
distance between sites
reliability
security needs
type of traffic
A

amount of traffic
security needs
type of traffic

150
Q

What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?
ip nat inside source list ACCTNG pool POOL-STAT
ip nat translation timeout 36000
ip nat inside source list 14 pool POOL-STAT overload
ip nat inside source static 172.19.89.13 198.133.219.65

A

ip nat inside source list 14 pool POOL-STAT overload

151
Q

What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets?

SNMP
MPLS
LLDP
NTP

A

LLDP

152
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .

If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?

A

denied

153
Q

A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process?

show cdp neighbors
show ip interface brief
show interface g0/5
show cdp

A

show interface g0/5

154
Q

Which virtual resource would be installed on a network server to provide direct access to hardware resources?

VMware Fusion
a management console
a dedicated VLAN
a Type 1 hypervisor

A

a Type 1 hypervisor

155
Q

Which OSPF database is identical on all converged routers within the same OSPF area?

neighbor
forwarding
link-state
adjacency

A

link-state

156
Q

What are two features to consider when creating a named ACL? (Choose two.)

Use alphanumeric characters if needed.
Use special characters, such as ! or * to show the importance of the ACL.
Modify the ACL using a text editor.
Be descriptive when creating the ACL name.
Use a space for ease of reading to separate the name from the description

A

Use alphanumeric characters if needed.

Be descriptive when creating the ACL name

157
Q

What type of traffic is described as requiring at least 384 Kbps of bandwidth?

voice
data
video

A

video

158
Q

Which step in the link-state routing process is described by a router inserting best paths into the routing table?

declaring a neighbor to be inaccessible
executing the SPF algorithm
load balancing equal-cost paths
choosing the best route

A

choosing the best route

159
Q

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement?

data center
virtualization
cloud services
dedicated servers

A

cloud services

160
Q

Which QoS technique smooths packet output rate?

policing
shaping
weighted random early detection
Integrated Services (IntServ)
marking
A

shaping

161
Q

A network technician is configuring SNMPv3 and has set a security level of SNMPv3 authPriv. What is a feature of using this level?

authenticates a packet by using the SHA algorithm only
authenticates a packet by a string match of the username or community string
authenticates a packet by using either the HMAC with MD5 method or the SHA method
authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and a username

A

authenticates a packet by using either the HMAC with MD5 method or the SHA method