ENSA 10 Flashcards
Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?
exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies
establishing neighbor adjacencies
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?
to obtain specially designed operating systems preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a computer or network
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to detect any evidence of a hack or malware in a computer or network
Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem?
Interface Fa0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 is configured as a passive-interface on router R2.
Interface S0/0 is configured as a passive-interface on router R2.
Interface s0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 has not been activated for OSPFv2 on router R2.
ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?
dedicated servers
software defined networking
virtualization
Cisco ACI
virtualization
A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)
show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
show ip ospf neighbor
show ip ospf interface
Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems?
to detect any evidence of a hack or malware in a computer or network
to obtain specially designed operating systems preloaded with tools optimized for hacking
to encode data, using algorithm schemes, to prevent unauthorized access to the encrypted data
to reverse engineer binary files when writing exploits and when analyzing malware
to obtain specially designed operating systems preloaded with tools optimized for hacking
What command would be used as part of configuring NAT or PAT to identify an interface as part of the external global network?
ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside
ip nat outside
To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?
data center
cloud services
virtualization
dedicated servers
virtualization
Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface
Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link?
building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route
exchanging link-state advertisements
What type of traffic is described as using either TCP or UDP depending on the need for error recovery?
video
voice
data
data
Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation?
CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 44
extended ACL outbound on R2 WAN interface towards the internet
standard ACL outbound on R2 S0/0/0
extended ACL inbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting to the internet
extended ACL outbound on R2 WAN interface towards the internet
What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?
ip nat inside source static 172.19.89.13 198.133.219.65
ip nat inside source list 24 interface serial 0/1/0 overload
ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240
ip nat outside
ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240
What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?
data link
access
core
network
network access
core
An ACL is applied inbound on router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp
If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?
permitted
denied
permitted
What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?
video
data
voice
data
Which OSPF table is identical on all converged routers within the same OSPF area?
routing
neighbor
adjacency
topology
topology
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www .
If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?
permitted
denied
permitted
What protocol allows the manager to poll agents to access information from the agent MIB?
CBWFQ
SYSLOG
TFTP
SNMP
SNMP