Q:101-120 Flashcards

1
Q
  1. What protocol synchronizes with a private master clock or with a publicly available server on the internet?

MPLS
CBWFQ
TFTP
NTP

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec

A

dynamic multipoint VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?

router(config-router)# network 10.1.0.0 0.0.255.255 area 0
router(config-router)# network 10.1.0.0 0.0.15.255 area 0
router(config-router)# network 10.1.0.0 255.255.255.0 area 0
router(config-router)# network 10.1.0.0 0.0.0.0 area 0

A

router(config-router)# network 10.1.0.0 0.0.255.255 area 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?

router ospf 1
network 192.168.10.0 area 0

router ospf 1
network 192.168.10.0

router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252

router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0

A

router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?
  2. 0.7.255
  3. 0.1.255
  4. 0.3.255
  5. 0.15.255
A

0.0.1.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. How does virtualization help with disaster recovery within a data center?

improvement of business practices
supply of consistent air flow
support of live migration
guarantee of power

A

support of live migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How does virtualization help with disaster recovery within a data center?
Case 2:
Less energy is consumed.
Server provisioning is faster.
Hardware at the recovery site does not have to be identical to production equipment.
Power is always provided.
A

Hardware at the recovery site does not have to be identical to production equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. How does virtualization help with disaster recovery within a data center?
Hardware does not have to be identical.
(Other case) Hardware at the recovery site does not have to be identical to production equipment.
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
A

Hardware does not have to be identical.

(Other case) Hardware at the recovery site does not have to be identical to production equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?
S4 and PC_2
PC_3 and AP_2
AP_2 and AP_1
PC_3 and PC_2
S1 and S4
A

PC_3 and AP_2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23

access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet​​

A

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

5 deny 172.23.16.0 0.0.15.255
5 deny 172.23.16.0 0.0.255.255
15 deny 172.23.16.0 0.0.15.255
30 deny 172.23.16.0 0.0.15.255

A

5 deny 172.23.16.0 0.0.15.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

executing the SPF algorithm
building the topology table
selecting the router ID
declaring a neighbor to be inaccessible

A

building the topology table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What protocol uses agents, that reside on managed devices, to collect and store information about the device and its operation?

SYSLOG
TFTP
CBWFQ
SNMP

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 10.27.27.0 255.255.255.0. What wildcard mask would the administrator use in the OSPF network statement?
  2. 0.0.63
  3. 0.0.255
  4. 0.0.31
  5. 0.0.15
A

0.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. When will an OSPF-enabled router transition from the Down state to the Init state?

when an OSPF-enabled interface becomes active
as soon as the router starts
when the router receives a hello packet from a neighbor router
as soon as the DR/BDR election process is complete

A

when the router receives a hello packet from a neighbor router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What type of traffic is described as having a high volume of data per packet?

data
video
voice

A

video

17
Q
  1. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

LLDP
NTP
TFTP
SNMP

A

LLDP

18
Q
  1. Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?

building the topology table
selecting the router ID
declaring a neighbor to be inaccessible
executing the SPF algorithm

A

executing the SPF algorithm

19
Q
  1. Refer to the exhibit. Which conclusion can be drawn from this OSPF multiaccess network?

If the DR stops producing Hello packets, a BDR will be elected, and then it promotes itself to assume the role of DR.​
With an election of the DR, the number of adjacencies is reduced from 6 to 3.
​When a DR is elected all other non-DR routers become DROTHER.
​All DROTHER routers will send LSAs to the DR and BDR to multicast 224.0.0.5.

A

With an election of the DR, the number of adjacencies is reduced from 6 to 3.

20
Q
  1. Refer to the exhibit. The network administrator has an IP address of 192.168.11.10 and needs access to manage R1. What is the best ACL type and placement to use in this situation?

extended ACL outbound on R2 WAN interface towards the internet
standard ACL inbound on R1 vty lines
extended ACLs inbound on R1 G0/0 and G0/1
extended ACL outbound on R2 S0/0/1

A

standard ACL inbound on R1 vty lines

21
Q
  1. Which type of VPN connects using the Transport Layer Security (TLS) feature?

SSL VPN
IPsec virtual tunnel interface
GRE over IPsec
dynamic multipoint VPN

A

SSL VPN