Q:121-140 Flashcards

1
Q
  1. Which group of APIs are used by an SDN controller to communicate with various applications?

eastbound APIs
westbound APIs
northbound APIs
southbound APIs

A

northbound APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement?

Cisco ACI
software defined networking
Type-1 hypervisor
APIC-EM

A

Type-1 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?

ip nat inside source list 24 interface serial 0/1/0 overload
ip nat inside source list 14 pool POOL-STAT overload
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside source list ACCTNG pool POOL-STAT

A

access-list 10 permit 172.19.89.0 0.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement?

-Cloud services
Data center
APIC-EM
Cisco ACI

A

-Cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router command line. After removing the USB drive and connecting it to a PC, the administrator discovers that the running configuration was not properly backed up to the R1-config file. What is the problem?

The file already exists on the USB drive and cannot be overwritten.
The drive was not properly formatted with the FAT16 file system.
There is no space left on the USB drive.
The USB drive is not recognized by the router.
The command that the administrator used was incorrect.

A

The command that the administrator used was incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.)
Layer 3 MPLS VPN
IPsec VPN
Cisco Dynamic Multipoint VPN
GRE over IPsec VPN
clientless SSL VPN
client-based IPsec VPN
A

IPsec VPN
Cisco Dynamic Multipoint VPN
GRE over IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive information and are not allowed access off their network. What is the best ACL type and placement to use in this situation?

standard ACL inbound on R1 vty lines
extended ACL inbound on R1 G0/0
standard ACL inbound on R1 G0/1
extended ACL inbound on R3 S0/0/1

A

standard ACL inbound on R1 G0/1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

It can be viewed by using the show ip ospf database command.
A neighbor table is created based on the LSDB.
It contains a list of only the best routes to a particular network.
It contains a list of all neighbor routers to which a router has established bidirectional communication.
All routers within an area have an identical link-state database.

A

It can be viewed by using the show ip ospf database command.

All routers within an area have an identical link-state database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. In an OSPF network which OSPF structure is used to create the neighbor table on a router?

adjacency database
link-state database
routing table
forwarding database

A

adjacency database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What protocol is used in a system that consists of three elements–a manager, agents, and an information database?

MPLS
SYSLOG
SNMP
TFTP

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What type of traffic is described as not resilient to loss?

data
video
voice

A

video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the Internet. What is a possible reason for this lack of connectivity?

Interface Fa0/0 should be configured with the command ip nat outside .
The inside global address is incorrect.
The router NAT configuration has an incorrect inside local address.
The NAT configuration on interface S0/0/1 is incorrect.

A

The router NAT configuration has an incorrect inside local address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

open
partner
public
private

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Refer to the exhibit. Which data format is used to represent the data for network automation applications?

XML
HTML
YAML
JSON

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet .
If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?

denied
permitted

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?
    CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 31
  2. 0.0.1
  3. 1.0.1
  4. 168.1.100
  5. 165.201.1
A

192.168.1.100

17
Q
  1. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

NTP
LLDP
SNMP
MPLS

A

LLDP

18
Q
  1. Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?

MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

dynamic multipoint VPN

19
Q
  1. What is a characteristic of the REST API?

evolved into what became SOAP
used for exchanging XML structured information over HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services

A

most widely used API for web services