Q:141-161 Flashcards
- A student, doing a summer semester of study overseas, has taken hundreds of pictures on a smartphone and wants to back them up in case of loss. What service or technology would support this requirement?
Cisco ACI
cloud services
software defined networking
dedicated servers
cloud services
- Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server:
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
- Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place standard ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the source IP address of the traffic.
Place extended ACLs close to the destination IP address of the traffic.
Place extended ACLs close to the source IP address of the traffic.
For every inbound ACL placed on an interface, there should be a matching outbound ACL.
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place standard ACLs close to the destination IP address of the traffic.
Place extended ACLs close to the source IP address of the traffic.
- Match the term to the web link http://www.buycarsfromus.com/2020models/ford/suv.html#Escape component. (Not all options are used.)
Http —-> Protocol buycarsfromus.com/2020models/ford/suv.html#Escape —-> URN http://www.buycarsfromus.com/2020models/ford/suv.html —-> URL http://www.buycarsfromus.com/2020models/ford/suv.html#Escape —-> URI #Escape —- Fragment
Http —-> Protocol buycarsfromus.com/2020models/ford/suv.html#Escape —-> URN http://www.buycarsfromus.com/2020models/ford/suv.html —-> URL http://www.buycarsfromus.com/2020models/ford/suv.html#Escape —-> URI #Escape —- Fragment
- What command would be used as part of configuring NAT or PAT to display all static translations that have been configured?
show ip nat translations
show ip pat translations
show ip cache
show running-config
show ip nat translations
- A network administrator modified an OSPF-enabled router to have a hello timer setting of 20 seconds. What is the new dead interval time setting by default?
40 seconds
60 seconds
80 seconds
100 seconds
80 seconds
- Which type of VPN is the preferred choice for support and ease of deployment for remote access?
SSL VPN
GRE over IPsec
dynamic multipoint VPN
IPsec virtual tunnel interface
SSL VPN
- What type of traffic is described as predictable and smooth?
video
data
voice
voice
- Which queuing mechanism has no provision for prioritizing or buffering but simply forwards packets in the order they arrive?
FIFO
LLQ
CBWFQ
WFQ
FIFO
- Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers. The routers are unable to form a neighbor adjacency. What should be done to fix the problem on router R2?
Implement the command no passive-interface Serial0/1.
Implement the command network 192.168.2.6 0.0.0.0 area 0 on router R2.
Change the router-id of router R2 to 2.2.2.2.
Implement the command network 192.168.3.1 0.0.0.0 area 0 on router R2.
Implement the command no passive-interface Serial0/1.
- A network administrator is troubleshooting an OSPF problem that involves neighbor adjacency. What should the administrator do?
Make sure that the router priority is unique on each router.
Make sure that the DR/BDR election is complete.
Make sure that the router ID is included in the hello packet.
Make sure that the hello and dead interval timers are the same on all routers.
Make sure that the hello and dead interval timers are the same on all routers.
- Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation?
standard ACL inbound on R2 WAN interface connecting to the internet
standard ACL outbound on R2 WAN interface towards the internet
standard ACL inbound on R1 G0/0
standard ACL outbound on R1 G0/0
standard ACL outbound on R2 WAN interface towards the internet
- An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 100 permit tcp 192.168.10.0 0.0.0.255 172.17.200.0 0.0.0.255 eq www .
If a packet with a source address of 192.168.10.244, a destination address of 172.17.200.56, and a protocol of 80 is received on the interface, is the packet permitted or denied?
denied
permitted
permitted
- A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to detect any evidence of a hack or malware in a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to probe network devices, servers, and hosts for open TCP or UDP ports
to probe network devices, servers, and hosts for open TCP or UDP ports
- What command would be used as part of configuring NAT or PAT to display any dynamic PAT translations that have been created by traffic?
show ip pat translations
show ip cache
show running-config
show ip nat translations
show ip nat translations