Q:161-180 Flashcards

1
Q
  1. Refer to the exhibit. If no router ID was manually configured, what would router Branch1 use as its OSPF router ID?
    CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 36
  2. 0.0.1
  3. 1.0.1
  4. 168.1.100
  5. 165.201.1
A

192.168.1.100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)

The web server at 192.168.0.10 is reachable from the source host.

DNS cannot resolve the IP address for the server web-s1.cisco.com.

A router is down between the source host and the server web-s1.cisco.com.

There is a problem with the web server software on web-s1.cisco.com.

The default gateway between the source host and the server at 192.168.0.10 is down.

A

The web server at 192.168.0.10 is reachable from the source host.

DNS cannot resolve the IP address for the server web-s1.cisco.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?

video
voice
datA

A

video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What type of traffic is described as consisting of traffic that requires a higher priority if interactive?

voice
data
video

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which type of VPN provides a flexible option to connect a central site with branch sites?

IPsec virtual tunnel interface
MPLS VPN
dynamic multipoint VPN
GRE over IPsec

A

dynamic multipoint VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use fuzzers?

to discover security vulnerabilities of a computer
to detect any evidence of a hack or malware in a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network

A

o discover security vulnerabilities of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface, but not the G0/0 interface. When following the best practices, in what location should the standard ACL be applied?
    CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 40
R1 S0/0/0 outbound
R2 G0/0 outbound
R2 S0/0/1 outbound
R1 S0/0/0 inbound
R2 G0/1 inbound
A

R2 G0/0 outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Two OSPF-enabled routers are connected over a point-to-point link. During the ExStart state, which router will be chosen as the first one to send DBD packets?

the router with the highest router ID
the router with the lowest IP address on the connecting interface
the router with the highest IP address on the connecting interface
the router with the lowest router ID

A

the router with the highest router ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?

exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies

A

establishing neighbor adjacencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?

to obtain specially designed operating systems preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a computer or network
to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
to reverse engineer binary files when writing exploits and when analyzing malware

A

to detect any evidence of a hack or malware in a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem?

CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 41

Interface Fa0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 is configured as a passive-interface on router R2.
Interface S0/0 is configured as a passive-interface on router R2.
Interface s0/0 has not been activated for OSPFv2 on router R2.

A

Interface Fa0/0 has not been activated for OSPFv2 on router R2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?

dedicated servers
software defined networking
virtualization
Cisco ACI

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)
show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
A

show ip ospf neighbor

show ip ospf interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers?

MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?

SSL VPN
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface

A

GRE over IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems?

to detect any evidence of a hack or malware in a computer or network
to obtain specially designed operating systems preloaded with tools optimized for hacking
to encode data, using algorithm schemes, to prevent unauthorized access to the encrypted data
to reverse engineer binary files when writing exploits and when analyzing malware

A

to obtain specially designed operating systems preloaded with tools optimized for hacking