Q:181-200 Flashcards

1
Q
  1. To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

data center
cloud services
virtualization
dedicated servers

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec

A

IPsec virtual tunnel interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link?

building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route

A

exchanging link-state advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What type of traffic is described as using either TCP or UDP depending on the need for error recovery?

video
voice
data

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation?
    CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 42

extended ACL outbound on R2 WAN interface towards the internet
standard ACL outbound on R2 S0/0/0
extended ACL inbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting to the internet

A

extended ACL outbound on R2 WAN interface towards the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?

ip nat inside source static 172.19.89.13 198.133.219.65
ip nat inside source list 24 interface serial 0/1/0 overload
ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240
ip nat outside

A

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?
data link
access
core
network
network access
A

core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. An ACL is applied inbound on router interface. The ACL consists of a single entry:

access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp

If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted
denied

A

permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?

video
data
voice

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which OSPF table is identical on all converged routers within the same OSPF area?

routing
neighbor
adjacency
topology

A

topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:
    access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www .

If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?

permitted
denied

A

permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What protocol allows the manager to poll agents to access information from the agent MIB?

CBWFQ
SYSLOG
TFTP
SNMP

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?

voice
video
data

A

voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?
policing
traffic marking
weighted random early detection (WRED)
traffic shaping
tail drop
A

traffic marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)
cost of the link
amount of traffic
distance between sites
reliability
security needs
type of traffic
A

amount of traffic
security needs
type of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?
    ip nat inside source list ACCTNG pool POOL-STAT
    ip nat translation timeout 36000
    ip nat inside source list 14 pool POOL-STAT overload
    ip nat inside source static 172.19.89.13 198.133.219.65
A

ip nat inside source list 14 pool POOL-STAT overload

17
Q
  1. What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets?

SNMP
MPLS
LLDP
NTP

A

LLDP

18
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:
    access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .

If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted
denied

A

denied

19
Q
  1. Refer to the exhibit. Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation?

CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 45
Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation

extended ACL outbound on R2 S0/0/1
standard ACL outbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting to the internet
extended ACL inbound on R2 S0/0/0

A

extended ACL outbound on R2 S0/0/1