Q:201-220 Flashcards

1
Q
  1. A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process?

show cdp neighbors
show ip interface brief
show interface g0/5
show cdp

A

show interface g0/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which virtual resource would be installed on a network server to provide direct access to hardware resources?

VMware Fusion
a management console
a dedicated VLAN
a Type 1 hypervisor

A

a Type 1 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface. When following the best practices, in what location should the standard ACL be applied?

Enterprise Networking, Security, and Automation ( Version 7.00) - ENSA Final Exam
Enterprise Networking, Security, and Automation ( Version 7.00) – ENSA Final Exam

R2 G0/1 inbound
R2 S0/0/1 outbound
R1 S0/0/0 outbound
R2 G0/1 outbound
R2 G0/0 outbound
A

R2 G0/1 outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which OSPF database is identical on all converged routers within the same OSPF area?

neighbor
forwarding
link-state
adjacency

A

link-state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What are two features to consider when creating a named ACL? (Choose two.)

Use alphanumeric characters if needed.
Use special characters, such as ! or * to show the importance of the ACL.
Modify the ACL using a text editor.
Be descriptive when creating the ACL name.
Use a space for ease of reading to separate the name from the description

A

Use alphanumeric characters if needed.

Be descriptive when creating the ACL name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What type of traffic is described as requiring at least 384 Kbps of bandwidth?

voice
data
video

A

video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which step in the link-state routing process is described by a router inserting best paths into the routing table?

declaring a neighbor to be inaccessible
executing the SPF algorithm
load balancing equal-cost paths
choosing the best route

A

choosing the best route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement?

data center
virtualization
cloud services
dedicated servers

A

cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which QoS technique smooths packet output rate?
policing
shaping
weighted random early detection
Integrated Services (IntServ)
marking
A

shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?
    CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 46

extended ACL inbound on R1 G0/0
extended ACL outbound on R2 WAN interface towards the internet
extended ACL outbound on R2 S0/0/1
extended ACLs inbound on R1 G0/0 and G0/1

A

extended ACL inbound on R1 G0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A network technician is configuring SNMPv3 and has set a security level of SNMPv3 authPriv. What is a feature of using this level?

authenticates a packet by using the SHA algorithm only
authenticates a packet by a string match of the username or community string
authenticates a packet by using either the HMAC with MD5 method or the SHA method
authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and a username

A

authenticates a packet by using either the HMAC with MD5 method or the SHA method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly