Q:21-40 Flashcards

1
Q
  1. Refer to the exhibit. Which address or addresses represent the inside global address?

192.168.0.100
10.1.1.2
any address in the 10.1.1.0 network
209.165.20.25

A

209.165.20.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which two IPsec protocols are used to provide data integrity?
MD5
DH
AES
SHA
RSA
A

MD5

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

The Cisco AnyConnect client is installed by default on most major operating systems.

The host initiates a clientless VPN connection using a compliant web browser to download the client.

The host initiates a clientless connection to a TFTP server to download the client.

The host initiates a clientless connection to an FTP server to download the client.

A

The host initiates a clientless VPN connection using a compliant web browser to download the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)
leased line
cable
digital subscriber line
Ethernet WAN
municipal Wi-Fi
A

leased line

Ethernet WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which type of QoS marking is applied to Ethernet frames?

IP precedence
DSCP
ToS
CoS

A

CoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

Both routers are configured to use NTPv2.

Router R1 is the master, and R2 is the client

The IP address of R2 is 192 168.1.2.

Router R2 is the master, and R1 is the client

The IP address of R1 is 192.168.1.2

A

Router R1 is the master, and R2 is the client

The IP address of R1 is 192.168.1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)

R1(config)# interface s0/0/0
R1(config-if)# ip access-group 105 out
R2(config)# interface gi0/0
R2(config-if)# ip access-group 105 in

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www
access-list 105 deny ip any host 10.0.54.5
access-list 105 permit ip any any

access-list 105 permit ip host 10.0.70.23 host 10.0.54.5
access-list 105 permit tcp any host 10.0.54.5 eq www
access-list 105 permit ip any any

R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

access-list 105 permit tcp host 10.0.54.5 any eq www
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21

A

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www
access-list 105 deny ip any host 10.0.54.5
access-list 105 permit ip any any

R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

inbound on the R2 G0/0 interface
outbound on the R1 G0/1 interface
inbound on the R1 G0/1 interface
outbound on the R2 S0/0/1 interface

A

outbound on the R1 G0/1 interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which is a characteristic of a Type 2 hypervisor?

does not require management console software
has direct access to server hardware resources
best suited for enterprise environments
installs directly on hardware

A

does not require management console software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What are the two types of VPN connections? (Choose two.)
PPPoE
Frame Relay
site-to-site
remote access
leased line
A

site-to-site

remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Refer to the exhibit. What three conclusions can be drawn from the displayed output? (Choose three.)

The DR can be reached through the GigabitEthernet 0/0 interface.

There have been 9 seconds since the last hello packet sent.

This interface is using the default priority.

The router ID values were not the criteria used to select the DR and the BDR.

The router ID on the DR router is 3.3.3.3

The BDR has three neighbors.

A

The DR can be reached through the GigabitEthernet 0/0 interface.

There have been 9 seconds since the last hello packet sent.

The router ID values were not the criteria used to select the DR and the BDR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?

The enable secret password is not configured on R1.
The IT group network is included in the deny statement.
The permit ACE specifies a wrong port number.
The permit ACE should specify protocol ip instead of tcp.
The login command has not been entered for vty lines.

A

The IT group network is included in the deny statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What functionality does mGRE provide to the DMVPN technology?

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.

It provides secure transport of private information over public networks, such as the Internet.

It is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

It creates a distributed mapping database of public IP addresses for all VPN tunnel spokes.

A

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?

the FIB
the routing table
the ARP table
the DSP

A

the ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?

show running-config
show ip nat statistics
show ip cache
show version

A

show ip nat statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is a purpose of establishing a network baseline?

It provides a statistical average for network performance.
It creates a point of reference for future network evaluations.
It manages the performance of network devices.
It checks the security configuration of network devices.

A

It creates a point of reference for future network evaluations.

17
Q
  1. Match the type of WAN device or service to the description. (Not all options are used.)

CPE
DCE
DTE
Local Loop

A

CPE —> devices and inside wiring that are located on the enterprise edge and connect to a carrier link
DCE —> devices that provide an interface for customers to connect to within the WAN cloud
DTE —> customer devices that pass the data from a customer network for transmission over the WAN
local loop —> a physical connection from the customer to the service provider POP

18
Q
  1. Which statement describes a characteristic of standard IPv4 ACLs?

They filter traffic based on source IP addresses only.
They can be created with a number but not with a name.
They are configured in the interface configuration mode.
They can be configured to filter traffic based on both source IP addresses and source ports.

A

They filter traffic based on source IP addresses only.

19
Q
  1. Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

NAT-POOL2 is not bound to ACL 1.
Interface Fa0/0 should be identified as an outside NAT interface.
The NAT pool is incorrect.
Access-list 1 is misconfigured.

A

NAT-POOL2 is not bound to ACL 1.

20
Q
  1. Refer to the exhibit. What method can be used to enable an OSPF router to advertise a default route to neighboring OSPF routers?

Use a static route pointing to the ISP and redistribute it.
Use the redistribute static command on R0-A.
Use the default-information originate command on ISP.
Use the default-information originate command on R0-A.

A

Use the default-information originate command on R0-A.