Q:61-90 Flashcards
- Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
MD5
AES
IPsec
ESP
IPsec
- Which statement describes a characteristic of Cisco Catalyst 2960 switches?
They are best used as distribution layer switches.
New Cisco Catalyst 2960-C switches support PoE pass-through.
They are modular switches.
They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.
New Cisco Catalyst 2960-C switches support PoE pass-through.
- Which component of the ACI architecture translates application policies into network programming?
the hypervisor
the Application Policy Infrastructure Controller
the Nexus 9000 switch
the Application Network Profile endpoints
the Application Policy Infrastructure Controller
- Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
device type cable specification interface identifier OS/IOS version connection type cable type and identifier
interface identifier
connection type
- Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.
The NAT pool has been exhausted.
- What are two benefits of using SNMP traps? (Choose two.)
They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.
They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
- Which statement accurately describes a characteristic of IPsec?
IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.
IPsec is a framework of open standards that relies on existing algorithms.
- In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
connect users to the network provide a high-speed network backbone connect remote networks provide Power over Ethernet to devices provide data traffic security
connect remote networks
provide data traffic security
- Which two statements describe the use of asymmetric algorithms? (Choose two.)
Public and private keys may be used interchangeably.
If a public key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
If a private key is used to encrypt the data, a private key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
- Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2
Trust Boundary 1
- What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
reduced costs decreased number of critical points of failure increased flexibility increased bandwidth availability increased network management options
reduced costs
increased Flexibility
- What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
to scan for accessibility
to retrieve and modify data
to gather information about the network and devices
to prevent other users from accessing the system
to escalate access privileges
to scan for accessibility
to gather information about the network and devices
- A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?
botnet
spyware
virus
rootkit
botnet
- An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .
If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?
permitted
denied
denied
- Refer to the exhibit. From which location did this router load the IOS?
flash memory NVRAM? RAM ROM a TFTP server?
flash memory