Q:61-90 Flashcards

1
Q
  1. Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

MD5
AES
IPsec
ESP

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which statement describes a characteristic of Cisco Catalyst 2960 switches?

They are best used as distribution layer switches.

New Cisco Catalyst 2960-C switches support PoE pass-through.

They are modular switches.

They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

A

New Cisco Catalyst 2960-C switches support PoE pass-through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which component of the ACI architecture translates application policies into network programming?

the hypervisor​
the Application Policy Infrastructure Controller
the Nexus 9000 switch
the Application Network Profile endpoints

A

the Application Policy Infrastructure Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
device type
cable specification
interface identifier
OS/IOS version
connection type
cable type and identifier
A

interface identifier

connection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?

The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.

A

The NAT pool has been exhausted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What are two benefits of using SNMP traps? (Choose two.)

They eliminate the need for some periodic polling requests.
They reduce the load on network and agent resources.
They limit access for management systems only.
They can provide statistics on TCP/IP packets that flow through Cisco devices.
They can passively listen for exported NetFlow datagrams.

A

They eliminate the need for some periodic polling requests.

They reduce the load on network and agent resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which statement accurately describes a characteristic of IPsec?

IPsec works at the application layer and protects all application data.
IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
IPsec works at the transport layer and protects data at the network layer.
IPsec is a framework of open standards that relies on existing algorithms.

A

IPsec is a framework of open standards that relies on existing algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
connect users to the network
provide a high-speed network backbone
connect remote networks
provide Power over Ethernet to devices
provide data traffic security
A

connect remote networks

provide data traffic security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which two statements describe the use of asymmetric algorithms? (Choose two.)

Public and private keys may be used interchangeably.
If a public key is used to encrypt the data, a public key must be used to decrypt the data.
If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.
If a private key is used to encrypt the data, a private key must be used to decrypt the data.

A

If a private key is used to encrypt the data, a public key must be used to decrypt the data.
If a public key is used to encrypt the data, a private key must be used to decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?

Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2

A

Trust Boundary 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options
A

reduced costs

increased Flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

to scan for accessibility
to retrieve and modify data
to gather information about the network and devices
to prevent other users from accessing the system
to escalate access privileges

A

to scan for accessibility

to gather information about the network and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

botnet
spyware
virus
rootkit

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .
If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

permitted
denied

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Refer to the exhibit. From which location did this router load the IOS?
flash memory
NVRAM?
RAM
ROM
a TFTP server?
A

flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Refer to the exhibit. Which data format is used to represent the data for network automation applications?

XML
YAML
HTML
JSON

A

JSON

17
Q
  1. What QoS step must occur before packets can be marked?

classifying
shaping
queuing
policing

A

classifying

18
Q
  1. What is the main function of a hypervisor?

It is used to create and manage multiple VM instances on a host machine.
It is a device that filters and checks security credentials.
It is a device that synchronizes a group of sensors.
It is software used to coordinate and prepare data for analysis.
It is used by ISPs to monitor cloud computing resources.

A

It is used to create and manage multiple VM instances on a host machine

19
Q
  1. A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?

Frame Relay
Ethernet WAN
VSAT
ISDN

A

Ethernet WAN

20
Q
  1. Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?

traffic shaping
weighted random early detection
classification and marking
traffic policing

A

traffic policing

21
Q
  1. An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns .
If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?

denied
permitted

A

denied

22
Q
  1. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses are allowed into the router
defines which addresses can be translated
defines which addresses are assigned to a NAT pool
defines which addresses are allowed out of the router

A

defines which addresses can be translated

23
Q
  1. If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
12
4
8
16
6
A

8

24
Q
  1. Refer to the exhibit. An administrator first configured an extended ACL as shown by the output of the show access-lists command. The administrator then edited this access-list by issuing the commands below.

Which two conclusions can be drawn from this new configuration?​ (Choose two.)

TFTP packets will be permitted.​
Ping packets will be permitted.
Telnet packets will be permitted.
SSH packets will be permitted.
All TCP and UDP packets will be denied
A

Ping packets will be permitted.

SSH packets will be permitted.

25
Q
  1. Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?

a less-structured approach based on an educated guess
an approach comparing working and nonworking components to spot significant differences
a structured approach starting with the physical layer and moving up through the layers of the OSI model until the cause of the problem is identified
an approach that starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified

A

a less-structured approach based on an educated guess

26
Q
  1. Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access. What is the best ACL type and placement to use in this situation?

extended ACL outbound on R2 WAN interface towards the internet
standard ACL outbound on R2 WAN interface towards the internet
standard ACL outbound on R2 S0/0/0
extended ACLs inbound on R1 G0/0 and G0/1

A

extended ACLs inbound on R1 G0/0 and G0/1

27
Q
  1. Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The administrator tries to ping a server on the Internet from PC-A and collects the debugs that are shown in the exhibit. Based on this output, what is most likely the cause of the problem?

The inside and outside NAT interlaces have been configured backwards
The inside global address is not on the same subnet as the ISP
The address on Fa0/0 should be 64.100.0.1.
The NAT source access list matches the wrong address range.

A

The inside global address is not on the same subnet as the ISP

28
Q
  1. Why is QoS an important issue in a converged network that combines voice, video, and data communications?

Data communications must be given the first priority.
Voice and video communications are more sensitive to latency.
Legacy equipment is unable to transmit voice and video without QoS.
Data communications are sensitive to jitter.

A

Voice and video communications are more sensitive to latency.

29
Q
  1. Which statement describes a VPN?

VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through the Internet.
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use virtual connections to create a private network through a public network.

A

VPNs use virtual connections to create a private network through a public network.

30
Q
  1. In which OSPF state is the DR/BDR election conducted?

ExStart
Init
Two-Way
Exchange

A

Two-Way