Test Questions Flashcards
Which Staetment correctly compares traditional networks and controller-based networks?
A. Only traditional networks offer a centralized control plane
B. Only traditional networks natively support centralized management
C. Traditional and controller-based networks abstract policies from device configurations
D. Only controller-based networks decouple the control plane and the data plane.
D. Only controller-based networks decouple the control plane and the data plane.
Most raditional devices use a distributed architecture, in which each control plane is resided in a networking device. Therefore they need to communicate with each other via messages to work correctly.
In contrast to distributed architecture, centralized (or controller-based) architectures centralizes the control of networking devices into one device, called SDN controller.
How does HSRP provide first hop redundancy?
A. It load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table.
B. It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.
C. It forwards multiple packets to the same destination over different routed links in the data path.
D. It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN.
D. It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN.
Which two actions influence the EIGRP route selection process? (Choose two)
A. The router calculates the reported distance by multiplying the delay on the exiting interface by 256.
B. The router calculates the best backup path to the destination route and assigns it as the feasible successor.
C. The router calculates the feasible distance of all paths to the destination route.
D. The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link.
E. The router must use the advertised distance as the metric for any given route.
B and C.
B. The router calculates the best backup path to the destination route and assigns it as the feasible successor.
C. The router calculates the feasible distance of all paths to the destination route.
The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is calculated from the router advertising the route to the network.
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
A. Adapters that support all families of Cisco IOS software.
B. SDKs that support interaction with third-party network equipment.
C. Customized versions for small, medium, and large enterprises.
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center.
E. Modular design that is upgradable as needed.
B and D.
B. SDKs that support interaction with third-party network equipment.
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center.
Cisco DNA Center offers extensibility through four capabilities:
1) Intent-based APIs
2) Process adapters built on integration APIs
3) Domain adapters (more integration APIs)
4) SDKs.
Refer to the exhibit. What does router R1 use as its OSPF router-ID?
show ip interface brief
Interface / IP-Address / Method / Status / Protocol
Fa0/0 / unassigned / NVRAM / admin down / down
Gi1/0 / 192.168.10.1 / NVRAM / up / up
Gi2/0 / 10.10.1.10 / manual / up / up
Gi3/0 / 10.10.10.20 / manual / up / up
Gi4/0 / unassigned / NVRAM / admin down / down
Loopback0 / 172.16.15.10 / manual
A. 10.10.1.10
B. 10.10.10.20
C. 172.16.15.10
D. 192.168.0.1
C. 172.16.15.10
OSPF uses the following criteria to select the router ID:
- Manual configuration of the router ID (via the “router-id x.x.x.x command under OSPF router configuration mode)
- Highest IP address on a loopback interface.
- Highest IP address on a non-loopback and active (no shutdown) interface.
Which 802.11 frame type is association response? A. management B. protected frame C. control D. action
A. management.
There are three main types of 802.11 frames: the Data Frame, the Managemnt Frame, and the Control Frame. Association Response belongs to the Managemnt Frame. Association response is sent in response to an association request.
Which API is used in controller-based architectures to interact with edge devices? A. overlay B. northbound C. underlay D. southbound
D. southbound
Which staetment identifies the functionality of virtual machines?
A. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.
B. The hypervisor can virtualize physical components including CPU, memory, and storage.
C. Each hypervisor can support a single virtual machine and asingle software switch.
D. The hypervisor communicates on Layer 3 without the need for additional resources.
B. The hypervisor can virtualize physical components including CPU, memory, and storage.
Which type of address is the public IP address of a NAT device? A. outside global B. outside local C. inside global D. inside local E. outside public F. inside public
C. inside global.
NAT uses four types of addresses:
Inside Local - The IP address assigned to a host on the inside network, and likely a private address.
Inside Global - A public IP address that represents one-or-more inside local IP addresses to the outside world.
Outside Local - The IP address of an outside hostas it is known to the hosts on the inside network.
Outside Global - IP address assigned to the host on the outside network. The owner of the host assigns this address.
Which option about JSON is true?
A. uses predefined tags or angle brackets to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML.
B. used to describe structured data that includes arrays.
JSON data is written as name/value pairs. A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value - "name":"Mark" and set up an array of type string, number, object, array, boolean, or null. { "name":John", "age":30, "cars":["Ford", "BMW", F"Fiat"] }
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols? A. dual algorithm B. metric C. administrative distance D. hop count
C. administrative distance
Administrative distance is the feature used by routers to select the best path when there are two or more different routes to the same destination from different routing protocols. Administrative distance defines the reliability of a routing protocol.
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
A. management interface settings
B. QoS settings
C. IP address of one or more access points.
D. SSID
E. Profile Name
D and E.
D. SSID
E. Profile name
What are two benefits of network automation? (Choose two)
A. reduced operational costs
B. reduced hardware footprint
C. Faster changes with more reliable results
D. Fewer network failures
E. Increased network security
A and C.
A. reduced operational costs
B. faster changes with more reliable results
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch? A. enable secret B. service password-encryption C. username Cisco password encrypt D. enable password
B. Service password-encryption
Categorize the following into Ansible, Chef, or Puppet:
- uses Ruby for fundamental configuration elements
- uses TCP port 10002 for configuration push jobs
- uses SSH for remote device communication
- fundamental configuration elements are stored in a manifest
- uses TCP 8140 for communication
- uses YAML for fundamental congratulation elements
Ansible
- uses SSH for remote device communication
- uses YAML for fundamental congratulation elements
Chef
- uses Ruby for fundamental configuration elements
- uses TCP port 10002 for configuration push jobs
Puppet
- fundamental configuration elements are stored in a manifest
- uses TCP 8140 for communication
The focus of Ansible is to be streamlined and fast, and to require no node agent installation. Thus, Ansible performs all functions over ssh. Ansible is built on Python, in contrast to the Ruby foundation of Puppet and Chef.
TCP port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file. This port allows Chef Push Jobs clients to communicate with the Chef Push Jobs server.
Puppet is an open-source configuration managemnet solution, which is built with Ruby and offers custom Domain Specific Language (DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a declerative-paradigm programming approach.
A Puppet piece of code is called a manifest, and is a file with a .pp extension.
Categorize the descriptions of file-transfer protocols between FTP and TFTP:
- does not require user authentication
- uses UDP
- uses TCP
- uses ports 20 and 21
- provides reliability when loading an IOS image upon boot up
- uses port 69
FTP
-uses TCP
uses ports 20 and 21
-provides reliability when loading and IOS image upon boot up
TFTP
- does not require user authentication
- uses UDP
- uses port 69
Drag and drop WLAN components:
1 - dynamic interface
2 - access port
3 - service port
4 - virtual interface
5 - wireless LAN controller
A - device that provides Wi-Fi devices with a connection to a wired network
B - device that manages access points
C - used to support mobility management of the WLC
D - applied to the WLAN for wireless client communication
E - used for out of band managemnt of a WLC
1D - dynamic interface / applied to the WLAN for wireless client communication
2A - access port / device that provides Wi-Fi devices with a connection to a wired network
3E - service port / used for out of band management of a WLC
4C - virtual interface / used to support mobility management of the WLC.
5B - wireless LAN controller / device that can manage access points
The service port can be used for managemnet purposes, primarily for out-of-band managemen. However, AP managemnt traffic is not possible across the service port. In most cases, the service port is used as a last resort means of accessing the controller GUI for management purposes.
A dynamic interface with the Dynamic AP Management option enabled is used as the tunnel source for packets from the controller to the access point and as the destination for CAPWAP packets from the access point to the controller
The virtual interface is used to support mobility management, DHCP relay, and Layer 3 security such as guest web authentication. It also maintains the DNS gateway host name used by Layer 3 security and mobility managers to verify the source of certificates when enabled.
Match the threat mitigation with the threat: 1 - Configure VACL 2 - Configure dynamic ARP Inspection 3 - Configure BPDU guard 4 - Configure root guard A - 802.1q double tagging B - ARP spoofing C - unwanted superior BPDUs D - unwanted BPDUs on PortFast-enabled interfaces
1A - VACL / 802.1q double tagging
2B - dynamic ARP inspection . ARP spoofing
3D - BPDU guard / unwanted BPDUs on PortFast-enabled interfaces
4C - root guard / unwanted superior BPDUs
VACL’s are VLAN ACLs.
Match the function with either DHCP Server or DNS Server:
1 - holds the TCP/IP settings to be distributed to the clients
2 - resolves web URLs to IP addresses
3 - stores a list of IP addresses mapped to names
4 - Assigns IP addresses to enabled clients
DHCP
- holds the TCP/IP settings to be distributed to the clients
- assigns a default gateway to a client
- assigns IP addresses to enabled clients
DNS
- resolves web URLs to IP addresses
- stores a list of IP addresses mapped to names
Match the AAA functions with the AAA services Authentication, Authorization, and Accounting:
- records user activities
- restricts the services that are available to a user
- identifies the user
- controls the actions that a user can perform
- provides analytical information for the network administratot
- verifies the password associated with a user
Authentication
- identifies the user
- verifies the password associated with auser
Authorization
- restrics the services that are available to a user
- controls the actions that a user can perform
Accounting
- records user activities
- provides analytical information for the network administrator
Match the network subnets to the correct usable host ranges: 1 - 172.28.228.144/18 2 - 172.28.228.144/21 3 - 172.28.228.144/23 4 - 172.28.228.144/25 5 - 172.28.228.144/29 A - .228.1 - .229.254 B - .224.1 - .231.254 C - .228.129 - .228.254 D - .192.1 - .255.254
.228.1 - .229.254 /23 .224.1 - .231.254 /21 .228.129 - .228.254 /25 .228.145 - .228.150 /29 .192.1 - .255.254 /18
Categorize the Cisco Wireless LAN Controller security settings as Layer 2 or Layer 3:
- web policy
- passthrough
- WPA+WPA2
- 802.1X
Layer 2
- WPA+WPA2
- 802.1X
Layer 3
- web policy
- passthrough
Layer 2 includes WPA+WPA2, 802.1X, Staic WEP, CKIP.
Layer 3 includes IPSec, VPN Passthrough, and web passthrough.
What is the benefit of using a Cisco Wireless LAN Controller?
A - Central AP management requires more complex configurations
B - Unique SSIDs cannot use the same authentication method
C - It supports autonomous and lightweight APs
D - It eliminates the need to configure each access point individually
D - It eliminates the need to configure each access point individually.
Which network allows devices to communicate without the need to access the Internet? A - 1729.0.0/16 B - 172.28.0.0/16 C - 192.0.0.0/8 D - 209.165.201.0/24
B - 172.28.0.0/16
Class B private IP ranges from 172.16 - 172.31