Data Communications and Networking 4(PreQ1, Q2)(PreMP1, MP2)(PreXam)(MidQ1, Q2)(MXam, MLab)(MLabQ1, Q2)(FinQ1, Q2)(FinLQ1, Q2) Show
Question textThe Answer is considered to be the brains of the ACI architecture. Question textWhat is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture? Select one: a. The leaf switches always attach to the spines and they are interlinked through a trunk line. b. The spine and leaf switches are always linked through core switches. c. The leaf switches always attach to the spines, but they never attach to each other. d. The spine switches attach to the leaf switches and attach to each other for redundancy. Question textAnswer This is typically regarded as the brains of a device. Question textAnswer A purpose-built hardware solution for integrating cloud computing and data center management. Question textAn Answer is a collection of end-point groups (EPG), their connections, and the policies that define those connections. Question textWhich network traffic management technology is a basic element in SDN implementations?
Select one: a. OpenFlow b. OpenStack c. Interface to the Routing System d. IEEE 802.1aq Question textWhat is an example of an M2M
connection? Select one: a. a domestic refrigerator sending an email to homeowners to inform them that milk must be purchased b. a person getting information from a database, or conducting a complex analysis c. two people communicating with each other through an instant messaging application d. a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups Question textAnswer This type of SDN uses a centralized controller that has knowledge of all devices in the network.
Question textHow many "things" are predicted to be interconnected on the Internet by 2020? Select one: a. 5 million b. 1 billion c. 1 million d. 50 billion Question textCloud computing and virtualization are different
terms that refer to the same thing. Question textToday, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement. Question textSDN is a network architecture that has been developed to virtualize the network. Question textWhat is a characteristic of data
flow processing in SDN? Select one: a. The SDN controller routes a data flow first and the data plane will use policies to permit or deny the flow. b. OpenStack is used to construct the entry in switches to facilitate data forwarding. c. Each data flow through the network must be approved by the SDN controller first. d. The SDN controller attaches an entry to each packet to identify the flow. Question textWhich Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? Select one: a. ITaaS b. PaaS c. SaaS d. IaaS Question textWhich term describes the data exchanges between virtual servers in a data center? Select one: a. backbone
traffic b. vertical traffic c. east-west traffic d. north-south traffic Question textAnswer These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure. Question textThe IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected. Question textAnswer Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device. Question textWhat is Fog computing? Select one: a. It is a type of computing where services are
hosted where they are used, such as at the network edge or with end devices. b. It is a type of computing that enhances P2P applications. c. It is a type of computing that disperses servers and services globally in distributed data centers. d. It is a type of computing that sends controller data to a sensor. Question textThe LLQ feature brings strict priority queuing (PQ) to CBWFQ. Question textPackets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. Question textIntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows. Question textPackets are classified into different flows based on header information including the ToS value. Question textCBWFQ extends the standard
WFQ functionality to provide support for user-defined traffic classes. Question textNetwork traffic can be marked at both Layer 2 and Layer 3 for QoS.. Question textUnder which condition does congestion occur on a converged network with voice, video, and data traffic? Select one: a. if the request for bandwidth exceeds the amount of
bandwidth available b. if a user downloads a file that exceeds the file limitation that is set on the server c. if video traffic requests more bandwidth than voice traffic requests d. if voice traffic latency begins to decrease across the network Question textWhat happens when the memory queue of a device fills up and new network traffic is received? Select one: a. The network device sends the received traffic immediately. b. The network device queues the received traffic while sending previously received traffic. c. The network device drops all
traffic in the queue. d. he network device will drop the arriving packets. Question textWhat does the FIFO queuing stands for? Answer Question textThe LLQ feature brings strict priority queuing (PQ) to CBWFQ. Question textCBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes. Question textThe Answer QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks. Question textWhich statement describes the QoS classification and marking tools? Select one: a. Classification is performed after traffic is marked. b. Classification should be done as close to the destination device as possible. c. Marking is the
identification of which QoS policy should be applied to specific packets. d. Marking is the adding of a value to a packet header. Question textDelay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues). Question textWhich model is
the only QoS model with no mechanism to classify packets? Select one: a. hard QoS b. IntServ c. DiffServ d. best-effort Question textWhich queuing method provides user-defined traffic classes where each traffic class has a FIFO
queue? Select one: a. FIFO b. WFQ c. CBWFQ d. FCFS Question textWhat is the default queuing method used on the LAN interfaces
of Cisco devices? Select one: a. CBWFQ b. FIFO c. LLQ d. WFQ Question textHow many levels of priority are possible when using class of
service (CoS) marking on frames? Question textWhat does the WFQ automated scheduling method stands for? Answer Question textPackets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. Question textWhich type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used? Select one: a. management b. data c. video d. voice
Question textWhat happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested? Select one: a. Data is forwarded along the pathway using IntServ but not provided preferential treatment. b. Data is forwarded along the pathway using a best-effort approach. c. Data is not forwarded along
the pathway. d. Data is forwarded along the pathway using DiffServ. Question textPackets are classified into different flows based on header information including the ToS value. Question textPackets are
forwarded in the order in which they are received. Question textIntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows. Question textMAC address table flooding attacks are addressed with
port security. Question textVLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textIt is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative
password Answer: Question textWhich mode is used to configure SNMP? Select one: a. privileged mode b. interface configuration mode c. router configuration mode d. global configuration mode Question textVLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. Question textIt is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch. Answer: Question textIt is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password Answer: Question textWhat mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow? Select one: a. Disable STP b. Enable port security c. Disable DTP d. Place unused ports in an unused VLAN Question textThe Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol. Question textIn the 802.1X standard, the client attempting to access the network is referred to as the supplicant. Question textThe show monitor command is used to verify the SPAN
session. Question textWhich service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? Question textDHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool. Question textSNMP is an application layer protocol that provides a message format for communication between managers and agents Question textAnswer allows source and destination ports to be in different switches. Question textDHCP Answer is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters. Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textMAC address table flooding attacks are addressed with port security. Question textWhat is an SNMP management agent? Select one: a. software that is installed on devices managed by SNMP b. a database that a device
keeps about network performance c. a computer loaded with management software and used by an administrator to monitor a network d. a communication protocol that is used by SNMP Question textHow can SNMP access be restricted to a specific SNMP manager? Select one: a. Specify
the IP address of the SNMP manager by using the snmp-server host command. b. Use the snmp-server community command to configure the community string with no access level. c. Define an ACL and reference it by using the snmp-server community command. d. Use the snmp-server traps command to enable traps on an SNMP manager. Question textIt is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients. Answer: Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textIt is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool. Question textWhich protocol is used by PPP to provide authentication and protection from playback attacks? Question textAnswerA newer and faster technology considered to be part of 4G technology. Question textWhich additional functionality is
available on an interface when the encapsulation is changed from HDLC to PPP? Select one: a. flow control b. authentication c. synchronous communication d. error control Question textAnswerA type of digital modem used with high-speed DSL or cable Internet service. Question textAnswerThis is a point established in a building or complex to separate customer equipment from service provider equipment. Question textWhich WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits? Select one: a. Frame Relay b. ATM c. ISDN d. Metro Ethernet Question textAn administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL? Select one: a. R1(config-if)# ip access-group 1 in b. R1(config-if)# ip access-group 1 out c. R1(config-line)# access-class 1 out d. R1(config-line)# access-class 1 in Question textWhat is a disadvantage of leased lines? Select one: a. low quality b. inconsistent availability c. high cost d. complexity Question textWhich PPP protocol allows a device to specify an IP address for routing over the PPP link? Question textA site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance. Question textWhat TCP port is used by BGP to exchange messages between routers? Question textWhich IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with
wildcard mask 0.0.1.255? Select one: a. 172.16.2.0 to 172.16.3.255 b. 172.16.2.1 to 172.16.255.255 c. 172.16.2.0 to 172.16.2.255 d. 172.16.2.1 to 172.16.3.254 Question textWith which layers of the OSI model do the PPP control protocols interface? Select one: a. NCP interfaces with Layer 3; LCP interfaces with Layer 1 b. NCP interfaces with Layer 1; LCP interfaces with Layer 2 c. NCP interfaces with Layer 2; LCP interfaces with Layer
3 d. NCP interfaces with Layer 1; LCP interfaces with Layer 3 Question textAnswer It is a WAN protocol that provides Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits. Question textWhich statement correctly describes a WAN technology? Select one: a. The 53-byte ATM cell operates more efficiently for big frames. b. MPLS can be used to deliver any type of packet between sites. c. ISDN PRI is
intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel. d. VSATs create a public WAN while providing connectivity to remote locations. Question textWhat range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127? Select one: a. 192.168.70.0 to
192.168.70.255 b. 192.168.70.0 to 192.168.70.127 c. 192.168.70.0 to 192.168.71.255 d. 192.168.70.0 to 192.168.70.63 Question textWhich public WAN technology provides security by using encrypted
tunnels over Internet connections? Question textAnswer It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-switched connections when the link uses two Cisco devices. Question textWhat equipment at the cable service provider office connects the office to the subscriber locations? Select one: a. DSLAM b. CSU/DSU c. access server d. CMTS Question textWhat is an advantage offered by GRE tunnels? Select one: a. support
for connecting individual hosts across the Internet b. support for IP multicast tunneling c. built in security mechanisms d. encryption of encapsulated traffic Question textWhat equipment at the cable service provider office connects the office to the subscriber locations? Select one: a. CMTS b. access server c. DSLAM d. CSU/DSU Question textWhat TCP port is used by BGP to exchange messages between routers? Question textExternal BGP is the routing protocol used between routers in different autonomous systems. Question textWhen a PPPoE configuration is being verified, which command can be used to verify the MTU size and
encapsulation type configured on a Cisco router? Select one: a. show ip route b. show interface dialer 1 c. show pppoe session d. show ip interface brief Question textWhat range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127? Select one: a. 192.168.70.0 to 192.168.70.63 b. 192.168.70.0 to 192.168.71.255 c. 192.168.70.0 to 192.168.70.127 d. 192.168.70.0 to 192.168.70.255 Question textInternal BGP is the routing protocol used between routers in the same AS. Question textWhich statement describes a characteristic of standard IPv4 ACLs? Select one: a. They can be created with a number but not with a name. b. They can be configured to filter traffic based on both source IP addresses and source ports. c. They filter traffic based on source IP addresses only. d. They are configured in the interface configuration mode. Question textAnswer A general term for Internet services from a mobile phone or from any device that uses the same technology. Question textAn administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL? Select one: a. R1(config-if)# ip access-group 1 in b. R1(config-if)# ip access-group 1 out c. R1(config-line)# access-class 1 in d. R1(config-line)# access-class 1 out Question textGeneric Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol. Question textWhich IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255? Select one: a. 172.16.2.1 to 172.16.255.255 b. 172.16.2.1 to 172.16.3.254 c. 172.16.2.0 to 172.16.2.255 d. 172.16.2.0 to 172.16.3.255 Question textWhat is the protocol that provides ISPs the ability to send PPP frames over DSL networks? Question textAnswer A newer and faster technology considered to be part of 4G technology. Question textWhat is an advantage offered by GRE tunnels? Select one: a. support for IP multicast tunneling b. built in security mechanisms c. encryption of encapsulated traffic d. support for connecting individual hosts across the Internet Question textTo verify the state of a GRE tunnel, use the show interface tunnel command. Question textWhich statement describes a difference between the operation of inbound and outbound ACLs? Select one: a. Inbound ACLs
are processed before the packets are routed while outbound ACLs are processed after the routing is completed. b. Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers. c. On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be
configured. d. In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. Question textSatellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile. Question textDynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner. Question textA site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance. Question textThe use of BGP is most appropriate when an AS has connections to multiple autonomous systems. Question textA network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink.
Which additional command should to be issued on the multilink interface? Select one: a. b. encapsulation ppp c. no ip address d. ip address 192.168.10.1 255.255.255.252 Question textWhat is a disadvantage of leased lines? Select one: a. high cost b. complexity c. inconsistent availability d. low quality Question textWhich
statement correctly describes a WAN technology? Select one: a. VSATs create a public WAN while providing connectivity to remote locations. b. MPLS can be used to deliver any type of packet between sites. c. ISDN PRI is intended for the home and small enterprise and provides two
64 kb/s B channels and a 16 kb/s D channel. d. The 53-byte ATM cell operates more efficiently for big frames. Question textWhich PPP protocol allows a device to specify an IP address for routing over the PPP link? Question textWith which layers of the OSI model do the PPP control protocols interface? Select one: a. NCP interfaces with Layer 2; LCP interfaces with Layer 3 b. NCP interfaces with Layer 1; LCP interfaces with Layer 2 c. NCP interfaces with Layer 1; LCP interfaces with Layer 3 d. NCP interfaces with Layer 3; LCP interfaces with Layer 1
Question textWhich additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP? Select one: a. authentication b. synchronous communication c. error control d. flow control Question textWhat is a characteristic of a WAN? Select one: a. WANs always use physical cables to connect LANs. b. A WAN operates inside the geographic scope of a LAN. c. WAN service providers include carriers such as a telephone network or satellite service. d. A WAN is typically owned by an enterprise which wants to interconnect its LANs. Question textWhich medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? Select one: a. fiber optic b. Wi-Fi c. satellite d. copper Question textA construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is
the most suitable to meet the connection needs? Select one: a. satellite Internet b. WiMax c. DSL d. Municipal Wi-Fi Question textWhat is a disadvantage of leased
lines? Select one: a. inconsistent availability b. c. complexity d. high cost Question textWhich public WAN technology provides security by using encrypted tunnels over Internet connections? Question textWhich public WAN technology provides security by using encrypted tunnels over Internet connections? Question textWhich one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic? Select one: a. Ethernet WAN b. ISDN BRI c. dialup d. ATM Question textA construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs? Select one: a. Municipal Wi-Fi b. DSL c. WiMax d. satellite Internet Question textPPP authentication is performed at which OSI layer? Select one: a. Layer 4 b. Layer
1 c. Layer 2 d. Layer 3 Question textWhat function does NCP perform in the establishment of a PPP session? Select one: a. It tests the link to determine whether the link quality is sufficient to bring up network layer protocols. b. It opens the connections and negotiates configuration options. c. It provides automatic configuration of the interfaces at each end including detecting common configuration errors. d. It completes the specific configuration of the network layer protocol that is being used. Question textWhich protocol is used by PPP to provide authentication and protection from playback attacks? Question textWhich PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination? Select one: a. Authentication b. c. PPP
Callback d. Multilink e. Question textWhich medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? Select one: a. copper b. satellite c. Wi-Fi d. fiber optic Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits? Select one: a. Metro Ethernet b. ISDN c. ATM d. Frame Relay Question textWhat is an advantage offered by GRE tunnels? Select one: a. built in security mechanisms b. encryption of encapsulated traffic c. support
for connecting individual hosts across the Internet d. support for IP multicast tunneling Question textA construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs? Select one: a. Municipal Wi-Fi b. DSL c. WiMax d. satellite Internet Question textThe use of BGP is most appropriate when an AS has connections to multiple autonomous systems. A network engineer is troubleshooting an unsuccessful PPP multilink
connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface? Select one: a. no ip
address b. c. ip address 192.168.10.1 255.255.255.252 d. encapsulation ppp Question textTo verify the state of a GRE tunnel, use the show interface tunnel command.
Question textWhen a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router? Select one: a. show ip route b. show interface dialer 1 c. show pppoe session d. show ip interface brief Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol. Question textWhich statement describes a characteristic of standard IPv4 ACLs? Select one: a. They can be configured to filter traffic based on both source IP addresses and source
ports. b. They can be created with a number but not with a name. c. They filter traffic based on source IP addresses only. d. They are configured in the interface configuration mode. Answer A general term for Internet services from a mobile phone or from any device that uses the same technology. Question textAnswer It is a networking device that provides internetworking and WAN access interface ports that are used to connect to the service provider network. Which statement describes a difference between the operation of inbound and outbound ACLs? Select one: a. On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured. b. Inbound ACLs can be used in both routers and switches but outbound
ACLs can be used only on routers. c. In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. d. Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed. External BGP is the routing protocol used between routers in different autonomous systems. A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs? Select one: a. satellite Internet b. Municipal Wi-Fi c. DSL d. WiMax What is a disadvantage of leased lines? Select one: a. b. high cost c. inconsistent availability d. complexity Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? Select one: a. satellite b. copper c. fiber optic d. Wi-Fi Question textAnswerA general term for Internet services from a mobile phone or from any device that uses the same technology. Question textWhat function does NCP perform in the establishment of a PPP session? Select one: a. It completes the specific configuration of the network layer protocol that is being used. b. It tests the link to determine whether the link quality is sufficient to bring up network layer protocols. c. It opens the connections and negotiates
configuration options. d. It provides automatic configuration of the interfaces at each end including detecting common configuration errors. Question textWhen a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router? Select one: a. show
pppoe session b. show ip route c. show ip interface brief d. show interface dialer 1 Question textWhich public WAN technology provides security by using encrypted tunnels over Internet connections? Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile. Question textAnswer a type of network that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Question textPPP authentication is performed at which OSI layer? Select one: a. Layer 3 b. Layer 1 c. Layer 2 d. Layer 4 Question textWhich medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? Select one: a. copper b. satellite c. fiber optic d. Wi-Fi What is
a characteristic of a WAN? Select one: a. A WAN is typically owned by an enterprise which wants to interconnect its LANs. b. A WAN operates inside the geographic scope of a LAN. c. WAN service providers include carriers such as a telephone network or satellite service. d. WANs always use physical cables to connect LANs. Question textDynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner. Question textInternal BGP is the routing protocol used between routers in the same AS. Question textAnswer A newer and faster technology considered to be part of 4G technology. Question textWhich one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic? Select one: a. ISDN BRI b. Ethernet WAN c. dialup d. ATM Question textWhat is the protocol that provides ISPs the ability to send PPP frames over DSL networks? Question textWhich PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination? Select one: a. PPP Callback b. Multilink c. Authentication d. e. Question textThe show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device. Question textUse the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation. Question textWhen is the most appropriate time to measure network operations to establish a network performance baseline? Select one: a. at random times during a 10 week period, so that abnormal traffic levels can be detected b. during quiet vacation periods, so that the level of non-data traffic can be
determined c. whenever high network use is detected, so that how the network performs under stress can be monitored d. at the same time each day across a set period of average working days, so that typical traffic patterns can be established 9. A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem? Question textThe show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured. Question textThe OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. Question textA network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the
web pages. What is the most likely cause of the problem? Select one: a. The web server does not have a default gateway configured. b. An ACL is blocking incoming connections. c. There are excessive broadcasts in the network. d. There is a cable fault. Question textWhich command runs several other show commands in order to generate many pages of detailed troubleshooting information? Select one: a. show protocols b. show ip cache c. show running-config d. show tech-support Question textWhich troubleshooting tool can be used to pinpoint the distance to a break in a network cable? Select one: a. digital multimeter b. network analysis module c. cable tester d. network analyzer Question textAnswer diagrams keep track of the location, function, and status of devices on the network. Question textA
client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue? Select one: a. The helpdesk has enough information to begin finding a resolution. b. The client needs to reboot the PC and report back to the helpdesk. c. The client needs to plug into a different port on the switch and try the steps again before contacting the helpdesk. d. More detail is required before a complete problem description can be completed. e. The client needs to switch cables before the helpdesk can begin to resolve the issue. Question textAfter gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step? Select one: a. Gather symptoms from suspected devices. b. Contact the administrator of the external system. c. Question the end users. d. Analyze existing symptoms. e. Narrow the scope of the problem. Question textWhich feature sends
simulated data across the network and measures performance between multiple network locations? Select one: a. IP SLA b. syslog c. SPAN d. LLDP Question textThe Answer transmits bits from one computer to another and regulates the transmission of a stream of bits over the physical mediu Question textWhich statement describes the physical topology for a LAN? Select one: a. It defines how hosts and network devices connect to the
LAN. b. It depicts the addressing scheme that is employed in the LAN. c. It shows the order in which hosts access the network. d. It describes whether the LAN is a broadcast or token-passing network. Question textA network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using? Select one: a. comparing IP settings on network devices b. divide-and-conquer c. top-down d. bottom-up Question textA Answer topology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices. Question textA Answer topology shows the physical layout of the devices connected to the network. Question textThe show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices. Question textAnswer are specialized, handheld devices designed for testing the various types of data communication cabling. Question textA network administrator issues the
telnet www.cisco.com 25 command on the workstation. What is the purpose of this command? Select one: a. to verify that the website is operational b. to establish a management session to the web server c. to identify the path of network traffic toward the web server d. to probe the server that provides the web service to determine if it is also running an email service Question textIt is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ. Answer: Question textIt is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes. Answer: Question textWhich model is the only QoS model with no mechanism to classify packets? Select one: a. best-effort b. IntServ c. DiffServ d. hard QoS Question textWhat is the default queuing method used on the LAN interfaces of Cisco devices? Select one: a. CBWFQ b. LLQ c. WFQ d. FIFO Question textIt is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch. Answer: Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textIt is a type of telnet attack where the attacker may use a list of common passwords,
dictionary words, and variations of words to discover the administrative password Answer: Question textIt is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic. Answer: Question textIn
the 802.1X standard, the client attempting to access the network is referred to as the supplicant. Question textIt is an ever increasing requirement of networks today Select one: a. Quality of Service b. QoS Question textMAC address table flooding attacks are addressed with port security. Question textIt is a queuing algorithm also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival. Answer: Question textWhat mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow? Select one: a. Disable STP b. Disable DTP c. Enable port
security d. Place unused ports in an unused VLAN Question textIt is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients. Answer: Question textIntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows. Question textWhich mode is used to configure SNMP? Select one: a. router configuration mode b. interface configuration mode c. global configuration mode d. privileged mode Question textVLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. Question textDelay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues). Question textIt SPAN Terminology which refers to the traffic that enters the switch. Answer: Question textWhat happens when the memory queue of a device fills up and new network traffic is received? Select one: a. The network device sends the received traffic immediately. b. he network device will drop the arriving packets. c. The network device drops all traffic in the queue. d. The network device queues the received traffic while sending previously received traffic. Question textCBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes. Question textUnder which condition does congestion occur on a converged network with voice, video, and data traffic? Select one: a. if a user downloads a file that exceeds the file limitation that is set on the server b. if video traffic requests more bandwidth than voice traffic requests c. if the request for bandwidth exceeds the amount of bandwidth available d. if voice traffic latency begins to decrease across the network Question textWhat is an SNMP management agent? Select one: a. a database that a device keeps about network performance b. a computer loaded with management software and used
by an administrator to monitor a network c. a communication protocol that is used by SNMP d. software that is installed on devices managed by SNMP Question textThe show monitor command is used to verify the SPAN session. Question textSNMP is an application layer protocol that provides a message format for communication between managers and agents Question textIt is an SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port Answer: Question textThe LLQ feature
brings strict priority queuing (PQ) to CBWFQ. Question textWhat does the FIFO queuing stands for? Answer Question textPackets are classified into different flows based on header information including the ToS value. Question textAnswer allows source and destination ports to be in different switches. Question textThe Answer feature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port, out another port on the same switch. Question textWhat happens when an edge router
using IntServ QoS determines that the data pathway cannot support the level of QoS requested? Select one: a. Data is not forwarded along the pathway. b. Data is forwarded along the pathway using IntServ but not provided preferential treatment. c. Data is forwarded along the pathway
using DiffServ. d. Data is forwarded along the pathway using a best-effort approach. Question textAnswer allows source and destination ports to be in different switches. Question textIt is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool. Answer: Question textWhich service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? Select one: a. LLDP b. HTTP c. FTP d. CDP Question textSimple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network. Question textNetwork traffic can be marked at both Layer 2 and Layer 3 for QoS.. Question textWhich type of traffic does Cisco recommend be placed in the strict priority
queue (PQ) when low latency queuing (LLQ) is being used? Select one: a. voice b. management c. video d. data Question textHow
can SNMP access be restricted to a specific SNMP manager? Select one: a. Define an ACL and reference it by using the snmp-server community command. b. Use the snmp-server traps command to enable traps on an SNMP manager. c. Use the snmp-server community command to configure the community string
with no access level. d. Specify the IP address of the SNMP manager by using the snmp-server host command. Question textDHCP Answer is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters. Question textHow many levels of priority are possible when using class of service (CoS) marking on frames? Question textWhat does the WFQ automated scheduling method stands for? Answer Question textThe Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol. Question textWhich queuing method provides user-defined traffic classes where each traffic class has a FIFO queue? Select one: a. FIFO b. CBWFQ c. FCFS d. WFQ Question textPackets are forwarded in the order in which they are received. Question textThe Answer QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks. Question textIt is a SPAN Terminology which refers to the traffic that leaves the switch. Answer: Question textPackets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. Question textDHCP is the
protocol that automatically assigns a host a valid IP address out of a DHCP pool. Question textWhich statement describes the QoS classification and marking tools? Select one: a. Classification is performed after traffic is marked. b. Classification should be done as close to the destination device as possible. c. Marking is the identification of which QoS policy should be applied to specific packets. d. Marking is the adding of a value to a packet header. Which technology could be used to as a secure WAN connection?Metro Ethernet
Ethernet over Synchronous Optical Network (SONET) technology is used for secure point to point WAN connectivity.
Which WAN technology provides a secure connection to a private network over public lines?VPN Technology (1.2.
To address security concerns, broadband services provide capabilities for using VPN connections to a network device that accepts VPN connections, which are typically located at the corporate site. A VPN is an encrypted connection between private networks over a public network, such as the Internet.
Which technology is used in WAN technologies?WAN technologies are either circuit-switched or packet-switched. The type of device used depends on the WAN technology implemented.
Which of the following is an example of a public WAN?Wide Area Network
The Internet is the best-known example of a public WAN.
|