hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Other
Computer Skills
Estudio
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Estudio
Terms in this set (352)
Which statement correctly compares traditional networks and controller-based networks?
Only controller-based networks decouple the control plane and the data plane
How does HSRP provide first hop redundancy?
It uses a shared virtual MAC and virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
Which two actions influence the EIGRP route selections process?
-The rputer calculates the best backup path to the destination route and assigns it as the feasible succesor
-The router calculates the feasible distance of all the paths to the destination route
Which two capacities os Cisco DNA Center make it more extensuble?
-SDK that support interaction with third-party network equipment
-REST APIs that allow for external applications to interact natively with Cisco DNA Center
Which 802.11 frame type is association response?
management
Which API is used in controller-based architectures to interact with edge devices?
southbound
Which statement identifies the functionality of virtual machines
The hypervisor can virtualize physical components including CPU, memory , and storage
Which type of address is the public IP address of a NAT device?
inside global
which option about JSON is true?
uses to describe structured data that includes arrays
which attribute does a router use to select the best path when two os more different routes to the same destination exist from different rounting protocols?
administrative distance
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI?
SSID
Profile name
What are two benefits of network automation?
-Reduced operational costs
-Fewer network failures
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
enable secret
What's is a benefit of using a Cisco Wireless LAN Controller?
it eliminates the need to configure each access point individually
Which network allows devices to communicate without the need to access the internet?
172.28.0.0/16
Which result occurs when PortFast is enabled on an interface that is connected to another switch?
Spanning tree may fail to detect a switching loop in the network tht causes a broadcast storms
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select?
ASCII
Hexadecimal
Two switches are conected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable, What is the result of this configuration?
The link becomens trunkport
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined?
FF02::1
FF02::2
Which MAC address is recognized as VRRP virtual address
000.5E00.010a
in which way does a spine and leaf architecture allow for scalability in a network when additional access ports are required?
a leaf switch can be added with connections to every spine switch
which type of wireless encryption is used for WPA2 in pre-shared key mode?
AES-256
What makes Cisco DNA Center different from a traditional network management aplications and their management of networks?
IT abstracts policy from the actual device configurations
Which two actions are performed by the Weighted Random Early Detection mechanism?
-It drops lower-priority packets before it drops higher-priority packets
-It can mitigate congestions by preventing the queue from filling up
A network engineer must back up 20 network router configurations globally within a customer envioment. Which protocol allows the engineer to perform this function using Cisco IOS MIB?
SNMP
Which action is taken by a switch port enabled for PoE power clasification override?
if a monitored port exceeds the maximum administrative value for power, the port is shutdown and err- desabled
which mode must used to configure EtherChannel between two switches without using a negotiation protocol?
on
An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?
Full
Which configuration is needed to generate an RSA key for SSH on a router?
Assign a DNS domain name
An organization has decided to start using cloud-provider services. Which cloud service allows the orgnization to install its own operationg system on a virtual machine
Infrastructure-as-a-service
Which design element is a best practice when deploying asn 802.11b wireless infrastructure?
allocating non overlapping channels to access points that are in close physical proximity to one another
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented?
-CRC
-Input errors
Which two must be met before SSH can operate normally on a Cisco IOS switch?
-The switch must be running a k9 (crypto) IOS image
-The ip domain-name command must be configures on the switch
A router EIGRP has learned the same route from two different paths. Which parameter deas the router use to select the best path?
metric
What is the primary different between AAA Authenthication and authorizations?
Authenthication identifies and virfies a user who is ateempting to access a system, and athorization controls the tasks the user can perform
When a floatiing static route is configured. Which action ensures that backup route is used when the primary route fails?
The floating static route must have a higher administrative distance than the primary route so it is used as a backup
Which two outcomes are predictable behaviors for HRSP?
-The two routers share a virtual IP address that is used as the default gateway for devices in the LAN
-The two routers negotiate one router as the other as the stand by router
How to TCP and UDP differ in the way that they establish a connection between two endpoints?
TCP uses the three-way handshake and UDP does not guarantee message delivery
When a site-to-site VPN is used, which protocol is resposible for the transport of user data?
IPsec
Whatis the primary effect of the spanning-tree port fast command?
It immediately enables the port in the listening state
Which statement about Link Aggregation when implmemented on a Cisco Wireless LAN Controller is true?
One functional physical port is needed to pass client traffic
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device?
-Enable NTP authentication
-Specify the IP address of the NTP server
Whic set of action satisfy the requirment for multi-factor authentication?
The user name and password, and then clicks a notification on an authentication app on a mobile device
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
lightweight
Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table
90
What are two characteristics of a controller-based network? (Choose two
-It uses northbound and southbound APIs to communicate between architectural layers
-It moves the control plane to a central point
Which command must you enter to guarantee that an HSRP router with higher priority becomes the HSRP primary router after it is reloaded
standby 10 preempt
Which command should you enter to verify the priority of a router in an HSRP group?
show standb
Which command should you enter to configure a device as an NTP sever?
ntp master
Which two pieces of information can you determine from the output of the show ntp status command?
-the IP address of the peer to which the clock is synchronized
-whether the clock is synchronized
Which effete does the aaa new-model configuration command have?
It enables AAA services on the device
What is the destination MAC address of a broadcast frame?
ff:ff:ff:ff:ff:ff
Which command is used to enable LLDP globally on a Cisco IOS ISR?
lldp run
Which of the following dynamic routing protocols are Distance Vector routing protocols?
EIGRP
RIP
You have configured a router with an OSPF router ID, but its IP address still reflects the physical interface. Which action can you take to correct the problem in the least disruptive way?
Reload the OSPF process
Which command should you enter to configure an LLDP delay time of 5 seconds?
lldp reinit 5
Which keyword in a NAT configuration enables the use of one outside IP address for multiple inside hosts?
overload
Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?
flex connect
Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
Platinum
When OSPF learns multiple paths to a network, how does it select a route?
It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.
Which command enables a router to become a DHCP client?
ip address dhcp
Which two encoding methods are supported by REST APIs? (Choose two)
JSON
XML
In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address?
CDP operates normally,but it cannot provide IP address information for that neighbor
Which feature or protocol determines whether the QOS on the network is sufficient to support IP services?
IP SLA
An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
user awareness
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
Which IP address is the source IP after the NAT has taken place?
172.23.104.4
A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?
broadcast
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)
Administratively shut down the ports
Configure the port type as access and place in VLAN 99
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?
AES
When configuring an EtherChannel bundle, which mode enables LACP only if a LACP device is detected?
Passive
Which two VLAN IDs indicate a default VLAN? (Choose two.)
1
1005
Which command should you enter to view the error log in an EIGRP for IPv6 environment?
show ipv6 eigrp events
If a notice-level messaging is sent to a syslog server, which event has occurred?
A routing instance has flapped
What are two southbound APIs? (Choose two )
OpenFlow and NETCONF
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
CPU ACL
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
ipv6 address autoconfig
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)
emergency
critial
error
Which two statements about exterior routing protocols are true? (Choose two.)
They determine the optimal path between autonomous systems.
BGP is the current standard exterior routing protocol.
which two pieces of information about a Cisco device can Cisco Discovery Protocol communicate? (Choose two.)
the native VLAN
the VTP domain
Which two statements about NTP operations are true? (Choose two.)
NTP uses UDP over IP.
Cisco routers can act as both NTP authoritative servers and NTP clients
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?
lldp reinit
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?
It allows the traffic to pass through unchanged
R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?
Internal EIGRP
Which IPv6 address block sends packets to a group address rather than a single address?
FF00::/8
Which feature or protocol is required for an IP SLA to measure UDP jitter?
NTP
Which two pieces of information can you learn by viewing the routing table? (Choose two)
whether the administrative distance was manually or dynamically configured
the length of time that a route has been known
For what two purposes does the Ethernet protocol use physical addresses?
to uniquely identify devices at Layer 2
to allow communication between different devices on the same network
Which NAT term is defined as a group of addresses available for NAT use?
NAT pool
After you deploy a new WLAN controller on your network, which two additional tasks should you consider? (Choose two)
deploy load balancers
configure additional security policies
Which component of an Ethernet frame is used to notify a host that traffic is coming?
preamble
You are configuring your edge routers interface with a public IP address for Internet connectivity. The router needs to obtain the IP address from the service provider dynamically. Which command is needed on interface FastEthernet 0/0 to accomplish this?
ip address dhcp
What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)
when the cable length limits are exceeded
when one side of the connection is configured for half-duplex
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
unique local
A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP. By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?
point-to-point
You have two paths for the 10.10.10.0 network - one that has a feasible distance of 3072 and the other of 6144. What do you need to do to load balance your EIGRP routes?
Change the configuration so they both have the same feasible distance
Change the variance for the path that has a feasible distance of 3072 to 2
Which two commands can you use to configure an actively negotiate EtherChannel? (Choose two)
channel-group 10 mode desirable
channel-group 10 mode active
Which two circumstances can prevent two routers from establishing an OSPF neighbor adjacency? (Choose two.)
mismatched hello timers and dead timers
use of the same router ID on both devices
Which two statements about the purpose of the OSI model are accurate? (Choose two)
Defines the network functions that occur at each layer
Facilitates an understanding of how information travels throughout a network
Which option best describes an API?
a contract that describes how various components communicate and exchange data with each other.
What will happen if you configure the logging trap debug command on a router?
It causes the router to send all messages to the syslog server
How does STP prevent forwarding loops at OSI Layer 2?
Port blocking
Which Cisco IOS command will indicate that interface GigabitEthernet 0/0 is configured via DHCP?
show ip interface GigabitEthernet 0/0
Which command can you enter to allow Telnet to be supported in addition to SSH?
transport input telnet ssh
Which three describe the reasons large OSPF networks use a hierarchical design? (Choose Three)
to speed up convergence
to reduce routing overhead
to confine network instability to single areas of the network.
What is the binary pattern of unique ipv6 unique local address?
11111100
Which two statements about VTP are true? (Choose two.)
All switches must be configured with the same VTP domain name
All switches must use the same VTP version.
Which two options are the best reasons to use an IPV4 private IP space?(choose two)
to enable intra-enterprise communication
to conserve global address space
Which type does a port become when it receives the best BPDU on a bridge?
The root port
Which value can you modify to configure a specific interface as the preferred forwarding interface?
The port priority
Which statement about VLAN configuration is true?
The switch must be in VTP server or transparent mode before you can configure a VLAN
Which value is used to determine the active router in an HSRP default configuration?
Router IP address
Which configuration command can u apply to a HSRP router so that its local interface becomes active if all other routers in the group fail?
no additional config is required
Which two statements about eBGP neighbor relationships are true? (Choose two)
The two devices must reside in different autonomous systems
Neighbors must be specifically declared in the configuration of each device
Which statement about Cisco Discovery Protocol is true?
It is a Cisco-proprietary protocol.
Which technique can you use to route IPv6 traffic over an IPv4 infrastructure?
6to4 tunneling
Which statements describe the routing protocol OSPF? (Choose three.)
It supports VLSM.
It confines network instability to one area of the network.
It allows extensive control of routing updates.
Which reason for the problem is most likely true ?
The area numbers on R1 and R2 are mismatched
Which command is used to display the collection of OSPF link states?
show ip ospf database
What are two reasons a network administrator would use CDP? (Choose two.)
to verify Layer 2 connectivity between two devices when Layer 3 fails
to obtain the IP address of a connected device in order to telnet to the device
What are two benefits of using VTP in a switching environment? (Choose two.)
It maintains VLAN consistency across a switched network.
It allows VLAN information to be automatically propagated throughout the switching environment.
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)
It establishes a static route to the 172.16.3.0 network
It uses the default administrative distance.
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
Connectivity between VLANs requires a Layer 3 device.
Each VLAN uses a separate address space.
A switch maintains a separate bridging table for each VLAN.
If all OSPF routers in a single area are configured with the same priority value, what value does a router use for the OSPF router ID in the absence of a loopback interface?
the highest IP address among its active interfaces
The OSPF Hello protocol performs which of the following tasks? (Choose two.)
It provides dynamic neighbor discovery
It maintains neighbor relationships
What are two requirements for an HSRP group? (Choose two.)
exactly one active router
one or more standby routers
Which command can you enter to determine the addresses that have been assigned on a DHCP Server?
Show ip DHCP binding.
On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?
a router with subinterfaces configured on the physical interface that is connected to the switch
Which IPv6 address block forwards packets to a multicast address rather than a unicast address?
FF00::/12
What is the expected outcome when an EUI-64 address is generated?
The seventh bit of original MAC address of the interface is inverted
What is the difference regrading reliability and communication type between TCP and UDP?
TCP is reliable and is a connection-oriented protocol; UDP is not reliable and is a connectionless protocol.
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?
R1# config t
R1(config)# ip routing
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
Which function dose the range of private IPv4 addresses perform?
allow multiple companies to each use the same address without conflicts
Which purpose does a northbound API serve in a controller-based networking architecture?
facilitates communication between the controller and the applications
How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?
Cisco DNA Center device management can deploy a network more quickly than traditional campus device management.
What are two fundamentals of virtualization? (Choose two.)
It allows multiple operating systems and applications to run independently on one physical server.
It allows logical network devices to move traffic between virtual machines and the rest of the physical network.
What is an advantage of Cisco DNA Center versus traditional campus device management?
It supports numerous extensibility options, including cross-domain adapters and third-party SDKs.
What occurs to frames during the process of frame flooding?
Frames are sent to every port on the switch in the same VLAN except from the originating port.
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
enable SLAAC on an interface
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.)
Cells that overlap one another are configured to use nonoverlapping channels.
For maximum throughput, the WLC is configured to dynamically set adjacent access points to the channel.
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking.
What are two differences between optical-fiber cabling and copper cabling? (Choose two.)
The glass core component is encased in a cladding
Light is transmitted through the core of the fiber
How does CAPWAP communicate between an access point in local mode and a WLC?
The access point has the ability to link to any switch in the network, assuming connectivity to the WLC
What are two descriptions of three-tier network topologies? (Choose two.)
The distribution layer runs Layer 2 and Layer 3 technologies
The network core is designed to maintain continuous connectivity when devices fail
Which type of ipv6 address is publicly routable in the same way as ipv4 public addresses?
global unicast
A corporate office uses four floors in a building.
- Floor 1 has 24 users.
- Floor 2 has 29 users.
- Floor 3 has 28 users.
- Floor 4 has 22 users.
Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
192.168.0.0/25 as summary and 192.168.0.0/27 for each floor
What is a characteristic of spine-and-leaf architecture?
Each device is separated by the same number of hops
Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two.)
C. interface port-channel 10
no switchport
ip address 172.16.0.1 255.255.255.0
D. interface GigabitEthernet0/0/1
channel-group 10 mode active
How do AAA operations compare regarding user identification, user services, and access control?
Authentication identifies users, and accounting tracks user services
What is difference between RADIUS and TACACS+?
TACACS+ separates authentication and authorization, and RADIUS merges them.
By default, how does EIGRP determine the metric of a route for the routing table?
It uses the bandwidth and delay values of the path to calculate the route metric
A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?
ip route 10.10.1.20 255.255.255.252 10.10.255.1
What are two reasons for an engineer to configure a floating static route? (Choose two.)
to enable fallback static routing when the dynamic routing protocol fails
to automatically route traffic on a secondary path when the primary path goes down
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
route with the lowest administrative distance
Which two minimum parameters must be configured on an active interface to enable OSPFV2 to operate? (Choose two.)
OSPF process ID
OSPF area
Which function does an SNMP agent perform?
It sends information about MIB variables in response to requests from the NMS
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two.)
The DHCP server leases client IP addresses dynamically
The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses.
Which command must be entered when a device is configured as an NTP server?
ntp master
What event has occurred if a router sends a notice level message to a syslog server?
An interface line has changed status
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two.)
A matching permit statement is too broadly defined
A matching permit statement is too high in the access list
The service password-encryption command is entered on a router. What is the effect of this configuration?
restricts unauthorized users from viewing clear-text passwords in the running configuration
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
SAE encryption
What benefit does controller-based networking provide versus traditional networking?
allows configuration and monitoring of the network from one centralized point
How does Cisco DNA Center gather data from the network?
Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller
Which statement about LLDP is true?
It is configured in global configuration mode
What are two benefits of private IPv4 IP addresses? (Choose two.)
They are less costly than public IP addresses.
They can be assigned to devices without Internet connections
What is the authoritative source for an address lookup?
a recursive DNS search
What are two benefits that the UDP protocol provide for application traffic?(Choose two)
UDP traffic has lower overhead than TCP traffic
The application can use checksums to verify the integrity of application data
Which two goals reasons to implement private IPv4 addressing on your network? (Choose two)
Conserve IPv4 address
Reduce the risk of a network security breach
Which command is used to verify the DHCP relay agent address that has been set up on your Cisco IOS router?
show ip interface
What is the primary purpose of a First Hop Redundancy Protocol?
It reduces routing failures by allowing more than one router to represent itself, as the default
Which technology must be implemented to configure network device monitoring with the highest security?
SNMPv3
What role does a hypervisor provide for each virtual machine in server virtualization?
control and distribution of physical resources
The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)
There is a speed mismatch
The interface is error-disabled
What is the function of a server?
It provides shared applications to end users.
What is a function of Wireless LAN Controller?
send LWAPP packets to access points.
Which type of information resides on a DHCP server?
a list of the available IP addresses in a pool
Which technology is used to improve web traffic performance by proxy caching?
WSA
Which type of attack can be mitigated by dynamic ARP inspection?
man-in-the-middle
Which goal is achieved by the implementation of private IPv4 addressing on a network?
provides an added level of protection against Internet exposure
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
1,6.11
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter increments?
late collision
What are two roles of Domain Name Services (DNS)? (Choose Two)
enables applications to identify resources by name instead of IP address
allows a single host name to be shared across more than one IP address
When a WPA2-PSK WLAN is configured in the wireless LAN Controller, what is the minimum number of characters that in ASCll format?
8
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3. Which configuration should be used?
enable
configure terminal
ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30
access-list 1 permit 10.10.0.0 0.0.0.255
ip nat inside source list 1 pool mypool
interface g1/1
ip nat inside
interface g1/2
ip nat outside
How do TCP and UDP differ in the way they guarantee packet delivery?
TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only
What are two benefits of controller-based networking compared to traditional networking?
Controller-based reduces network configuration complexity, while traditional increases the potential for errors
Controller-based provides centralization of key IT functions. While traditional requires distributes management function
What mechanism carries multicast traffic between remote sites and supports encryption?
GRE over iPsec
How will Link Aggregation be Implemented on a Cisco Wireless LAN Controller?
One functional physical port is needed to pass client traffic.
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user's smartphone being lost or stolen?
The application requires the user to enter a PIN before it provides the second factor
When the active router in an HSRP group fails, what router assumes the role and forwards packets?
standby
An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?
switch(config)#IIdp port-description
Which device performs stateful inspection of traffic?
firewall
An office has 8 floors with approximately 30-40 users per floor. What command must be configured on the router Switched Virtual Interface to use address space efficiently?
ip address 192.168.0.0 255.255.254.0
A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?
enable Band Select
Which configuration ensures that the switch is always the root for VLAN 750?
Switch(config)#spanning-tree vlan 750 priority 0
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
SNMP
An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)
configure the hello and dead timers to match on both sides
configure both interfaces with the same area ID
What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?
control plane
Which WAN access technology is preferred for a small office / home office architecture?
broadband cable access
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
enable sticky MAC addressing
Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)
asychronous routing
dual-homed branches
What criteria is used first during the root port selection process?
lowest path cost to the root bridge
Which state does the switch port move to when PortFast is enabled?
forwarding
Which type of API allows SDN controllers to dynamically make changes to the network?
southbound API
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?
configure switchport mode dynamic auto
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software which is only used occasionally Which cloud service model does the engineer recommend?
software-as-a-service
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded Which command must be configured to increment the security-violation count and forward an SNMP trap?
switchport port-security violation restrict
What are two functions of a Layer 2 switch? (Choose two)
moves packets within a VLAN
makes forwarding decisions based on the MAC address of a packet
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?
PortFast
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
one nonoverlapping channel
Which function is performed by the collapsed core layer in a two-tier architecture?
enforcing routing policies
What are two functions of a server on a network? (Choose two)
runs applications that send and retrieve data for workstations that make requests
handles requests from multiple workstations at the same time
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?
switchport port-security vilation restrict
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
data plane
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?
spanning -tree vlan 200 priority 0
An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?
switchport mode dynamic auto
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
HTTPS
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)
implement port-based authentication
shut down unused ports
What is the primary function of a Layer 3 device?
to pass traffic between different networks
What is the same for both copper and fiber interfaces when using SFP modules?
They provide minimal interruption to services by being hot-swappable
What is a function of TFTP in network operations?
transfers IOS images from a server to a router for firmware upgrades
Which CRUD operation modifies an existing table or view?
update
An engineer must configure Interswitch VLAN communication between a Cisco switch and a third- party switch. Which action should be taken?
configure IEEE 802.1q
What is a function of a remote access VPN?
allows the users to access company internal network resources through a secure tunnel
What is a DHCP client?
a host that is configured to request an IP address automatically
Which two functions are performed by the core layer in a three-tier architecture? (Choose two)
Provide uninterrupted forwarding service.
Inspect packets for malicious activity
Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
Ansible
What is a practice that protects a network from VLAN hopping attacks?
Change native VLAN to an unused VLAN ID
What is the purpose of traffic shaping?
to limit the bandwidth that a flow can use to
Where does the configuration reside when a helper address Is configured lo support DHCP?
on the switch trunk interface
How does the dynamically-learned MAC address feature function?
The CAM table is empty until ingress traffic arrives at each port
What facilitates a Telnet connection between devices by entering the device name?
DNS lookup
What does a switch use to build its MAC address table?
ingress traffic
Which device tracks the state of active connections in order to make a decision to forward a packet through?
firewall
How do servers connect to the network in a virtual environment?
a software switch on a hypervisor that is physically connected to the network
What is recommended for the wireless infrastructure design of an organization?
group access points together to increase throughput on a given channel
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
control
Which network plane is centralized and manages routing decisions?
control plane
How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?
It floods the frame to all interfaces except Fa0/1.
Which function does the range of private IPv4 addresses perform?
allows multiple companies to each use the same addresses without conflicts
Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?
DHCP
What is a benefit of VRRP?
It provides the default gateway redundancy on a LAN using two or more routers.
Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?
user awareness
Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?
802.1x
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
There is limited unique address space, and traffic on the new subnet will stay local within the organization.
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
forwarding
learning
When implementing a router as a DHCP server, which two features must be configured? (Choose two)
database agent
address pool
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
switchport trunk native vlan 10
What is a role of wireless controllers in an enterprise network?
centralize the management of access points in an enterprise network
What is the maximum bandwidth of a T1 point-to-point connection?
1.544 Mbps
Where does a switch maintain DHCP snooping information?
in the binding database
What is the expected outcome when an EUI-64 address is generated?
The seventh bit of the original MAC address of the interface is inverted
Which CRUD operation corresponds to the HTTP GET method?
read
What is an advantage of Cisco DNA Center versus traditional campus device management?
It supports numerous extensibility options including cross-domain adapters and third- party SDKs.
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
prompts the user to specify the desired IP address
Which condition must be met before an NMS handles an SNMP trap from an agent?
The NMS software must be loaded with the MIB associated with the trap.
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
The highest up/up physical interface IP address is selected as the router ID.
Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?
wireless LAN controller
A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on to the server?
a DHCP Relay Agent
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?
LACP
How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?
It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
What is the difference regarding reliability and communication type between TCP and UDP?
TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol
With REST API, which standard HTTP header tells a server which media type is expected by the client?
Content-Type: application/json; charset=utf-8
What is a DNS lookup operation?
responds to a request for IP address to domain name resolution to the DNS server
Which implementation provides the strongest encryption combination for the wireless environment?
WPA2 + AES
What is a characteristic of a SOHO network?
enables multiple users to share a single broadband connection
Which resource is able to be shared among virtual machines deployed on the same physical server?
disk
Which WAN topology provides a combination of simplicity quality, and availability?
full mesh
Which command on a port enters the forwarding state immediately when a PC is connected to it?
switch(config)#spanning-tree portfast default
switch(config)#spanning-tree portfast default
coordinating VTNs
managing the topology
What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?
firewall
When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?
default-router
What is an appropriate use for private IPv4 addressing?
on hosts that communicates only with other internal hosts
Why does a switch flood a frame to all ports?
The destination MAC address of the frame is unknown.
If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?
The new frame is placed in a queue for transmission after the previous frame.
How is the native VLAN secured in a network?
configure it as a different VLAN ID on each end of the link
What is the purpose of a southbound API in a control based networking architecture?
Facilities communication between the controller and the networking hardware
What causes a port to be placed in the err-disabled state?
port security violation
Which switch technology establishes a network connection immediately when it is plugged in?
UplinkFast
Which technology is appropriate for communication between an SDN controller and applications running over the network?
REST API
What is a characteristic of private IPv4 addressing?
used without tracking or registration
Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?
biometrics
Which network action occurs within the data plane?
compare the destination IP address to the IP routing table
What is a DHCP client?
a host that is configured to request an IP address automatically
What uses HTTP messages to transfer data to applications residing on different hosts?
REST
What is a role of access points in an enterprise network?
connect wireless devices to a wired network
Which protocol does an access point use to draw power from a connected switch?
Cisco Discovery Protocol
When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is supported?
ASCII
Which networking function occurs on the data plane?
forwarding remote client/server traffic
An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?
Add the switch in the VTP domain with a higher revision number
What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?
OpenFlow
What is a similarity between OM3 and OM4 fiber optic cable?
Both have a 50 micron core diameter
Which JSON data type is an unordered set of attribute- value pairs?
object
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
ipv6 address 2001:db8::500:a:400F:583B
What is the benefit of using FHRP?
higher degree of availability
Which two QoS tools provides congestion management? ( Choose two )
CBWFQ
PQ
When deploying syslog, which severity level logs informational message?
6
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GH2 access points?
Client Band Select
An administrator must secure the WLC from receiving spoofed association requests Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?
Enable 802.1x Layer 2 security and set me Comeback timer to 10
What are two improvements provided by automation for network management in an SDN environment? (Choose two)
Artificial intelligence identifies and prevents potential design failures
Proprietary Cisco APIs leverage multiple network management tools.
Which technology allows for multiple operating systems to be run on a single host computer?
server visualization
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.
implement port-based authentication
shut down unused ports
What occurs when overlapping Wi-Fi channels are implemented?
Users experience poor wireless network performance
Which 802.11 management frame type is sent when a client roams between access points on the same SSID?
Reassociation Request
An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?
ipv6 address 2001:db8::700:3:400F:572B
What describes the operation of virtual machines?
In a virtual machine environment, physical servers must run one operating system at a time
Which WLC port connects to a switch to pass normal access-point traffic?
distribution system
Which IPv6 address type provides communication between subnets and is unable to route on the Internet?
unique local
An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?
logging trap 4
What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)
provides a boundary between Layer 2 and Layer 3 communications
designed to meet continuous, redundant uptime requirements
What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
ensures a loop-free physical topology
Which access layer threat-mitigation technique provides security based on identity?
802.1x
What must be considered when using 802:11 ta?
It is compatible with 802 lib- and 802 11-compliant wireless devices
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?
IPsec tunnel mode with ESP
What does physical access control regulate?
access to networking equipment and facilities
On workstations running Microsoft Windows, which protocol provides the default gateway for the device?
DHCP
How are VLAN hopping attacks mitigated?
manually implement trunk ports and disable DTP
What is the role of a firewall in an enterprise network?
determines which packets are allowed to cross from unsecured to secured networks
Which two primary drivers support the need for network automation? (Choose two.)
Policy-derived provisioning of resources
Providing a ship entry point for resource provisioning
What is a function of the Cisco DNA Center Overall Health Dashboard?
It provides a summary of the top 10 global issues.
Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?
FTP
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
Enable the allow AAA Override
Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?
PQ
Which action does the router take as rt forwards a packet through the network?
The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination
Where is the interface between the control plane and data plane within the software-defined architecture?
application layer and the management layer
An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?
hypervisor
A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?
Clock set
A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports?
configure ports in a black hole VLAN
Why was the RFC 1918 address space defined?
conserve public IPv4 addressing
Which HTTP status code is returned after a successful REST API request?
200
What are network endpoints?
a threat to the network if they are compromised
Which two components are needed to create an Ansible script that configures a VLAN on a switch? (Choose two.)
playbook
model
Which two events occur automatically when a device Is added to Cisco DNA Center? (Choose two. )
The device Is assigned to the Global site.
The device Is placed into the Unmanaged state.
Which virtual MAC address is used by VRRP group 1?
0000.5E00.0101
In software-defined architecture, which place handles switching for traffic through a Cisco router?
Data
Which level of severity must be set to get informational syslogs?
notice
When a switch receives a frame for a known destination MAC address, how is the frame handed?
forwarded to the first available port
How does QoS optimize voice traffic?
by differentiating voice and video traffic
What is the function of a controller in controller-based networking?
It serves as the centralized management point of an SDN architecture.
Which action does the router take as it forwards a packet through the network?
The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
Both support runs of up to 100 meters.
Both support speeds of at least 1 Gigabit.
What is a characteristic of cloud-based network topology?
wireless connections provide the sole access method to services
What is the difference in data transmission delivery and reliability between TCP and UDP?
TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.
How are the switches in a spine-and-leaf topology interconnected?
Each leaf switch is connected to two spine switches, making a loop.
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )
Telnet
HTTP
What are two benefits of using the PortFast feature? (Choose two )
Enabled interfaces are automatically placed in listening state
Enabled interfaces come up and move to the forwarding state immediately
Which function is performed by DHCP snooping?
propagates VLAN information between switches
When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?
DHCP relay agent
Where is the interface between the control plane and data plane within the software-defined architecture?
control layer and the infrastructure layer
Which plane is centralized by an SON controller?
control-plane
What is the benefit of configuring PortFast on an interface?
After the cable is connected, the interface is available faster to send and receive user data
Students also viewed
LOS SECRETOS vocab cpts 1-5
26 terms
¿Cómo es tu profesor?
8 terms
Las Comidas
35 terms
Qu'est-ce que tu fais dans ta ville?
12 terms