Networking Essentials Flashcards

Explore key networking concepts and protocols with these engaging flashcards, perfect for mastering essential IT knowledge. (909 cards)

1
Q

Which of the following terms describe Ethernet addresses that can send one frame and is delivered to multiple devices on the LAN? (Choose two answers.)

(A) Broadcast address
(B) Multicast address
(C) IP address
(D) MAC address
(E) Unicast address

A

(A) Broadcast address
(B) Multicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following address check a router when making a decision about routing TCP/IP packets?

(A) Destination MAC address
(B) Source IP address
(C) Source MAC address
(D) Destination IP address

A

(A) Destination MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___________ is a set of rules determining how network devices respond when two devices attempt to use a datachannel simultaneously and encounter a data collision.

(A) CSMA/CD
(B) CSMA/CA
(C) TCP/IP
(D) TCP/UDP

A

(A) CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethernet standard _ BASE-T defines Gigabit Ethernet over UTP cabling.

(A) 100
(B) 10
(C) 1000
(D) 1

A

(C) 1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following IEEE 802.3 Ethernet Header and Trailer Fields allows devices on the network to easily synchronize their receiver clocks?

(A) Frame Check Sequence
(B) Data and Pad
(C) Start Frame Delimiter
(D) Preamble

A

(D) Preamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The host sends packets to its default gateway if the ____________ IP address is in a different subnet than the host.
(A) Source
(B) Destination
(C) Unicast
(D) Broadcast

A

(B) Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The diagram below shows a campus LAN in a single building. Which of the following connections uses crossover Ethernet cables? (Choose all that apply)

(A) A
(B) C
(C) D
(D) E
(E) F
(F) G

A

(A) A
(B) C
(C) D
(D) E
(E) F
(F) G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The diagram below shows a campus LAN in a single building. Which of the following connections uses straight-through cables? (Choose all that apply)
(A) A
(B) C
(C) D
(D) E
(E) F
(F) G

A

(A) A
(B) C
(C) D
(D) E
(E) F
(F) G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following protocols resides in the Application TCP/IP Architecture layer?

(A) SMTP
(B) TCP
(C) Ethernet
(D) IP

A

(A) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following protocols resides in the Transport TCP/IP Architecture layer?

(A) SMTP
(B) TCP
(C) Ethernet
(D) IP

A

(B) TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following protocols resides in the Internet TCP/IP Architecture layer?

(A) SMTP
(B) TCP
(C) Ethernet
(D) IP

A

(D) IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following protocols resides in the Data Link & Physical TCP/IP Architecture layer?

(A) SMTP
(B) TCP
(C) Ethernet
(D) IP

A

(C) Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following protocols is used from PC1 to learn information from some other device on the same network?

(A) ping
(B) ARP
(C) DHCP
(D) DNS

A

(B) ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If the devices below were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? (Choose two answers.)

(A) Router and PC
(B) Switch and PC
(C) Hub and switch
(D) Router and hub

A

(A) Router and PC
(B) Switch and PC
(C) Hub and switch
(D) Router and hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following protocols are examples of TCP/IP data-link layer protocols? (Choose two answers.)

(A) TCP
(B) HTTP
(C) Ethernet
(D) PPP
(E) SMTP
(F) HTTPS

A

(A) TCP
(B) HTTP
(C) Ethernet
(D) PPP
(E) SMTP
(F) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements are functions of a routing protocol? (Choose two answers.)

(A) Learning routes and putting those routes into the routing table for routes advertised to the router by its neighboring routers
(B) Advertising known routes to neighboring routers
(C) Learning routes for subnets directly connected to the router
(D) Forwarding IP packets based on a packet’s destination IP address

A

**(A) Learning routes and putting those routes into the routing table for routes advertised to the router by its neighboring routers **
(B) Advertising known routes to neighboring routers
(C) Learning routes for subnets directly connected to the router
(D) Forwarding IP packets based on a packet’s destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When you open a web browser and type in the hostname www.examsdigest.com, your computer does not send an IP packet with a destination IP address www.examsdigest.com; it sends an IP packet to an IP address used by the web server for Examsdigest. TCP/IP needs a way to let a computer find the IP address used by the listed hostname. That method uses the Domain Name System (DNS).

(A) TRUE
(B) FALSE

A

(A) TRUE
(B) FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A __________________ address is an address that enables transmission to every node in a local network.

(A) Broadcast
(B) Multicast
(C) Unicast
(D) MAC

A

(A) Broadcast
(B) Multicast
(C) Unicast
(D) MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP and ______________ are the two most commonly used TCP/IP transport layer protocols.

(A) UDP
(B) HTTP
(C) DNS
(D) SMTP

A

(A) UDP
(B) HTTP
(C) DNS
(D) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following IEEE 802.3 Ethernet Header and Trailer Fields provides a method for the receiving NIC to determine whether the frame experienced transmission errors?
(A) Frame Check Sequence
(B) Data and Pad
(C) Start Frame Delimiter
(D) Preamble

A

(A) Frame Check Sequence
(B) Data and Pad
(C) Start Frame Delimiter
(D) Preamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following commands checks the status of the interfaces?

(A) show interface
(B) show status
(C) show interface status
(D) show status interface

A

(C) show interface status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are in console line configuration mode. Which of the following commands would place you in enable mode?

(A) end
(B) back
(C) enable
(D) change

A

(A) end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/2?
(A) Global configuration mode
(B) Enable mode
(C) Interface configuration mode
(D) VLAN mode

A

(C) Interface configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The command that configures the switch as a DHCP client to discover its IPv4 address, mask, and default gateway is ip address dhcp.

(A) TRUE
(B) FALSE

A

(A) TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following commands copies the configuration from RAM into NVRAM (A) copy running-config startup-config (B) copy startup-config running-config (C) copy ram nvram (D) copy nvram ram
(A) copy running-config startup-config
26
Which of the following commands administratively enables an interface (A) shutdown (B) no shutdown (C) enable interface (D) interface enable
(B) no shutdown
27
Switches use STP to prevent loops by causing some interfaces to block, meaning that they do not send or receive frames. (A) TRUE (B) FALSE
(A) TRUE
28
A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 175.28.1.150 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 175.28.1.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.) (A) The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1. (B) The ip address 175.28.1.150 255.255.255.0 command in interface vlan 2 configuration mode. (C) The ip default-gateway 175.28.1.254 command in global configuration mode. (D) The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode. (E) The ip default-gateway 175.28.1.150 command in global configuration mode.
(B) The ip address 175.28.1.150 255.255.255.0 command in interface vlan 2 configuration mode. (C) The ip default-gateway 175.28.1.254 command in global configuration mode.
29
Which of the following commands lists the content of the startup-config (initial config) file. (A) show startup-config (B) show initial-config (C) show content-config (D) show file-config
(A) show startup-config
30
You want to configure the console password with password examsdigest. Which of the following commands will you type to meet the requirement? (A) Examsdigest#(config)# line console 0 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# exit (B) Examsdigest#(config)# enable secret examsdigest (C) Examsdigest#(config)# enable console examsdigest (D) Examsdigest#(config)# live vty 0 15 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# end
(A) Examsdigest#(config)# line console 0 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# exit
31
You want to configure the telnet password for all vty lines with password examsdigest. Which of the following commands will you type to meet the requirement? (A) Examsdigest#(config)# line console 0 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# exit (B) Examsdigest#(config)# enable secret examsdigest (C) Examsdigest#(config)# enable console examsdigest (D) Examsdigest#(config)# live vty 0 15 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# end
(D) Examsdigest#(config)# live vty 0 15 Examsdigest#(config-line)# password examsdigest Examsdigest#(config-line)# login Examsdigest#(config-line)# end
32
Which of the following type of memory is used to store the configuration used by the switch when it is up and running? (A) ROM (B) RAM (C) NVRAM (D) Flash
(B) RAM
33
You have been tasked to configure the IPv4 address on the switch only on the VLAN 1 following the details below. Configuration details: IP address: 199.255.240.100 Subnet mask: 255.255.255.0 Default gateway: 199.255.240.1 Which of the following commands will you type to complete the task? (A) Examsdigest#(config)# interface vlan 1 Examsdigest#(config-line)# ip address 199.255.240.100 255.255.255.0 Examsdigest#(config-line)# no shutdown Examsdigest#(config-line)# end Examsdigest#(config)# ip default-gateway 199.255.240.1 (B) Examsdigest#(config)# interface vlan 1 Examsdigest#(config-line)# ip address 199.255.241.100 255.255.255.0 Examsdigest#(config-line)# no shutdown Examsdigest#(config-line)# end Examsdigest#(config)# ip default-gateway 199.255.240.1 (C) Examsdigest#(config)# interface vlan 1 Examsdigest#(config-line)# ip address 199.255.240.100 255.255.0.0 Examsdigest#(config-line)# no shutdown Examsdigest#(config-line)# end Examsdigest#(config)# ip default-gateway 199.255.240.1 (D) Examsdigest#(config)# interface vlan 11 Examsdigest#(config-line)# ip address 199.255.240.100 255.255.255.0 Examsdigest#(config-line)# no shutdown Examsdigest#(config-line)# end Examsdigest#(config)# ip default-gateway 199.255.240.1
(A) Examsdigest#(config)# interface vlan 1 Examsdigest#(config-line)# ip address 199.255.240.100 255.255.255.0 Examsdigest#(config-line)# no shutdown Examsdigest#(config-line)# end Examsdigest#(config)# ip default-gateway 199.255.240.1
34
Which of the following configuration commands defines the password that all users must use to reach enable mode? (A) enable secret “type password“ (B) enable “type password“ (C) secret “type password“ (D) secret enable “type password“
(A) enable secret “type password“
35
Which of the following command will you type to produce the output below? Vlan1 is up, line protocol is up Hardware is EtherSVI, address is 0023.e21b.4cc0 (bia 0023.e21b.4cc0) Internet address is 192.168.1.101/24 MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 (A) show interfaces vlans (B) show interfaces (C) show interfaces vlan 1 (D) show vlan 1
(C) show interfaces vlan 1
36
NVRAM stores the initial or startup configuration file that is used when the switch is first powered on and when the switch is reloaded. (A) TRUE (B) FALSE
(A) TRUE
37
Which of the following commands will you type to configure the interface VLAN 5 of the switch to learn the IP address with DHCP? (A) configure terminal interface vlan 5 no shutdown (B) configure terminal interface vlan 5 ip address dhcp no shutdown (C) configure terminal native vlan dhcp ip address dhcp (D) configure terminal interface vlan 5 ip address dhcp
(B) configure terminal interface vlan 5 ip address dhcp no shutdown
38
The running (active) configuration file is stored in the Flash Memory. (A) TRUE (B) FALSE
(B) FALSE
39
Which of the following Cisco IOS Software Command Help lists commands that start with int? (A) int (B) int? (C)? (D) int?
(D) int?
40
Type the configuration command that produce the given output. (A) show mac address-table dynamic (B) show address-table (C) show mac (D) show dynamic address-table
(A) show mac address-table dynamic
41
Which of the following addresses are not valid Class A network IDs? (Choose all that apply) (A) 1.0.0.0 (B) 5.0.0.0 (C) 140.0.0.0 (D) 127.0.0.0 (E) 9.0.0.0 (F) 195.0.0.0
(A) 1.0.0.0 (B) 5.0.0.0 **(C) 140.0.0.0** **(D) 127.0.0.0** (E) 9.0.0.0 **(F) 195.0.0.0** | C, D and F are the correct answers. Class A networks have the first octe
42
Why does the formula for the number of hosts per subnet (2H – 2) require the subtraction of two hosts? (A) To reserve two addresses for redundant default gateways (routers) (B) To reserve the two addresses required for DHCP operation (C) To reserve addresses for the subnet broadcast address and subnet ID (D) To reserve addresses for the subnet ID and default
(A) To reserve two addresses for redundant default gateways (routers) (B) To reserve the two addresses required for DHCP operation **(C) To reserve addresses for the subnet broadcast address and subnet ID** (D) To reserve addresses for the subnet ID and default | By definition, two address values in every IPv4 subnet cannot be used as
43
Which of the following addresses are valid Class C network IDs? (Choose two answers) (A) 195.0.0.0 (B) 22.22.3.0 (C) 222.0.0.0 (D) 191.255.255.0 (E) 127.0.0.0
**(A) 195.0.0.0** (B) 22.22.3.0 **(C) 222.0.0.0** (D) 191.255.255.0 (E) 127.0.0.0 | Class C networks have the first octet in the range of 192–223, inclusive
44
A network designer asked you how many subnet (S) bits does he need to create 200 subnets? (A) 2 (B) 5 (C) 8 (D) 11
(A) 2 (B) 5 **(C) 8 ** (D) 11 | 8 bits are enough to create 200 subnets. You need to follow the formula
45
he addresses in the same network have different values in the network part. (A) TRUE (B) FALSE
(A) TRUE **(B) FALSE** | The addresses in the classful network have a structure with two parts: t
46
Which of the following IPv4 addresses has a subnet mask 255.255.0.0? (A) 188.187.186.185 (B) 204.203.202.201 (C) 55.44.22.11 (D) 10.0.0.56
**(A) 188.187.186.185** (B) 204.203.202.201 (C) 55.44.22.11 (D) 10.0.0.56 | Class B networks have the first octet in the range of 128–191.
47
Which of the following IPv4 addresses has a subnet mask 255.255.255.0? (A) 188.187.186.185 (B) 204.203.202.201 (C) 55.44.22.11 (D) 10.0.0.56
(A) 188.187.186.185 **(B) 204.203.202.201** (C) 55.44.22.11 (D) 10.0.0.56
48
The first octet range from the Class A IP networks is 1 - 126. (A) TRUE (B) FALSE
**(A) TRUE** (B) FALSE
49
Which of the following IPv4 addresses has a subnet mask 255.0.0.0? (Choose all that apply) (A) 188.187.186.185 (B) 204.203.202.201 (C) 55.44.22.11 (D) 10.0.0.56 (E) 100.24.5.56 (F) 192.168.178.6 LLC, ExamsDigest; Gorgotsias, Nikolaos. CCNA 200-301 Practice Exam Questions 2020 [fully updated]: 230+ Practice Questions and Free One-month Unlimited Access on Examsdigest.com (Page 64). . Kindle Edition.
(A) 188.187.186.185 (B) 204.203.202.201 **(C) 55.44.22.11** **(D) 10.0.0.56 ** **(E) 100.24.5.56 ** (F) 192.168.178.6
50
Which of the following ranges is a valid class B network numbers? (A) 128.0.0.0 - 191.255.0.0 (B) 1.0.0.0 - 126.0.0.0 (C) 192.0.0.0 - 223.255.255.0 (D) 224.0.0.0 - 254.255.255.0
**(A) 128.0.0.0 - 191.255.0.0** (B) 1.0.0.0 - 126.0.0.0 (C) 192.0.0.0 - 223.255.255.0 (D) 224.0.0.0 - 254.255.255.0
51
Which of the following ranges is a valid class C network numbers? (A) 128.0.0.0 - 191.255.0.0 (B) 1.0.0.0 - 126.0.0.0 (C) 192.0.0.0 - 223.255.255.0 (D) 224.0.0.0 - 254.255.255.0
(A) 128.0.0.0 - 191.255.0.0 (B) 1.0.0.0 - 126.0.0.0 **(C) 192.0.0.0 - 223.255.255.0** (D) 224.0.0.0 - 254.255.255.0
52
Which of the following is the default mask of the IP 10.2.0.0? (A) 255.0.0.0 (B) 255.255.0.0 (C) 255.255.255.0 (D) 255.255.255.255
**(A) 255.0.0.0** (B) 255.255.0.0 (C) 255.255.255.0 (D) 255.255.255.255 | Class A networks have the first octet in the range of 1–126.
53
hat information can you extract having the IP address 172.16.99.45? (Choose two answers.) (A) The network ID is 172.0.0.0. (B) The default mask for the network is 255.255.255.0. (C) The network is a Class B network. (D) The number of host bits in the unsubnetted network is 16. (E) The broadcast address of the network is 172.255.255.255
(A) The network ID is 172.0.0.0. (B) The default mask for the network is 255.255.255.0. **(C) The network is a Class B network. ** **(D) The number of host bits in the unsubnetted network is 16. ** (E) The broadcast address of the network is 172.255.255.255 | The first octet (172) is in the range of values for Class B addresses (1
54
A network designer asked you how many subnets (S) bits does he need to create 100 subnets? (Type only the number) (A) 4 (B) 5 (C) 6 (D) 7
(A) 4 (B) 5 (C) 6 **(D) 7** | You need to follow the formula of 2S > number of subnets
55
The senior network engineer asked you to choose the broadcast address from the last subnet according to the following details: Network 172.28.0.0 (Class B) Mask 255.255.0.0 (for all subnets) (A) 172.28.255.254 (B) 172.255.255.255 (C) 172.28.200.255 (D) 172.28.255.255
(A) 172.28.255.254 (B) 172.255.255.255 (C) 172.28.200.255 **(D) 172.28.255.255**
56
The address 130.0.0.0 is a Class ____________ network ID (A) A (B) B (C) C (D) D
(A) A **(B) B** (C) C (D) D
57
Which of the following is the default mask of the IP 178.25.3.0? (A) 255.0.0.0 (B) 255.255.0.0 (C) 255.255.255.0 (D) 255.255.255.255
(A) 255.0.0.0 **(B) 255.255.0.0** (C) 255.255.255.0 (D) 255.255.255.255
58
The address 200.0.0.0 is a Class ____________ network ID (A) A (B) B (C) C (D) D
(A) A (B) B **(C) C** (D) D
59
The range of the Class C public IP Networks is _________________ - _________________ (A) 10.0.0.0 - 140.255.255.0 (B) 192.0.0.0 - 223.255.255.0 (C) 200.0.0.0 - 223.255.255.0 (D) 224.0.0.0 - 254.255.255.0
(A) 10.0.0.0 - 140.255.255.0 **(B) 192.0.0.0 - 223.255.255.0** (C) 200.0.0.0 - 223.255.255.0 (D) 224.0.0.0 - 254.255.255.0
60
The senior network engineer asked you to choose the last usable address for a host from the last subnet according to the following details: Network 9.0.0.0 (Class A) Mask 255.255.0.0 (for all subnets) (A) 9.255.255.254 (B) 10.255.255.254 (C) 11.255.255.254 (D) 12.255.255.254
**(A) 9.255.255.254** (B) 10.255.255.254 (C) 11.255.255.254 (D) 12.255.255.254
61
The first octet range from the Class B IP networks is 1 - 126. (A) TRUE (B) FALSE
(A) TRUE **(B) FALSE**
62
A network designer asked you how many subnet (S) bits does he need to create 5 subnets? (A) 2 (B) 3 (C) 4 (D) 5
(A) 2 **(B) 3** (C) 4 (D) 5
63
Which of the following are private IP networks? (Choose all that apply) (A) 172.31.100.0 (B) 164.16.2.0 (C) 192.166.255.0 (D) 192.168.1.0 (E) 11.11.11.0 (F) 172.24.0.0
**(A) 172.31.100.0** (B) 164.16.2.0 (C) 192.166.255.0 **(D) 192.168.1.0** (E) 11.11.11.0 **(F) 172.24.0.0**
64
The senior network engineer typed the following commands on the R1. R1# conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)# interface g0/0/0 R1(config-if)# ip ospf cost 6 R1(config-if)# interface g0/1/0 R1(config-if)# ip ospf cost 7 R1(config-if)# ^Z What command will you type in order to confirm the OSPF interface costs? (A) show ip ospf (B) show ip ospf interface brief (C) show ospf brief (D) show ospf interface brief
(A) show ip ospf **(B) show ip ospf interface brief** (C) show ospf brief (D) show ospf interface brief
65
Per the command output, with how many routers is router R4 full adjacent over its Gi0/1 interface? R4# show ip ospf interface brief (A) 1 (B) 5 (C) 2 (D) 0
(A) 1 (B) 5 **(C) 2** (D) 0
66
You have been tasked to list the OSPF neighbors off interface serial 0/1. Which command will you type to complete the task? (A) show ip ospf neighbor serial 0/1 (B) show ip ospf neighbor serial 1/0 (C) show ip ospf neighbor fastethernet 0/1 (D) show ip ospf serial 0/1
(A) show ip ospf neighbor serial 0/1 **(B) show ip ospf neighbor serial 1/0** (C) show ip ospf neighbor fastethernet 0/1 (D) show ip ospf serial 0/1
67
The routing protocol that was designed and intended for use between different autonomous systems is called ____________________________. (A) interior gateway protocol (B) different gateway protocol (C) autonomous gateway protocol (D) exterior gateway protocol
(A) interior gateway protocol (B) different gateway protocol (C) autonomous gateway protocol **(D) exterior gateway protocol**
68
Given the following OSPF network commands, type the wildcard masks to match the requirement. Requirement: Match addresses that begin with 110.20 Command: network 110.20.0.0 {wildcard mask} Which of the following wildcard mask will you use to meet the requirement? (A) 0.0.255.255 (B) 0.0.0.255 (C) 0.255.255.255 (D) 0.0.0.0
**(A) 0.0.255.255** (B) 0.0.0.255 (C) 0.255.255.255 (D) 0.0.0.0
69
Which of the following commands produces the output below? Codes: L – local, C – connected, S – static, R – RIP, M – mobile, B – BGP D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2 E1 – OSPF external type 1, E2 – OSPF external type 2 ! Additional lines omitted for brevity Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 9 subnets, 2 masks 10.1.1.0/24 [110/2] via 10.1.14.1, 00:19:24, GigabitEthernet0/0/0 10.1.2.0/24 [110/2] via 10.1.14.1, 00:19:24, GigabitEthernet0/0/0 C 10.1.4.0/24 is directly connected, Vlan3 L 10.1.4.4/32 is directly connected, Vlan3 10.1.12.0/24 [110/2] via 10.1.14.1, 00:17:24, GigabitEthernet0/0/0 10.1.13.0/24 [110/2] via 10.1.14.1, 00:14:15, GigabitEthernet0/0/0 C 10.1.14.0/24 is directly connected, GigabitEthernet0/0/0 L 10.1.14.4/32 is directly connected, GigabitEthernet0/0/0 10.1.23.0/24 [110/3] via 10.1.14.1, 00:15:35, GigabitEthernet0/0/0 (A) show ip codes (B) show ip route (C) show ip interfaces (D) show ip connected
(A) show ip codes **(B) show ip route** (C) show ip interfaces (D) show ip connected
70
***Routing*** protocol is a set of rules, and algorithms used by routers for the overall purpose of learning routes. This process includes the exchange and analysis of routing information. (A) TRUE (B) FALSE
**(A) TRUE** (B) FALSE
71
***Routed*** protocol is a protocol that defines a packet structure and logical addressing, allowing routers to forward or route the packets. (A) TRUE (B) FALSE
**(A) TRUE** (B) FALSE
72
Which of the following network commands following the command router ospf 1, tells the router to start using OSPF on interfaces whose IP addresses are 20.1.20.1, 20.1.30.1, and 20.1.40.1? (A) network 20.0.0.1 0.0.255.255 area 0 (B) network 20.0.0.1 0.0.0.255 area 0 (C) network 20.0.0.0 255.0.0.0 area 0 (D) network 20.0.0.0 0.255.255.255 area 0
(A) network 20.0.0.1 0.0.255.255 area 0 (B) network 20.0.0.1 0.0.0.255 area 0 (C) network 20.0.0.0 255.0.0.0 area 0 **(D) network 20.0.0.0 0.255.255.255 area 0**
73
The network designer provides the following network diagram for OSPF Single-Area to start the configuration Based on the diagram, configure the R2 following the details below. 1. Enable OSPF process 2 2. Enable OSPF on all interfaces with a single command (A) R2# router ospf 3 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0 (B) R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0 (C) R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.0.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.0.0 R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 1 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0
(A) R2# router ospf 3 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0 **(B) R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0** (C) R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 0 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.0.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.0.0 (D) R2# router ospf 2 R2# network 0.0.0.0 255.255.255.255 area 1 R2# interface GigabitEthernet0/0 R2(config-if)# ip address 158.159.170.2 255.255.255.0 R2# interface GigabitEthernet0/1/0 R2(config-if)# ip address 158.159.160.2 255.255.255.0
74
Given the following OSPF network diagram, what router will be added to R1’s routing table as a next-hop? (A) R2 (B) R4 (C) R7 (D) R5
(A) R2 **(B) R4** (C) R7 (D) R5
75
You have been task to list the interfaces on which the OSPF protocol is enabled. Which of the following command will you type? (A) show ip ospf brief (B) show ip ospf interface brief (C) show ip interface brief (D) show ospf interface brief
(A) show ip ospf brief **(B) show ip ospf interface brief** (C) show ip interface brief (D) show ospf interface brief
76
A network engineer connects routers R5 and R6 to the same Ethernet LAN and configures them to use OSPFv2. Which answers describe a combination of settings that would prevent the two routers from becoming OSPF neighbors? (A) Both routers’ interface IP addresses are in the same subnet (B) Both routers’ OSPF process uses process ID 3 (C) Both routers’ OSPF process uses router ID 42.42.42.42 (D) Both routers’ interfaces use an OSPF Dead interval of 80
(A) Both routers’ interface IP addresses are in the same subnet (B) Both routers’ OSPF process uses process ID 3 **(C) Both routers’ OSPF process uses router ID 42.42.42.42 ** (D) Both routers’ interfaces use an OSPF Dead interval of 80
77
Which of the following terms described as an OSPF router with interfaces connected to the backbone area and to at least one other area? (A) Backbone area (B) Internal router (C) Backbone router (D) Area Border Router
(A) Backbone area (B) Internal router (C) Backbone router **(D) Area Border Router**
78
Which of the following route types has 110 as default Administrative Distance (AD)? (A) IGRP (B) OSPF (C) RIP (D) IS-IS
(A) IGRP **(B) OSPF** (C) RIP (D) IS-IS
79
You have noticed that a server with IP 145.45.3.2 doesn’t respond to requests. What command will you type first in order to test connectivity between your device and the server? (A) request 145.45.3.2 (B) check 145.45.3.2 (C) ping 145.45.3.2 (D) ping 145.45.3.2
(A) request 145.45.3.2 (B) check 145.45.3.2 **(C) ping 145.45.3.2** (D) ping 145.45.3.2
80
A LAN design uses a Layer 3 EtherChannel between two switches SW1 and SW2, with port-channel interface 1 used on both switches. SW1 uses ports G0/1 and G0/2 in the channel. However, only interface G0/1 is bundled into the channel and working. Think about the configuration settings on port G0/2 that could have existed before adding G0/2 to the EtherChannel. Which answers identify a setting that could prevent IOS from adding G0/2 to the Layer 3 EtherChannel? (Choose two answers.) (A) A different STP cost (spanning-tree cost value) (B) A different access VLAN (switchport access vlan vlanid) (C) A different speed (speed value) (D) A default setting for switchport (switchport)
(A) A different STP cost (spanning-tree cost value) (B) A different access VLAN (switchport access vlan vlanid) **(C) A different speed (speed value) ** **(D) A default setting for switchport (switchport)**
81
A network engineer has configured a Layer 3 switch with SVIs for VLANs 4 and 5. Hosts in the subnets using VLANs 4 and 5 can ping each other with the Layer 3 switch routing the packets. The next week, the network engineer receives a call that those same users can no longer ping each other. If the problem is with the Layer 3 switching function, which of the following could have caused the problem? (Choose two answers.) (A) A shutdown command issued from VLAN 4 configuration mode (B) VTP on the switch removing VLAN 5 from the switch’s VLAN list (C) 1 out of 10 working VLAN 4 access ports failing due to physical problems (D) A shutdown command issued from VLAN 6 configuration mode
**(A) A shutdown command issued from VLAN 4 configuration mode ** **(B) VTP on the switch removing VLAN 5 from the switch’s VLAN list ** (C) 1 out of 10 working VLAN 4 access ports failing due to physical problems (D) A shutdown command issued from VLAN 6 configuration mode
82
Which of the given commands produces the following output? Global values: Internet Protocol routing is enabled Embedded-Service-Engine0/0 is administratively down, line protocol is down GigabitEthernet0/0 is up, line protocol is up Internet address is 158.16.1.1/24 GigabitEthernet0/1 is administratively down, line protocol is down Serial0/0/0 is up, line protocol is up Internet address is 158.16.4.1/24 Serial0/0/1 is administratively down, line protocol is down GigabitEthernet0/1/0 is up, line protocol is up Internet address is 158.16.1.1/24 (A) show interfaces (B) show protocols (C) show values (D) show routing
(A) show interfaces **(B) show protocols** (C) show values (D) show routing
83
Which of the following commands lists the router’s entire routing table? (A) show route (B) show routing table (C) show ip route (D) show route table
(A) show route (B) show routing table **(C) show ip route** (D) show route table
84
Which of the following commands lists detailed information about the route 156.10.2.0. (A) show route 156.10.2.0 (B) show routing table 156.10.2.0 (C) show ip route 156.10.2.0 (D) show route table 156.10.2.0
(A) show route 156.10.2.0 (B) show routing table 156.10.2.0 **(C) show ip route 156.10.2.0** (D) show route table 156.10.2.0
85
The commands ping and traceroute send messages in the network to test connectivity and rely on other devices to send back a reply (A) TRUE (B) FALSE
**(A) TRUE ** (B) FALSE
86
A router lists the following partial output from the show ip route command. Out which interface will the router route packets destined to IP address 180.5.38.122? 10.0.0.0/8 is variably subnetted, 8 subnets, 5 masks 180.5.38.100/32 [110/50] via 172.16.25.2, 00:00:04, GigabitEthernet0/0/0 O 180.5.38.64/26 [110/100] via 172.16.25.129, 00:00:09, GigabitEthernet0/1/0 180.5.37.0/23 [110/65] via 172.16.24.2, 00:00:04, GigabitEthernet0/2/0 180.5.38.96/27 [110/65] via 172.16.24.129, 00:00:09, GigabitEthernet0/3/0 0.0.0.0/0 [110/129] via 172.16.25.129, 00:00:09, GigabitEthernet0/0/0 (A) G0/3/0 (B) G0/2/0 (C) G0/1/0 (D) G0/0/0
**(A) G0/3/0** (B) G0/2/0 (C) G0/1/0 (D) G0/0/0
87
You are connected on a router R1, Which command will you type the command to connect to R2 using SSH. Login credentials in order to get access to R2. R2’s IP address: 145.167.2.1 username: userexamsdigest password: passexamsdigest (A) ssh -l userexamsdigest 145.167.2.1 passexamsdigest (B) ssh -l userexamsdigest 145.167.2.2 passexamsdigest (C) ssh -l userexams 145.167.2.1passexamsdigest (D) ssh -l userexamsdigest 145.167.2.1 examsdigest
**(A) ssh -l userexamsdigest 145.167.2.1 passexamsdigest** (B) ssh -l userexamsdigest 145.167.2.2 passexamsdigest (C) ssh -l userexams 145.167.2.1passexamsdigest (D) ssh -l userexamsdigest 145.167.2.1 examsdigest
88
The senior network engineer of your company, tells you to configure the interfaces of the R1 based on the diagram below. The subnet mask is 255.255.255.0. (A) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown (B) R1# configure terminal R1(config)# interface G0/1 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/0 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown (C) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/1 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown (D) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.0.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.0.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.0.0 R1(config-if)# no shutdown
**(A) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown ** (B) R1# configure terminal R1(config)# interface G0/1 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/0 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown (C) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.255.0 R1(config-if)# no shutdown R1(config-if)# interface S0/1 R1(config-if)# ip address 158.159.160.1 255.255.255.0 R1(config-if)# no shutdown (D) R1# configure terminal R1(config)# interface G0/0 R1(config-if)# ip address 158.159.162.1 255.255.0.0 R1(config-if)# no shutdown R1(config-if)# interface G0/1 R1(config-if)# ip address 158.159.161.1 255.255.0.0 R1(config-if)# no shutdown R1(config-if)# interface S0/0 R1(config-if)# ip address 158.159.160.1 255.255.0.0 R1(config-if)# no shutdown
89
You have been tasked to set the router’s IPv4 address and mask. What command will you type to complete the task? (A) ip address [address mask] (B) interface [address mask] (C) set ip [address mask] (D) add address [address mask]
**(A) ip address [address mask] ** (B) interface [address mask] (C) set ip [address mask] (D) add address [address mask]
90
You have been tasked to list a single line of information about each interface, including the IP address, line and protocol status, and the method with which the address was configured. What command will you type to complete the task? (A) show ip protocol brief (B) show ip addresses brief (C) show ip interface brief (D) show ip status brief
(A) show ip protocol brief (B) show ip addresses brief **(C) show ip interface brief** (D) show ip status brief
91
After configuring a working router interface with IP address/mask 10.1.1.100/26, which of the following routes would you expect to see in the output of the show ip route command? (Choose two answers.) (A) A connected route for subnet 10.1.1.64 255.255.255.192 (B) A local route for host 10.1.1.64 255.255.255.255 (C) A local route for host 10.1.1.100 255.255.255.255 (D) A local route for host 10.1.1.100 255.255.255.192 (E) A connected route for subnet 10.1.1.0 255.255.255.0
**(A) A connected route for subnet 10.1.1.64 255.255.255.192** (B) A local route for host 10.1.1.64 255.255.255.255 **(C) A local route for host 10.1.1.100 255.255.255.255** (D) A local route for host 10.1.1.100 255.255.255.192 (E) A connected route for subnet 10.1.1.0 255.255.255.0
92
What command will you type to enable a switch's interface to be a routed interface instead of a switched interface (A) routed interface (B) enable interface (C) no switch interface (D) no switchport
(A) routed interface (B) enable interface (C) no switch interface **(D) no switchport**
93
You are responsible to configure a static route for the network 156.187.45.0/24 using the IP address 156.187.80.45 as the next-hop IP. Which command will you type to meet the requirement? (A) ip route 156.187.45.0 255.255.0.0 156.187.80.45 (B) ip route 156.187.45.0 255.255.255.0 156.187.80.46 (C) ip route 156.187.0.0 255.255.255.0 156.187.80.45 (D) ip route 156.187.45.0 255.255.255.0 156.187.80.45
(A) ip route 156.187.45.0 255.255.0.0 156.187.80.45 (B) ip route 156.187.45.0 255.255.255.0 156.187.80.46 (C) ip route 156.187.0.0 255.255.255.0 156.187.80.45 **(D) ip route 156.187.45.0 255.255.255.0 156.187.80.45**
94
Given the following IP address - 20.54.23.3 and subnet mask - 255.255.255.0 choose the subnet ID and the broadcast address from that particular IP. (A) Subnet ID: 20.54.23.0 Broadcast Address: 20.54.23.255 (B) Subnet ID: 20.54.0.0 Broadcast Address: 20.54.0.255 (C) Subnet ID: 20.54.0.0 Broadcast Address: 20.54.255.255 (D) Subnet ID: 20.54.23.1 Broadcast Address: 20.54.23.255
**(A) Subnet ID: 20.54.23.0 Broadcast Address: 20.54.23.255** (B) Subnet ID: 20.54.0.0 Broadcast Address: 20.54.0.255 (C) Subnet ID: 20.54.0.0 Broadcast Address: 20.54.255.255 (D) Subnet ID: 20.54.23.1 Broadcast Address: 20.54.23.255
95
The converted binary mask 11111110.00000000.00000000.00000000 to decimal is _______________ (A) 255.255.255.254 (B) 254.0.0.0 (C) 255.254.0.0 (D) 255.255.254.0
(A) 255.255.255.254 **(B) 254.0.0.0** (C) 255.254.0.0 (D) 255.255.254.0
96
You are working with a network engineer to design a network for the new Campus. He provided the following details: The IP address is 195.240.37.43 The subnet mask is 255.255.255.224 You have been tasked to: 1. Find the Prefix length 2. Find the Class of the address (A) Prefix length = 24 | Class = C (B) Prefix length = 20 | Class = B (C) Prefix length = 15 | Class = C (D) Prefix length = 30 | Class = A
**(A) Prefix length = 24 | Class = C ** (B) Prefix length = 20 | Class = B (C) Prefix length = 15 | Class = C (D) Prefix length = 30 | Class = A
97
Your senior network engineer tells you to configure the DHCP server to lease the last 100 usable IP addresses in subnet 12.5.4.0/23. Which of the following IP addresses could be leased as a result of your new configuration? (A) 12.5.1.156 (B) 12.5.5.200 (C) 12.5.4.254 (D) 12.5.255.200
(A) 12.5.1.156 **(B) 12.5.5.200** (C) 12.5.4.254 (D) 12.5.255.200
98
You are working with a network engineer to design a network for the new Campus. He provided the following details: The IP address is 195.240.37.43 The subnet mask is 255.255.255.224 You have been tasked to find the: 1. Network (N) bits 2. 2. Subnet bits (S) 3. Host (H) bits. (A) Network Bits = 15 | Subnet Bits = 2 | Host Bits = 1 (B) Network Bits = 20 | Subnet Bits = 3 | Host Bits = 1 (C) Network Bits = 24 | Subnet Bits = 3 | Host Bits = 5 (D) Network Bits = 28 | Subnet Bits = 1 | Host Bits = 2
1. Network (N) bits 2. 2. Subnet bits (S) 3. Host (H) bits. (A) Network Bits = 15 | Subnet Bits = 2 | Host Bits = 1 (B) Network Bits = 20 | Subnet Bits = 3 | Host Bits = 1 **(C) Network Bits = 24 | Subnet Bits = 3 | Host Bits = 5** (D) Network Bits = 28 | Subnet Bits = 1 | Host Bits = 2
99
Which of the following binary masks is equivalent to the 255.255.255.240 dotted-decimal notation (DDN)? (A) 11111111.11111111.11111111.11111100 (B) 11111111.11111111.11111111.11110000 (C) 11111111.11111111.11111111.10000000 (D) 11111111.11111111.11111111.11111110
(A) 11111111.11111111.11111111.11111100 **(B) 11111111.11111111.11111111.11110000** (C) 11111111.11111111.11111111.10000000 (D) 11111111.11111111.11111111.11111110
100
Which of the following binary masks is equivalent to the 255.192.0.0 dotted-decimal notation (DDN)? (A) 11111111.11000000.00000000.00000000 (B) 11111111.11111111.11111111.00000000 (C) 11111111.11111111.11111111.10000000 (D) 11111111.11111111.11111111.11111110
**(A) 11111111.11000000.00000000.00000000** (B) 11111111.11111111.11111111.00000000 (C) 11111111.11111111.11111111.10000000 (D) 11111111.11111111.11111111.11111110
101
Find the subnet ID from the IP address 10.75.20.3/24 (A) 10.75.5.0 (B) 10.75.0.0 (C) 10.75.20.0 (D) 10.0.0.0
(A) 10.75.5.0 (B) 10.75.0.0 **(C) 10.75.20.0** (D) 10.0.0.0
102
Find the subnet ID from the IP address 10.75.20.4/17 (A) 10.75.5.0 (B) 10.75.0.0 (C) 10.75.20.0 (D) 10.0.0.0
(A) 10.75.5.0 **(B) 10.75.0.0** (C) 10.75.20.0 (D) 10.0.0.0
103
Which of the following dotted-decimal notation (DDN) is equivalent of /17. (A) 255.255.192.0 (B) 255.128.0.0 (C) 255.255.128.0 (D) 255.255.224.0
(A) 255.255.192.0 (B) 255.128.0.0 **(C) 255.255.128.0 ** (D) 255.255.224.0
104
Which of the following dotted-decimal notation (DDN) is equivalent of /28. (A) 255.255.255.240 (B) 255.128.224.0 (C) 255.255.255.224 (D) 255.255.255.248
**(A) 255.255.255.240** (B) 255.128.224.0 (C) 255.255.255.224 (D) 255.255.255.248
105
The broadcast address from the IP address 67.68.67.68/12 is 67.79.255.255. (A) TRUE (B) FALSE
**(A) TRUE** (B) FALSE
106
Subnet masks can be written as 32-bit binary numbers, but not just any binary number. In particular, the binary subnet mask must follow these rules: 1. The value must not interleave 1s and 0s. 2. If 0s exist, they are on the left. 3. If 1s exist, they are on the right. (A) TRUE (B) FALSE
(A) TRUE **(B) FALSE**
107
Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0? (A) /20 (B) /21 (C) /22 (D) /23
(A) /20 (B) /21 (C) /22 **(D) /23**
108
Which of the following answers lists the prefix (CIDR) format equivalent of 255.192.0.0? (A) /10 (B) /11 (C) /12 (D) /13
**(A) /10** (B) /11 (C) /12 (D) /13
109
Your task is to troubleshoot a user’s PC with IP 192.168.100.1/28. Based on the given details choose the number of the network (N), subnet (S), and host (H) bits. (A) Network Bits = 28 | Subnet Bits = 1 | Host Bits = 2 (B) Network Bits = 20 | Subnet Bits = 5 | Host Bits = 7 (C) Network Bits = 24 | Subnet Bits = 4 | Host Bits = 4 (D) Network Bits = 30 | Subnet Bits = 1 | Host Bits = 1
(A) Network Bits = 28 | Subnet Bits = 1 | Host Bits = 2 (B) Network Bits = 20 | Subnet Bits = 5 | Host Bits = 7 **(C) Network Bits = 24 | Subnet Bits = 4 | Host Bits = 4 ** (D) Network Bits = 30 | Subnet Bits = 1 | Host Bits = 1
110
Your task is to find the broadcast address from the IP address 10.75.20.3 with subnet mask 255.248.0.0 (A) Broadcast address: 10.75.255.255 (B) Broadcast address: 10.75.20.255 (C) Broadcast address: 10.79.255.255 (D) Broadcast address: 10.80.255.255
(A) Broadcast address: 10.75.255.255 (B) Broadcast address: 10.75.20.255 **(C) Broadcast address: 10.79.255.255** (D) Broadcast address: 10.80.255.255
111
Your task is to find the broadcast address from the IP address 172.30.70.26 with subnet mask 255.255.192.0 (A) Broadcast address: 172.30.127.255 (B) Broadcast address: 172.30.70.255 (C) Broadcast address: 172.30.100.255 (D) Broadcast address: 172.30.87.255
**(A) Broadcast address: 172.30.127.255** (B) Broadcast address: 172.30.70.255 (C) Broadcast address: 172.30.100.255 (D) Broadcast address: 172.30.87.255
112
Which of the following answers lists the dotted- decimal notation (DDN) equivalent of /30? (A) 255.255.255.240 (B) 255.255.255.252 (C) 255.255.192.0 (D) 255.255.252.0
(A) 255.255.255.240 **(B) 255.255.255.252** (C) 255.255.192.0 (D) 255.255.252.0
113
Which of the following answers lists the dotteddecimal notation (DDN) equivalent of /18? (A) 255.255.255.192 (B) 255.255.224.0 (C) 255.255.128.0 (D) 255.255.192.0
(A) 255.255.255.192 (B) 255.255.224.0 (C) 255.255.128.0 **(D) 255.255.192.0**
114
Which of the following masks, when used within a Class B network, would supply enough subnet bits to support 90 subnets? (Choose two) (A) /24 (B) /21 (C) /19 (D) 255.255.255.252 (E) 255.255.240.0 (F) 255.255.224.0
**(A) /24** (B) /21 (C) /19 **(D) 255.255.255.252** (E) 255.255.240.0 (F) 255.255.224.0
115
Which of the following masks, when used within a Class A network, would supply enough subnet bits to support 8 subnets? (Choose two) (A) /10 (B) /11 (C) /9 (D) /8
(A) /10 **(B) /11** (C) /9 (D) /8
116
our task is to troubleshoot a user’s PC with IP 10.20.30.5 and mask 255.255.255.0. Based on the given details type the number of the network (N), subnet (S), and host (H) bits. (A) Network Bits = 16 | Subnet Bits = 15 | Host Bits = 1 (B) Network Bits = 16 | Subnet Bits = 1 | Host Bits = 15 (C) Network Bits = 8 | Subnet Bits = 8 | Host Bits = 16 (D) Network Bits = 8 | Subnet Bits = 16 | Host Bits = 8
(A) Network Bits = 16 | Subnet Bits = 15 | Host Bits = 1 (B) Network Bits = 16 | Subnet Bits = 1 | Host Bits = 15 (C) Network Bits = 8 | Subnet Bits = 8 | Host Bits = 16 **(D) Network Bits = 8 | Subnet Bits = 16 | Host Bits = 8**
117
The converted binary mask 11111111.11111111.11111110.00000000 to decimal is _______________. (A) 255.255.255.192 (B) 255.255.254.0 (C) 255.255.252.0 (D) 255.255.255.224
(A) 255.255.255.192 **(B) 255.255.254.0 ** (C) 255.255.252.0 (D) 255.255.255.224
118
Which of the following binary masks is equivalent to the 255.192.0.0 dotted-decimal notation (DDN)? (A) 11111111.11000000.00000000.00000000 (B) 11111111.11100000.00000000.00000000 (C) 11111111.11110000.00000000.00000000 (D) 11111111.11111000.00000000.00000000
**(A) 11111111.11000000.00000000.00000000** (B) 11111111.11100000.00000000.00000000 (C) 11111111.11110000.00000000.00000000 (D) 11111111.11111000.00000000.00000000
119
When APs are placed at different geographic locations, they can all be interconnected by a switched infrastructure. The 802.11 standard calls this an extended service set (ESS). (A) TRUE (B) FALSE
When APs are placed at different geographic locations, they can all be interconnected by a switched infrastructure. The 802.11 standard calls this an extended service set (ESS). **(A) TRUE** (B) FALSE
120
A lightweight access point in which one of the following architectures participate? (A) Light-MAC (B) Tunnel-MAC (C) Big-MAC (D) Split-MAC
A lightweight access point in which one of the following architectures participate? (A) Light-MAC (B) Tunnel-MAC (C) Big-MAC **(D) Split-MAC**
121
Which of the following controller ports is used to connect to a peer controller for high availability (HA) operation? (A) Service port (B) Distribution system port (C) Redundancy port (D) Console port
Which of the following controller ports is used to connect to a peer controller for high availability (HA) operation? (A) Service port (B) Distribution system port **(C) Redundancy port** (D) Console port
122
Which of the following wireless security tools is used to protect the integrity of data in a wireless frame? (A) MIC (B) WIPS (C) WEP (D) EAP
Which of the following wireless security tools is used to protect the integrity of data in a wireless frame? **(A) MIC - message integrity check** (B) WIPS (C) WEP (D) EAP
123
Wi-Fi is based on ________________ IEEE standards. (A) 802.2 (B) 802.1 (C) 802.12 (D) 802.11
Wi-Fi is based on ________________ IEEE standards. (A) 802.2 (B) 802.1 (C) 802.12 **(D) 802.11** ## Footnote The IEEE 802.11 standard defines Wi-Fi, while 802.3 standard defines Ethernet.
124
Which of the following bridges can be used to provide wireless connectivity to a non-wireless device? (A) Wireless repeater (B) Workgroup bridge (C) Transparent bridge (D) Adaptive bridge
Which of the following bridges can be used to provide wireless connectivity to a non-wireless device? (A) Wireless repeater **(B) Workgroup bridge** (C) Transparent bridge (D) Adaptive bridge ## Footnote The workgroup bridge associates to an access point on your network
125
Which controller interface type maps a WLAN to a VLAN? (A) Management interface (B) Redundancy management (C) Virtual interface (D) Service port interface (E) Dynamic interface
Which controller interface type maps a WLAN to a VLAN? (A) Management interface (B) Redundancy management (C) Virtual interface (D) Service port interface **(E) Dynamic interface**
126
Which is the most preferred and secure way of connecting to a WLC GUI to configure a new WLAN? (A) SSH (B) HTTP (C) HTTPS (D) FTP (E) None of the above
Which is the most preferred and secure way of connecting to a WLC GUI to configure a new WLAN? (A) SSH (B) HTTP **(C) HTTPS** (D) FTP (E) None of the above
127
The maximum configurable number of WLANs on a controller is __________________. (A) 5 (B) 152 (C) 251 (D) 512
The maximum configurable number of WLANs on a controller is __________________. (A) 5 (B) 152 (C) 251 **(D) 512**
128
Which of the following IEEE 802.11 Wi-Fi standards use the 5 GHz band? (Choose all that apply) (A) 802.11 (B) 802.11b (C) 802.11g (D) 802.11a (E) 802.11n (F) 802.11ac (G) 802.11ax
Which of the following IEEE 802.11 Wi-Fi standards use the 5 GHz band? (Choose all that apply) (A) 802.11 (B) 802.11b (C) 802.11g **(D) 802.11a (E) 802.11n (F) 802.11ac (G) 802.11ax**
129
Wi-Fi commonly uses the 2.5GHz and __________________ GHz bands. (A) 5 (B) 3 (C) 1 (D) 4
Wi-Fi commonly uses the 2.5GHz and __________________ GHz bands. **(A) 5** (B) 3 (C) 1 (D) 4
130
Choose the term that best describes a Cisco wireless access point that operates in a standalone, independent manner. (A) Standalone Access point (AP) (B) Autonomous Access Point (AP) (C) Independent Access Point (AP) (D) Cisco Access Point (AP)
Choose the term that best describes a Cisco wireless access point that operates in a standalone, independent manner. (A) Standalone Access point (AP) **(B) Autonomous Access Point (AP)** (C) Independent Access Point (AP) (D) Cisco Access Point (AP)
131
You are creating a new WLAN with the controller GUI, which of the following parameters are necessary? (Choose two) (A) VLAN number (B) SSID (C) Interface (D) BSSID (E) IP subnet
You are creating a new WLAN with the controller GUI, which of the following parameters are necessary? (Choose two) (A) VLAN number **(B) SSID (C) Interface ** (D) BSSID (E) IP subnet
132
Which one of the following is a wireless encryption method that is not recommended for use due to vulnerability issues? (A) Advanced Encryption Standard (AES) (B) Wi-Fi Protected Access (WPA) (C) Wired Equivalent Privacy (WEP) (D) Extensible Authentication Protocol (EAP)
Which one of the following is a wireless encryption method that is not recommended for use due to vulnerability issues? (A) Advanced Encryption Standard (AES) (B) Wi-Fi Protected Access (WPA) **(C) Wired Equivalent Privacy (WEP)** (D) Extensible Authentication Protocol (EAP)
133
Which of the following IEEE 802.11 Wi-Fi standards use the 2.4 GHz band? (Choose all that apply) (A) 802.11 (B) 802.11b (C) 802.11g (D) 802.11a (E) 802.11n (F) 802.11ac (G) 802.11ax
Which of the following IEEE 802.11 Wi-Fi standards use the 2.4 GHz band? (Choose all that apply) **(A) 802.11 (B) 802.11b (C) 802.11g ** (D) 802.11a **(E) 802.11n** (F) 802.11ac **(G) 802.11ax**
134
Given the following URI https://courses.examsdigest.com/ccna, which part is the hostname? (A) https (B) courses (C) courses.examsdigest.com (D) examsdigest.com (E) examsdigest.com/ccna
Given the following URI https://courses.examsdigest.com/ccna, which part is the hostname? (A) https (B) courses **(C) courses.examsdigest.com ** (D) examsdigest.com (E) examsdigest.com/ccna
135
Which of the following protocols uses the port 443? (A) HTTPS (B) HTTP (C) SMTP (D) SSH
Which of the following protocols uses the port 443? **(A) HTTPS ** (B) HTTP (C) SMTP (D) SSH
136
Which of the following protocols uses the port 80? (A) HTTPS (B) HTTP (C) SMTP (D) SSH
Which of the following protocols uses the port 80? (A) HTTPS **(B) HTTP** (C) SMTP (D) SSH
137
Which of the following protocols uses the port 25? (A) HTTPS (B) HTTP (C) SMTP (D) SSH
Which of the following protocols uses the port 25? (A) HTTPS (B) HTTP **(C) SMTP** (D) SSH
138
Which of the following protocols uses the port 22? (A) HTTPS (B) HTTP (C) SMTP (D) SSH
Which of the following protocols uses the port 22? (A) HTTPS (B) HTTP (C) SMTP **(D) SSH**
139
Which of the following port numbers the SNMP protocol uses? (A) 20 (B) 25 (C) 160 (D) 161
Which of the following port numbers the SNMP protocol uses? (A) 20 (B) 25 (C) 160 **(D) 161**
140
Which of the following port numbers the POP3 protocol uses? (A) 100 (B) 110 (C) 120 (D) 130
Which of the following port numbers the POP3 protocol uses? (A) 100 **(B) 110 ** (C) 120 (D) 130
141
Which of the following port numbers the DNS protocol uses? (A) 50 (B) 51 (C) 52 (D) 53
Which of the following port numbers the DNS protocol uses? (A) 50 (B) 51 (C) 52 **(D) 53**
142
The senior network engineer assigns you a task that requires ACL configuration. He provides the following diagram and the requirements below: 1. Enable the ACL inbound on R2’s G0/1 interface. 2. Permit packets coming from the host with IP 20.2.2.1 3. Deny packets coming from the rest subnet 20.2.2.0/24 4. Permit packets coming from a network with subnet 155.165.0.0/16 Now you are responsible to configure the R2 using the ACL standard number 1. Which of the following commands will you type to complete the task? (A) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/2 R2(config-if)# ip access-group 1 in (B) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 R2(config-if)# ip access-group 1 in (C) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 (D) R2# configure terminal R2(config)# access-list 1 deny 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 R2(config-if)# ip access-group 1 in
The senior network engineer assigns you a task that requires ACL configuration. He provides the following diagram and the requirements below: 1. Enable the ACL inbound on R2’s G0/1 interface. 2. Permit packets coming from the host with IP 20.2.2.1 3. Deny packets coming from the rest subnet 20.2.2.0/24 4. Permit packets coming from a network with subnet 155.165.0.0/16 Now you are responsible to configure the R2 using the ACL standard number 1. Which of the following commands will you type to complete the task? (A) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/2 R2(config-if)# ip access-group 1 in **(B) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 R2(config-if)# ip access-group 1 in ** (C) R2# configure terminal R2(config)# access-list 1 permit 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 (D) R2# configure terminal R2(config)# access-list 1 deny 20.2.2.1 R2(config)# access-list 1 deny 20.2.2.0 0.0.0.255 R2(config)# access-list 1 permit 155.165.0.0 0.0.255.255 R2(config)# interface G0/1 R2(config-if)# ip access-group 1 in
143
Which of the following options are things that a standard IP ACL could be configured to do? (Choose two answers.) (A) Match the exact source IP address (B) Match all IP addresses in a subnet with one access-list command without matching other IP addresses (C) Match IP addresses 20.2.2.2 through 20.2.2.22 with one access-list command without matching other IP addresses (D) Match only the packet’s destination IP address
Which of the following options are things that a standard IP ACL could be configured to do? (Choose two answers.) **(A) Match the exact source IP address** **(B) Match all IP addresses in a subnet with one access-list command without matching other IP addresses ** (C) Match IP addresses 20.2.2.2 through 20.2.2.22 with one access-list command without matching other IP addresses (D) Match only the packet’s destination IP address
144
One of the differences between named and numbered ACLs is that named ACLS using ACL subcommands, not global commands, to define the action and matching parameters. (A) TRUE (B) FALSE
One of the differences between named and numbered ACLs is that named ACLS using ACL subcommands, not global commands, to define the action and matching parameters. **(A) TRUE** (B) FALSE
145
Given the following fields, which of those cannot be compared on an extended IP ACL? (A) Application protocol (B) Destination IP address (C) Source IP address (D) URL (E) TOS Byte
Given the following fields, which of those cannot be compared on an extended IP ACL? (A) Application protocol (B) Destination IP address (C) Source IP address **(D) URL** (E) TOS Byte
146
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #1: Permit packets from 186.33.2.3 ACL command #1: ______________________ (A) access-list 1 permit 186.33.2.3 (B) access-list 1 deny 186.33.2.3 (C) access-list 1 permit 186.33.2.0 (D) access-list 1 deny 186.33.0.0
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #1: Permit packets from 186.33.2.3 ACL command #1: ______________________ **(A) access-list 1 permit 186.33.2.3** (B) access-list 1 deny 186.33.2.3 (C) access-list 1 permit 186.33.2.0 (D) access-list 1 deny 186.33.0.0
147
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #2: Permit packets from hosts with 56.57.2 as the first three octets ACL command #2: ______________________ (A) access-list 1 permit 56.57.2.0 0.0.0.255 (B) access-list 1 permit 57.57.2.0 0.0.0.255 (C) access-list 1 permit 56.57.2.0 0.0.255.255 (D) access-list 1 deny 56.57.2.0 0.0.0.255
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #2: Permit packets from hosts with 56.57.2 as the first three octets ACL command #2: ______________________ **(A) access-list 1 permit 56.57.2.0 0.0.0.255** (B) access-list 1 permit 57.57.2.0 0.0.0.255 (C) access-list 1 permit 56.57.2.0 0.0.255.255 (D) access-list 1 deny 56.57.2.0 0.0.0.255
148
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #3: Permit packets from hosts with 56.57 as the first two octets ACL command #3: ______________________ (A) access-list 1 permit 56.57.0.0 0.255.255.255 (B) access-list 1 permit 56.57.0.0 0.0.255.255 C) access-list 1 permit 56.58.0.0 0.0.255.255 (D) access-list 1 permit 56.57.0.0 0.0.0.0
Your task is to type a one-line standard ACL that matches the following criteria. All access-list commands use the number 1 in the command. Criteria #3: Permit packets from hosts with 56.57 as the first two octets ACL command #3: ______________________ (A) access-list 1 permit 56.57.0.0 0.255.255.255 **(B) access-list 1 permit 56.57.0.0 0.0.255.255** C) access-list 1 permit 56.58.0.0 0.0.255.255 (D) access-list 1 permit 56.57.0.0 0.0.0.0
149
Your task is to type a one-line extended ACL that matches the following criteria. All access-list commands use the number 101 in the command. Criteria #4: Permit packets from web client 65.5.5.5, sent to a web server in subnet 65.5.6.0/24 ACL command #4: ______________________ (A) access-list 101 permit tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq 23 (B) access-list 101 permit any any (C) access-list 101 permit tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq www (D) access-list 101 deny tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq www
Your task is to type a one-line extended ACL that matches the following criteria. All access-list commands use the number 101 in the command. Criteria #4: Permit packets from web client 65.5.5.5, sent to a web server in subnet 65.5.6.0/24 ACL command #4: ______________________ (A) access-list 101 permit tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq 23 (B) access-list 101 permit any any **(C) access-list 101 permit tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq www ** (D) access-list 101 deny tcp host 65.5.5.5 65.5.6.0 0.0.0.255 eq www
150
Your task is to type a one-line extended ACL that matches the following criteria. All access-list commands use the number 101 in the command. Criteria #5: Permit any and every IPv4 packet ACL command #5: ______________________ (A) access-list 101 permit ip any any (B) access-list 101 deny ip any any (C) access-list 101 permit ip 0.0.0.0 any (D) access-list 101 permit ip any 0.0.0.0
Your task is to type a one-line extended ACL that matches the following criteria. All access-list commands use the number 101 in the command. Criteria #5: Permit any and every IPv4 packet ACL command #5: ______________________ (A) access-list 101 permit ip any any (B) access-list 101 deny ip any any (C) access-list 101 permit ip 0.0.0.0 any (D) access-list 101 permit ip any 0.0.0.0
151
Which of the following commands display the configuration of an IPv4 ACL, including line numbers? (Choose two answers.) (A) show running-config (B) show startup-config (C) show ip access-lists (D) show access-lists
Which of the following commands display the configuration of an IPv4 ACL, including line numbers? (Choose two answers.) (A) show running-config (B) show startup-config **(C) show ip access-lists (D) show access-lists**
152
Type the access-list command that permits all packets sent from hosts in subnet 14.15.16.0/24. Use the ACL number 50 for the ACL rule. (A) access-list 50 permit 14.15.17.0 0.0.0.255 (B) access-list 50 deny 14.15.16.0 0.0.0.255 (C) access-list 50 permit 14.15.16.0 0.255.255.255 (D) access-list 50 permit 14.15.16.0 0.0.0.255
Type the access-list command that permits all packets sent from hosts in subnet 14.15.16.0/24. Use the ACL number 50 for the ACL rule. (A) access-list 50 permit 14.15.17.0 0.0.0.255 (B) access-list 50 deny 14.15.16.0 0.0.0.255 (C) access-list 50 permit 14.15.16.0 0.255.255.255 **(D) access-list 50 permit 14.15.16.0 0.0.0.255**
153
Given the following access-list command access-list 2 permit 192.168.4.0 0.0.0.255, choose the exact range of IP addresses, matched by the command. (A) 192.167.4.0 – 192.168.4.255 (B) 192.168.4.0 – 192.168.5.255 (C) 192.168.4.0 – 192.168.4.255 (D) 192.0.0.0 – 192.168.4.255
Given the following access-list command access-list 2 permit 192.168.4.0 0.0.0.255, choose the exact range of IP addresses, matched by the command. (A) 192.167.4.0 – 192.168.4.255 (B) 192.168.4.0 – 192.168.5.255 **(C) 192.168.4.0 – 192.168.4.255** (D) 192.0.0.0 – 192.168.4.255
154
The range of valid ACL numbers for standard numbered IP ACLs is: (A) 1-99 and 1700 - 1999 (B) 1-99 and 1300 - 1999 (C) 1-101 and 1300 - 1999 (D) 1-49 and 1400 - 1999
The range of valid ACL numbers for standard numbered IP ACLs is: (A) 1-99 and 1700 - 1999 **(B) 1-99 and 1300 - 1999** (C) 1-101 and 1300 - 1999 (D) 1-49 and 1400 - 1999
155
The ACL 55 on R1 has four statements, in the following order, with address and wildcard mask values as follows: 1. 20.0.0.0 0.255.255.255 2. 20.20.0.0 0.0.255.255 3. 20.20.20.0 0.0.0.255 4. 2.2.2.0 0.0.0.255 If a router tried to match a packet sourced from IP address 20.20.20.20 using this ACL, which ACL statement does a router consider the packet to have matched? (A) First statement (B) Second statement (C) Third statement (D) Forth statement (E) Implied deny at the end of the ACL
The ACL 55 on R1 has four statements, in the following order, with address and wildcard mask values as follows: 1. 20.0.0.0 0.255.255.255 2. 20.20.0.0 0.0.255.255 3. 20.20.20.0 0.0.0.255 4. 2.2.2.0 0.0.0.255 If a router tried to match a packet sourced from IP address 20.20.20.20 using this ACL, which ACL statement does a router consider the packet to have matched? **(A) First statement** (B) Second statement (C) Third statement (D) Forth statement (E) Implied deny at the end of the ACL
156
Which of the following access-list denies packets with a UDP header, any source IP address with source port greater than 10455, a destination IP address 30.3.3.3 and a destination port equal to 25? (A) access-list 101 deny udp any gt 10455 host 30.3.3.3 eq 28 (B) access-list 101 deny udp any gt 10455 host 30.3.3.3 eq 25 (C) access-list 101 deny tcp any gt 10455 host 30.3.3.3 eq 25 (D) access-list 101 deny udp any gt 25 host 30.3.3.3 eq 25
Which of the following access-list denies packets with a UDP header, any source IP address with source port greater than 10455, a destination IP address 30.3.3.3 and a destination port equal to 25? (A) access-list 101 deny udp any gt 10455 host 30.3.3.3 eq 28 **(B) access-list 101 deny udp any gt 10455 host 30.3.3.3 eq 25** (C) access-list 101 deny tcp any gt 10455 host 30.3.3.3 eq 25 (D) access-list 101 deny udp any gt 25 host 30.3.3.3 eq 25
157
Which of the following access-list denies packets with a UDP header, a source IP address 30.3.3.3 and a source port greater than 10455, any destination IP address 30.3.3.3 with destination port equal to 25? (A) access-list 101 deny udp host 30.3.3.3 gt 10455 any eq 30 (B) access-list 101 deny udp host 30.3.3.3 gt 25 any eq 25 (C) access-list 101 deny udp host 30.0.0.0 gt 10455 any eq25 (D) access-list 101 deny udp host 30.3.3.3 gt 10455 any eq 25
Which of the following access-list denies packets with a UDP header, a source IP address 30.3.3.3 and a source port greater than 10455, any destination IP address 30.3.3.3 with destination port equal to 25? (A) access-list 101 deny udp host 30.3.3.3 gt 10455 any eq 30 (B) access-list 101 deny udp host 30.3.3.3 gt 25 any eq 25 (C) access-list 101 deny udp host 30.0.0.0 gt 10455 any eq25 **(D) access-list 101 deny udp host 30.3.3.3 gt 10455 any eq 25**
158
Choose the wildcard mask that matches all IP packets in the subnet 46.45.44.0, and mask 255.255.255.0. (A) 0.0.0.255 (B) 0.0.255.255 (C) 0.255.255.255 (D) 255.255.255.255
Choose the wildcard mask that matches all IP packets in the subnet 46.45.44.0, and mask 255.255.255.0. **(A) 0.0.0.255** (B) 0.0.255.255 (C) 0.255.255.255 (D) 255.255.255.255
159
In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers) (A) Source IP address (B) MAC address (C) ARP address (D) Routing table (E) Destination IP address (F) ARP table
**(A) Source IP address (B) MAC address ** (C) ARP address (D) Routing table (E) Destination IP address (F) ARP table
160
AAA servers usually support the protocol TACACS+ and ____________________ to communicate with enterprise resources. (A) DHCP (B) ARP (C) RADIUS (D) HTTP
(A) DHCP (B) ARP **(C) RADIUS** (D) HTTP
161
The senior network engineer assigns you a task related to port security. He needs your help to configure the fa0/1 from the SW-examsD to accept frames only from the MAC 0200.1111.2222. Type the commands that need to be configured on the SW-examsD following the requirements below: 1. configure the FastEthernet0/1 to be an access port 2. enable port security on that interface 3. define the allowed MAC address (A) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/2 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222 (B) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security (C) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.2222.2222 (D) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222
(A) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/2 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222 ​ (B) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security ​ (C) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.2222.2222 ​ **(D) SW-examsD#configure terminal SW-examsD(config)#interface FastEthernet0/1 SW-examsD(config-if)#switchport mode access SW-examsD(config-if)#switchport port-security SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222**
162
_____________________ attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to additional users. (A) Spoofing (B) Phishing (C) DoS (D) SQL injection
(A) Spoofing (B) Phishing **(C) DoS** (D) SQL injection
163
A _________________ is malicious software that is hidden and packaged inside other software that looks normal and legitimate. (A) Worm (B) Virus (C) Spyware (D) Trojan
(A) Worm (B) Virus (C) Spyware **(D) Trojan**
164
What devices can be used to implement DHCP Snooping? (Choose two answers) (A) Hub (B) Layer 2 switches (C) Routers (D) Layer 3 switches (E) Access Points (F) End users
(A) Hub **(B) Layer 2 switches** (C) Routers **(D) Layer 3 switches** (E) Access Points (F) End users
165
Which of the following Cisco Firepower NGIPS’s features provides more insights into and control over the users, applications, devices, threats, and vulnerabilities in your network with real-time visibility? (A) Security automation (B) Granular application visibility and control (C) Contextual awareness (D) Superior effectiveness
(A) Security automation (B) Granular application visibility and control **(C) Contextual awareness** (D) Superior effectiveness
166
What can be accomplished with a brute-force attack? (A) Guess a user’s password (B) Make a server unavailable (C) Spoof every possible IP address (D) Alter a routing table
**(A) Guess a user’s password** (B) Make a server unavailable (C) Spoof every possible IP address (D) Alter a routing table
167
Social engineering attack is accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. (A) TRUE (B) FALSE
**(A) TRUE** (B) FALSE
168
Which of the following human security vulnerabilities attacks is a type of attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company? (A) Social engineering (B) Phishing (C) Whaling (D) Pharming
(A) Social engineering (B) Phishing **(C) Whaling** (D) Pharming
169
Which of the following human security vulnerabilities attacks is the attempt to obtain sensitive information such as passwords and credit card details by disguising oneself as a trustworthy entity? (A) Social engineering (B) Phishing (C) Whaling (D) Pharming
(A) Social engineering **(B) Phishing** (C) Whaling (D) Pharming
170
You are responsible to enable DHCP snooping on the SW1. The R1 is a DHCP relay agent that needs to be trusted. SW1 places all the ports on VLAN 8. Which commands will you type in order to configure DHCP snooping on the SW1 based on the diagram below? (A) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 3 SW1(config)# interface GigabitEthernet1/0/2 SW1(config-if)# ip dhcp snooping trust (B) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/1/2 SW1(config-if)# ip dhcp snooping trust (C) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/0/2 SW1(config-if)# ip dhcp snooping trust (D) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/0/2
171
Which of the following security features rejects invalid and malicious ARP packets and prevents a class of man-in-the-middle attacks? (A) DoS (B) DAI (C) Packet secure (D) ARP protect
(A) DoS **(B) DAI** (C) Packet secure (D) ARP protect
172
In a reflection attack, the source IP address in the attack packets is spoofed so that it contains the address of the victim. (A) TRUE (B) FALSE
**(A) TRUE ** (B) FALSE
173
Type the command that needs to be configured on a switch to automatically recover from the err-disabled state, when caused by port security. (A) recovery cause psecure-violation (B) errdisable recovery psecure-violation (C) errdisable recovery (D) errdisable recovery cause psecure-violation
(A) recovery cause psecure-violation (B) errdisable recovery psecure-violation (C) errdisable recovery **(D) errdisable recovery cause psecure-violation**
174
A next-generation firewall sits at the edge of a company’s connection to the Internet. A network engineer has been configured to prevent Telnet clients residing on the Internet from accessing Telnet servers inside the company. Which of the following might a next-generation firewall use that a traditional firewall would not? (A) Match message destination well-known port 23 (B) Match message application data (C) Match message IP protocol 23 (D) Match message source TCP ports lower than 5400
(A) Match message destination well-known port 23 **(B) Match message application data** (C) Match message IP protocol 23 (D) Match message source TCP ports lower than 5400 ## Footnote next-generation firewalls are being able to also check application data beyond the Transport layer header.
175
Your PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC (DHCP client) and the DHCP server, which ones do the server send? (Choose two answers) (A) Acknowledgment (B) Request (C) Offer (D) Discover
**(A) Acknowledgment ** (B) Request **(C) Offer** (D) Discover
176
You have an address of 172.16.142.10/21. What are the network ID, directed broadcast, first host, and the last host?
A. The network ID is 172.16.140.0, the directed broadcast is 172.16.148.255, the first host is 172.16.140.1, and the last host is 172.16.148.254 B. The network ID is 172.16.96.0, the directed broadcast is 172.16.168.255, the first host is 172.16.96.1, and the last host is 172.16.168.254 C. The network ID is 172.16.128.0, the directed broadcast is 172.16.163.255, the first host is 172.16.128.1, and the last host is 172.16.163.254 D. The network ID is 172.16.136.0, the directed broadcast is 172.16.143.255, the first host is 172.16.136.1, and the last host is 172.16.143.254
177
During a maintenance window, you make some changes to R2. You document these changes in your configuration management system. Later that night, you are called in to fix an issue that requires you to make additional changes to R2. The next morning your co-worker addresses another issue but this time on R1. All of these changes are documented properly but neither you or nor your coworker discuss the changes. These changes stay implemented for months. What is this best described as?
A. Version control B. Centralized configuration C. Configuration drift D. Configuration monitoring
178
What should you see on the console when you start a Cisco router?
A. Cisco IOS debug messages B. The diagnostic console menu C. A graphical picture showing the real-time status of the LED D. Cisco IOS software setup mode
179
What commands describe the implemented outcomes when configuring multiarea OSPF? (Choose two)
A. The [ip ospf area] command can be used to enable OSPF directly on an interface. B. The [ip ospf cost] command specifies the OSPF cost of directing a packet across the network to the destination. C. The [network area] command defines the network boundary and ospf routing process number. D. The [router ospf] command configures an OSPF routing process.
180
Suppose you would like to select a method to protect the privacy and integrity of wireless data. Which one of the following methods should you avoid because it has been deprecated?
A. TKIP B. CCMP C. GCMP D. EAP
181
Which command can be used to verify that the current IPv6 path matches the desired route to the server?
A. show ipv6 cef B. show ipv6 mroute C. show ipv6 neighbors D. show ipv6 route
182
You are subnetting the 172.16.0.0/16 network so that you have 100 subnets. How many bits do you need to borrow, what is the new subnet mask, and how many hosts will be in each subnet? (Choose three)
A. There will be 254 possible hosts in each subnet B. There will be 510 possible hosts in each subnet C. /23 is the new subnet mask D. 7 bits will be borrowed E. 8 bits will be borrowed F. /24 is the new subnet mask
183
You receive a notification that there is an issue in one of your switched networks. After reviewing the logs you noticed that a switch has rebooted; however, there is no network connectivity to the resources attached to that switch anymore. You connect to the switch over the management network and notice that there is the following message: Would you like to enter the initial configuration dialog? [yes/no]: What is the reason for receiving this message?
A. This is a normal message that appears each time the device boots and should be disabled B. There is no configuration in FLASH C. There is no start-up configuration in NVRAM D. There is no configuration in RAM
184
Which of the following four TCP/IP layers represents the core of the TCP/IP architecture?
A. Network Access B. Transport C. Internet D. Application
185
Cisco devices use IOS software that includes extensive command-line input help functions as well as context-sensitive help. Which command would you enter in the privileged EXEC mode to list the command options?
A. enable B. ? C. init D. login
186
Which device is responsible for translating the private IPv4 address to a public IPv4 address when using static NAT?
A. Cloud B. Switch C. Router D. NAT server E. Source PC F. Destination PC
187
Which microcode is used to test the basic functionality of router hardware and determine which components are present?
A. bootstrap B. ROM monitor C. ROM D. POST E. RAM F. NVRAM
188
You have determined that RSTP is creating problems on your network. You want to enable PortFast on your 24 port switch to rectify these problems. Which commands will do this on all 24 ports? (Choose two)
A. AWS1 (config)#interface range fa 0/1 AWS1 (config-if-range)#spanning-tree portfast B. AWS1 (config)# spanning-tree portfast C. AWS1 (config)#interface range fa 0/1-24 AWS1 (config-if-range)#spanning-tree portfast D. AWS1 (config)# spanning-tree portfast default
189
Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?
A. It has more than one interface that is connected to the root network segment. B. It is running RSTP while the elected root bridge is running 802.1d spanning tree. C. It has a higher MAC address than the elected root bridge. D. It has a higher bridge ID than the elected root bridge.
190
Which of the following behaviors are applied to a low latency queue in a Cisco router or switch? (Choose two)
A. Shaping B. Policing C. Priority scheduling D. Round-robin scheduling
191
Which VTP mode forwards advertisements but does not synchronize VLAN configuration?
A. Client B. Off C. Transparent D. Server
192
Review the topology. All subnets exist in OSPF area 0. Which command, if issued on R3, would show all the LSAs known by R3?
A. Show running-config B. Show ip ospf interface C. Show ip ospf neighbors D. Show ip route ospf E. Show ip ospf database
193
Which statements provide reasons as to why you would implement a DHCP server in your Enterprise environment? (Choose two)
A. It will automatically assign MAC addresses to clients in accordance to VLAN settings B. It is a favourable solution when mobile clients exist in the network C. It provides host-based security including anti-virus and anti-malware D. It will discover the MAC address to IPv4 address mappings for clients E. It will automatically assign IPv4 addresses to clients in accordance to VLAN settings
194
Identify the information that must match between routers in order to form an OSPF adjacency. (Choose two)
A. Area ID B. Router ID C. Neighbors D. Hello and dead intervals
195
Identify the statements that describe the SPF algorithm. (Choose two)
A. All routers share a view of the topology B. The reference bandwidth can be adjusted to match the environment C. The most efficient path through a network can be determine using the highest cost D. Cost is calculated using interface and reference bandwidth
196
What command would you use to verify the default gateway on a Cisco IOS device?
A. show monitor B. route print C. show ip route D. traceroute
197
What commands would you need to configure to enable DHCP Snooping so that PC4 couldn’t become a rogue DHCP server?
A. Configure the following on SW 2: ip dhcp snooping, ip dhcp snooping vlan 10, int gi0/12, ip dhcp snooping trust B. Configure the following on SW 1: ip dhcp snooping, ip dhcp snooping vlan 10, int gi0/24, ip dhcp snooping trust C. Configure the following on SW 2: ip dhcp snooping, ip dhcp snooping vlan 10, int gi0/24, ip dhcp snooping trust D. Configure the following on SW 2: ip dhcp snooping, ip dhcp snooping vlan 20, int gi0/24, ip dhcp snooping trust E. Configure the following on SW 2: ip dhcp snooping, ip dhcp snooping vlan 20, int gi0/12, ip dhcp snooping trust F. Configure the following on SW 1: ip dhcp snooping, ip dhcp snooping vlan 20, int gi0/24, ip dhcp snooping trust
198
Which IPv6 prefix will the typical enterprise network receive from the service provider?
A. /52 B. /56 C. /64 D. /32 E. /48 F. /60
199
Wired Ethernet and Wi-Fi are based on which two IEEE standards, respectively?
A. 802.1, 802.3 B. 802.1, 802.3 C. 802.3, 802.11 D. 802.11, 802.3
200
High levels of humidity pose a danger to the devices in your network. What type of threat is this categorized as?
A. Maintenance B. Physical C. Environmental D. Remote Access E. Local Access F. Electrical
201
202
Which of the following configuration management tools uses agentless architecture for managing network devices? (A) Ansible (B) Puppet (C) Chef (D) Ansible and Puppet (E) Puppet and Chef
Which of the following configuration management tools uses agentless architecture for managing network devices? **(A) Ansible** (B) Puppet (C) Chef (D) Ansible and Puppet (E) Puppet and Chef
203
Given the following JSON object, how many object keys found in the sample below? { “response”: { “id”: “3”, “name”: “Cisco Catalyst”, “ipAddress”: { “private”: “192.168.1.1”, “public”: “156.157.1.1” } } } (A) 3 (B) 4 (C) 5 (D) 6
Given the following JSON object, how many object keys found in the sample below? { “response”: { “id”: “3”, “name”: “Cisco Catalyst”, “ipAddress”: { “private”: “192.168.1.1”, “public”: “156.157.1.1” } } } (A) 3 (B) 4 (C) 5 **(D) 6** ## Footnote JSON defines variables as key:value pairs, with the key on the left of the colon (:) and always enclosed in double quotation marks, with the value on the right.
204
CRUD is the acronym of the four primary actions performed by an application. What does CRUD stand for? (A) Create, Read, Update, Delete (B) Create, Read, Update, Done (C) Create, Resolve, Update, Delete (D) Create, Resolve, Update, Done
CRUD is the acronym of the four primary actions performed by an application. What does CRUD stand for? **(A) Create, Read, Update, Delete ** (B) Create, Read, Update, Done (C) Create, Resolve, Update, Delete (D) Create, Resolve, Update, Done
205
A Layer 2 switch examines a frame’s destination MAC address and forwards that frame out of the port G0/2. That action occurs as part of which plane of the switch? (A) Data plane (B) Management plane (C) Control Plane (D) None of the above
A Layer 2 switch examines a frame’s destination MAC address and forwards that frame out of the port G0/2. That action occurs as part of which plane of the switch? **(A) Data plane ** (B) Management plane (C) Control Plane (D) None of the above
206
Which answer correctly describes the format of the JSON text below? (Choose two answers) (A) One JSON object that has one key:value pair (B) One JSON object that has two key:value pairs (C) One JSON object that has three key:value pair (D) Two JSON objects that have two key:value pair (E) A JSON object whose value is a second JSON object
Which answer correctly describes the format of the JSON text below? (Choose two answers) (A) One JSON object that has one key:value pair **(B) One JSON object that has two key:value pairs** (C) One JSON object that has three key:value pair (D) Two JSON objects that have two key:value pair **(E) A JSON object whose value is a second JSON object**
207
Identify the hostname part from the given URI: https://cluster.cisco.com/dna/intent/api/v1/business/sda/fabric? ipaddress=10.1.2.3. (A) https:// (B) cluster.cisco (C) cluster.cisco.com (D) dna/intent/api/v1/business/sda/fabric (E) ?ipaddress=10.1.2.3
Identify the hostname part from the given URI: https://cluster.cisco.com/dna/intent/api/v1/business/sda/fabric? ipaddress=10.1.2.3. (A) https:// (B) cluster.cisco **(C) cluster.cisco.com** (D) dna/intent/api/v1/business/sda/fabric (E) ?ipaddress=10.1.2.3
208
Which of the following features of Cisco DNA Center discovers the actual path the packets will take from the source to the destination based on the current forwarding tables? (A) Encrypted traffic analysis (B) Device 360 and Client 360 (C) Network time travel (D) Path trace
Which of the following features of Cisco DNA Center discovers the actual path the packets will take from the source to the destination based on the current forwarding tables? (A) Encrypted traffic analysis (B) Device 360 and Client 360 (C) Network time travel **(D) Path trace** ## Footnote Path trace – Discovers the actual path packets would take from source to destination based on current forwarding tables.
209
Which of the following features of Cisco DNA Center shows past client performance in a timeline for compar- ison to current behavior? (A) Encrypted traffic analysis (B) Device 360 and Client 360 (C) Network time travel (D) Path trace
Which of the following features of Cisco DNA Center shows past client performance in a timeline for compar- ison to current behavior? (A) Encrypted traffic analysis (B) Device 360 and Client 360 **(C) Network time travel** (D) Path trace ## Footnote Network time travel – Shows past client performance in a timeline for comparison to current behavior.
210
Which of the following features of Cisco DNA Center gives a comprehensive view of the health of the device? (A) Encrypted traffic analysis (B) Device 360 and Client 360 (C) Network time travel (D) Path trace
Which of the following features of Cisco DNA Center gives a comprehensive view of the health of the device? (A) Encrypted traffic analysis **(B) Device 360 and Client 360** (C) Network time travel (D) Path trace
211
Which of the following features of Cisco DNA Center enables Cisco DNA to use algorithms to recognize security threats even in encrypted traffic? (A) Encrypted traffic analysis (B) Device 360 and Client 360 (C) Network time travel (D) Path trace
Which of the following features of Cisco DNA Center enables Cisco DNA to use algorithms to recognize security threats even in encrypted traffic? **(A) Encrypted traffic analysis** (B) Device 360 and Client 360 (C) Network time travel (D) Path trace
212
Your company decides to move away from manual configuration methods, making changes by editing centralized configuration files. The issues you are facing with non-centralized configuration files are: 1) You don’t know who engineer made the changes in the configuration file. 2) You don’t know the changes in the configuration file over time. Which tool your company will use in order to solve these issues? (A) Version Control System (B) Version Control Configuration (C) Version Control Change (D) Version Control Edit
Your company decides to move away from manual configuration methods, making changes by editing centralized configuration files. The issues you are facing with non-centralized configuration files are: 1) You don’t know who engineer made the changes in the configuration file. 2) You don’t know the changes in the configuration file over time. Which tool your company will use in order to solve these issues? **(A) Version Control System** (B) Version Control Configuration (C) Version Control Change (D) Version Control Edit
213
One of the benefits of controller-based networks over traditional networks is that the configuration on the devices have fewer errors, and you spent less time troubleshooting the network. (A) TRUE (B) FALSE
One of the benefits of controller-based networks over traditional networks is that the configuration on the devices have fewer errors, and you spent less time troubleshooting the network. **(A) TRUE** (B) FALSE
214
The ______________________ plane includes protocols that allow network engineers to manage the devices. (A) Management (B) Data (C) Control (D) Network LLC, ExamsDigest; Gorgotsias, Nikolaos. CCNA 200-301 Practice Exam Questions 2020 [fully updated]: 230+ Practice Questions and Free One-month Unlimited Access on Examsdigest.com (Page 335). . Kindle Edition.
215
The customer edge device is typically a router, that sits at a customer site on MPLS networks and connects to a provider edge router (PE router) to take communications from a customer site to a provider side. (A) TRUE (B) FALSE
The customer edge device is typically a router, that sits at a customer site on MPLS networks and connects to a provider edge router (PE router) to take communications from a customer site to a provider side. **(A) TRUE ** (B) FALSE
216
____________________ is a network design that connects a link between each pair of nodes. (A) Full Mesh (B) Star (C) Hybrid (D) Partial Mesh
____________________ is a network design that connects a link between each pair of nodes. **(A) Full Mesh** (B) Star (C) Hybrid (D) Partial Mesh
217
With PoE, a LAN switch can act as the Power Sourcing Equipment (PSE). (A) TRUE (B) FALSE
With PoE, a LAN switch can act as the Power Sourcing Equipment (PSE). **(A) TRUE** (B) FALSE
218
Which of the following protocols or technologies do you use each time you connect remotely through VPN? (A) TLS (B) IPsec (C) SSH (D) Telnet (E) FTPS
Which of the following protocols or technologies do you use each time you connect remotely through VPN? **(A) TLS** (B) IPsec (C) SSH (D) Telnet (E) FTPS ## Footnote The term remote access VPN, or client VPN, typically refers to a VPN for which one endpoint is a user device, such as a phone, tablet, or PC. In those cases, Transport Layer Security (TLS) is the more likely protocol to use. TLS is included in browsers and is commonly used to connect securely to websites.
219
Which of the following roles of campus switches provides a connection point for end-user devices? (A) Access (B) Distribution (C) Core (D) Campus
Which of the following roles of campus switches provides a connection point for end-user devices? **(A) Access ** (B) Distribution (C) Core (D) Campus
220
Which of the following roles of campus switches provides an aggregation point for access switches? (A) Access (B) Distribution (C) Core (D) Campus
Which of the following roles of campus switches provides an aggregation point for access switches? (A) Access **(B) Distribution** (C) Core (D) Campus
221
Which of the following roles of campus switches aggregates distribution switches in very large campus LANs? (A) Access (B) Distribution (C) Core (D) Campus
Which of the following roles of campus switches aggregates distribution switches in very large campus LANs? (A) Access (B) Distribution **(C) Core** (D) Campus
222
Your company plans to start using public cloud service and now you are considering different WAN options. Your main concern is security by keeping the data private while also providing good QoS services. Which of the following options are under consideration? (Choose two answers.) (A) Using private WAN connections directly to the cloud provider (B) Using an Internet connection without VPN (C) Using an Internet connection with VPN (D) Using an intercloud exchange
Your company plans to start using public cloud service and now you are considering different WAN options. Your main concern is security by keeping the data private while also providing good QoS services. Which of the following options are under consideration? (Choose two answers.) **(A) Using private WAN connections directly to the cloud provider** (B) Using an Internet connection without VPN (C) Using an Internet connection with VPN **(D) Using an intercloud exchange**
223
One of the differences between Public Cloud and Private Cloud (On-Premise) is that on the Public Cloud solution you are responsible for all management, maintenance, and updating of data centers. (A) TRUE (B) FALSE
One of the differences between Public Cloud and Private Cloud (On-Premise) is that on the Public Cloud solution you are responsible for all management, maintenance, and updating of data centers. (A) TRUE **(B) FALSE**
224
A company uses a Metro Ethernet WAN with an Ethernet LAN (E-LAN) service, with the company headquarters plus 20 remote sites connected to the service. The enterprise uses OSPF at all sites, with one router connected to the service from each site. Which of the following are true about the Layer 3 details most likely used with this service and design? (Choose all that apply) (A) The WAN uses one IP subnet (B) The WAN uses 20 or more IP subnets (C) A remote site router would have one OSPF neighbor (D) A remote site router would have 20 OSPF neighbors
A company uses a Metro Ethernet WAN with an Ethernet LAN (E-LAN) service, with the company headquarters plus 20 remote sites connected to the service. The enterprise uses OSPF at all sites, with one router connected to the service from each site. Which of the following are true about the Layer 3 details most likely used with this service and design? (Choose all that apply) **(A) The WAN uses one IP subnet** (B) The WAN uses 20 or more IP subnets (C) A remote site router would have one OSPF neighbor **(D) A remote site router would have 20 OSPF neighbors**
225
The process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application is called server _________________. (A) Integration (B) Isolation (C) Virtualization (D) Segmentation
The process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application is called server _________________. (A) Integration (B) Isolation **(C) Virtualization** (D) Segmentation ## Footnote Key Benefits of Server Virtualization: 1. Higher server ability 2. Cheaper operating costs 3. Eliminate server complexity 4. Increased application performance 5. Deploy workload quicker
226
Which cloud “As a Service” model is a form of cloud computing that delivers fundamental compute, network, and storage resources to consumers on-demand, over the internet, and on a pay-as-you-go basis? (A) Software as a Service (B) Platform as a Service (C) Infrastructure as a Service (D) Database as a Service
Which cloud “As a Service” model is a form of cloud computing that delivers fundamental compute, network, and storage resources to consumers on-demand, over the internet, and on a pay-as-you-go basis? (A) Software as a Service (B) Platform as a Service **(C) Infrastructure as a Service** (D) Database as a Service
227
Which cloud “As a Service” model is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet? (A) Software as a Service (B) Platform as a Service (C) Infrastructure as a Service (D) Database as a Service ## Footnote SaaS examples: Google Apps, Salesforce, Dropbox, Slack.
Which cloud “As a Service” model is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet? **(A) Software as a Service ** (B) Platform as a Service (C) Infrastructure as a Service (D) Database as a Service ## Footnote SaaS examples: Google Apps, Salesforce, Dropbox, Slack.
228
Which cloud “As a Service” model is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications? (A) Software as a Service (B) Platform as a Service (C) Infrastructure as a Service (D) Database as a Service
Which cloud “As a Service” model is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications? (A) Software as a Service **(B) Platform as a Service** (C) Infrastructure as a Service (D) Database as a Service ## Footnote PaaS examples: Heroku, Apache Stratos, Magento Commerce Cloud.
229
Examine the following show command output on a router configured for dynamic NAT: — Inside Source access-list 1 pool examsdigest pool examsdigest: netmask 255.255.255.240 start 190.1.1.1 end 190.1.1.10 type generic, total addresses 10, allocated 10 (100%), misses 595 You are responsible to find out why users are not being able to reach the Internet. (A) The cause is not related to dynamic NAT (B) The command output does not provide any clue to identify the problem (C) Dynamic NAT can't use Standard ACLs (D) The NAT pool does not have enough entries to fulfill the user's requests
Examine the following show command output on a router configured for dynamic NAT: — Inside Source access-list 1 pool examsdigest pool examsdigest: netmask 255.255.255.240 start 190.1.1.1 end 190.1.1.10 type generic, total addresses 10, allocated 10 (100%), misses 595 You are responsible to find out why users are not being able to reach the Internet. (A) The cause is not related to dynamic NAT (B) The command output does not provide any clue to identify the problem (C) Dynamic NAT can't use Standard ACLs **(D) The NAT pool does not have enough entries to fulfill the user's requests**
230
Log messages may tell you about some events, either critical or not. To help you make sense of the importance of each message, IOS assigns each message a severity level. Which of the following severity level means Warning - Warning condition? (A) 2 (B) 3 (C) 4 (D) 5
Log messages may tell you about some events, either critical or not. To help you make sense of the importance of each message, IOS assigns each message a severity level. Which of the following severity level means Warning - Warning condition? (A) 2 (B) 3 **(C) 4 ** (D) 5
231
Log messages may tell you about some events, either critical or not. To help you make sense of the importance of each message, IOS assigns each message a severity level. Which of the following severity level means Informational: Informational message only? (A) 1 (B) 6 (C) 4 (D) 5
Log messages may tell you about some events, either critical or not. To help you make sense of the importance of each message, IOS assigns each message a severity level. Which of the following severity level means Informational: Informational message only? (A) 1 **(B) 6** (C) 4 (D) 5
232
Given the diagram below, complete the missing configuration command in order to make the static NAT functional. Configuration snippet R1# show running-config ! Lines omitted for brevity! interface FastEthernet0/0 ip address 192.168.1.3 255.255.255.0 ip nat inside interface GigabitEthernet0/0 ip address 190.2.2.21 255.255.255.0 ip ____________________ (missing command) ip nat inside source static 192.168.1.2 200.1.1. 2 ip nat inside source static 192.168.1.1 200.1.1.1 (A) nat source (B) nat enable (C) nat address (D) nat outside
Given the diagram below, complete the missing configuration command in order to make the static NAT functional. Configuration snippet R1# show running-config ! Lines omitted for brevity! interface FastEthernet0/0 ip address 192.168.1.3 255.255.255.0 ip nat inside interface GigabitEthernet0/0 ip address 190.2.2.21 255.255.255.0 ip ____________________ (missing command) ip nat inside source static 192.168.1.2 200.1.1. 2 ip nat inside source static 192.168.1.1 200.1.1.1 (A) nat source (B) nat enable (C) nat address **(D) nat outside**
233
One of the features of SNMPv3 is called message integrity. (A) TRUE (B) FALSE
One of the features of SNMPv3 is called message integrity. **(A) TRUE ** (B) FALSE
234
You have been tasked to find out whether the Cisco Discovery Protocol (CDP) is enabled globally. Which command will you type? (A) show protocols (B) show cdp (C) show running-config (D) show interface brief
You have been tasked to find out whether the Cisco Discovery Protocol (CDP) is enabled globally. Which command will you type? (A) show protocols **(B) show cdp ** (C) show running-config (D) show interface brief
235
Which of the following protocols synchronize the time of different systems? (A) NTP (B) SMTP (C) UDP (D) CDP
Which of the following protocols synchronize the time of different systems? **(A) NTP ** (B) SMTP (C) UDP (D) CDP
236
R1 and R2 are attached to the same Ethernet VLAN, with subnet 192.168.1.0/24, and addresses 192.168.1.1, 192.168.2 respectively. The routers use an FHRP. Host A and host B attach to the same LAN and have correct default router settings per the FHRP configuration. Which of the followingstatements is true for this LAN? (A) You can't connect two routers to the same LAN subnet. (B) If one router fails, hosts can't send packets off-subnet (C) If one router fails, both hosts will use the one remaining router as a default router (D) if one router fails, only one of the two hosts will still be able to send packets off-subnet
R1 and R2 are attached to the same Ethernet VLAN, with subnet 192.168.1.0/24, and addresses 192.168.1.1, 192.168.2 respectively. The routers use an FHRP. Host A and host B attach to the same LAN and have correct default router settings per the FHRP configuration. Which of the followingstatements is true for this LAN? (A) You can't connect two routers to the same LAN subnet. (B) If one router fails, hosts can't send packets off-subnet **(C) If one router fails, both hosts will use the one remaining router as a default router ** (D) if one router fails, only one of the two hosts will still be able to send packets off-subnet ## Footnote The three FHRP protocols are: 1) Hot Standby Router Protocol (HSRP) 2) Virtual Router Redundancy Protocol (VRRP) 3) Gateway Load Balancing Protocol (GLBP)
237
The snippet below is a Dynamic NAT configuration command? ExamsDigestR1# show running-config interface GigabitEthernet0/0 ip address 192.168.1.3 255.255.255.0 ip nat inside interface Serial0/0/0 ip address 100.1.1.249 255.255.255.252 ip nat outside ip nat inside source list 1 interface Serial0/0/0 overload access-list 1 permit 192.168.1.2 access-list 1 permit 192.168.1.1 (A) TRUE (B) FALSE
The snippet below is a Dynamic NAT configuration command? ExamsDigestR1# show running-config interface GigabitEthernet0/0 ip address 192.168.1.3 255.255.255.0 ip nat inside interface Serial0/0/0 ip address 100.1.1.249 255.255.255.252 ip nat outside ip nat inside source list 1 interface Serial0/0/0 overload access-list 1 permit 192.168.1.2 access-list 1 permit 192.168.1.1 (A) TRUE **(B) FALSE** ## Footnote The configuration above is a PAT configuration not Dynamic NAT. Port Address Translation (PAT) is another type of dynamic NAT that can map multiple private IP addresses to a single public IP address by using a technology known as Port Address Translation.
238
Which of the following characteristics of network traffic can be managed by Quality of Service (QoS)? (Choose all that apply) (A) Bandwidth (B) LLQ (C) Loss (D) Delay (E) CoS (F) Jitter
Which of the following characteristics of network traffic can be managed by Quality of Service (QoS)? (Choose all that apply) **(A) Bandwidth** (B) LLQ **(C) Loss** **(D) Delay ** (E) CoS **(F) Jitter**
239
What is a bare metal server?
This is a server where the operating system is running directly on the hardware. It's not running a hypervisor.
240
What type of layers do Neural Networks have between the input and output layers?
Hidden layers ## Footnote Neural Networks have an input and output layer with hidden layers in between.
241
What is managed by the provider in Platform as a Service?
With Platform as a Service, the operating system is managed by the provider and it's the applications and data that are managed by the customer.
242
What is the recommended DSCP value to mark scavenger traffic?
The recommended DSCP value to mark scavenger traffic is DSCP 8 (CS1).
243
What does a Policy Map define in MQC?
This MQC section defines the action to take on classified traffic.
244
What generates a Syslog message?
This message is generated when something happens on the device, such as an interface going down or an OSPF neighbour adjacency coming up.
245
What is an Object in JSON?
This JSON data type is an unordered collection of key/value pairs which are surrounded by curly braces {}.
246
What does WPA Enterprise use?
WPA Enterprise uses a AAA server.
247
What can be used to control traffic rate?
Traffic shaping and policing can be used to control traffic rate. They both measure the rate of traffic going through an interface and take an action if the rate is above a configured limit.
248
What is Catalyst Center?
It is a Cisco SDN controller which is designed to manage enterprise environments – campus, branch and WAN.
249
What is the Management Plane?
The device is configured and monitored in this router/switch plane. For example at the CLI through Telnet or SSH, via a GUI using HTTPS, or via SNMP or an API.
250
What is a hybrid SDN?
With a hybrid SDN the majority of the control plane intelligence is provided by an SDN controller, but the network devices retain some control plane intelligence as well as the data plane operations.
251
What does SIEM stand for?
Security Information and Event Management (SIEM) system provides a centralised location for all logging messages and will typically provide advanced analysis and correlation of events.
252
What type of duplex is wireless communication?
Wireless is half duplex, meaning only one device can communicate at a time.
253
What community is used by the Manager to read information in SNMPv2c?
With SNMPv2c, the read only (ro) community is used by the Manager to read information.
254
What does the SD-WAN Validator do?
The SD-WAN Validator authenticates all SD-WAN controllers, SD-WAN Manager NMS, and WAN Edge routers that join the SD-WAN.
255
What command configures a router to become an NTP server?
The command ntp master configures a router to become an NTP server, even if it is not synchronized with other NTP sources.
256
What is the data format used with SOAP?
With SOAP, the transport is typically HTTP(S), and the data format is always XML.
257
What is a cloud-managed monitoring platform for complex distributed networks?
ThousandEyes
258
What UDP ports does CAPWAP use?
CAPWAP uses UDP ports 5246 and 5247.
259
During the RAG process, what does the embedding model continuously update?
Vector database ## Footnote During the RAG process, the embedding model in the background continuously updates the vector database as the knowledge base is updated.
260
What does Privileged (level 15) provide?
Privileged (level 15) provides complete control over the router. When you enter Privileged Exec Mode with the ‘enable’ command, you’re at this level by default.
261
What is the maximum latency for voice and traditional standard definition video packets?
150 ms
262
What standard series defines Wi-Fi services?
Wi-Fi services are defined in the IEEE 802.11 standard series.
263
What does the REST response code 500 mean?
This REST response code means 'Internal Server Error'.
264
What is Data Serialization?
It is the process of converting structured data to a standardized format that allows sharing or storage of the data in a form that allows recovery of its original structure.
265
How long before an administrator is logged out due to inactivity?
An administrator will be logged out after 10 minutes of inactivity by default.
266
What commands are allowed at privilege level 0?
Privilege level 0 allows only five commands: logout, enable, disable, help, and exit.
267
What features AI Network Analytics for continuous network data analysis?
Cisco Catalyst Center ## Footnote Cisco Catalyst Center features AI Network Analytics, which continuously collects and analyzes network data.
268
What is the first SNMP version?
SNMPv1
269
What does LLM stand for?
Large Language Models
270
What is Git?
It is a version control system for tracking changes in source code and files.
271
What is a hybrid cloud?
The cloud deployment model where the cloud infrastructure is composed of two or more distinct cloud infrastructures that remain unique entities, bound together by standardized technology.
272
What is Traffic Shaping?
It buffers any excess traffic so the overall traffic stays within the desired rate limit.
273
What is Intent Based Networking (IBN)?
This transforms a traditional manual network into a controller led network that translates the business needs into policies that can be automated and applied consistently across the network.
274
What is a pure SDN?
With a pure SDN, the control plane runs purely on an SDN controller, and the data plane runs purely on the network devices.
275
What does DSCP stand for?
DSCP stands for Differentiated Services Code Point.
276
What is the line number for console cable connections?
Only one administrator can connect over a console cable at a time so the line number is always 0.
277
What is the SNMPv3 security level that uses password authentication and encryption?
AuthPriv
278
What does CI in CI/CD stand for?
CI in CI/CD stands for Continuous Integration.
279
What are VTY lines used for?
VTY lines are used for both Telnet and SSH connections.
280
What do SD-WAN controllers run?
SD-WAN controllers run the control plane.
281
What is CI/CD?
It is a set of operating principles and practices that enable application development teams to deliver code changes more frequently and reliably.
282
What does CBWFQ stand for?
CBWFQ stands for Class Based Weighted Fair Queuing.
283
What is a Wireless Access Point?
This device provides connectivity between wireless stations and between the wireless and wired networks.
284
What is the Underlay network?
This SD-Access network is the underlying physical network. It provides the underlying physical connections which the overlay network is built on top of.
285
What is the SNMPv3 view used to send notifications?
Notify view
286
What is the name for severity level 0?
Emergency
287
What command is used to generate a digital certificate?
The command to generate a digital certificate is crypto key generate rsa.
288
What is the channel width for 2.4 GHz and 5 GHz?
2.4 GHz channels are 22 MHz (older standards) or 20 MHz (current standards) wide, and 5 GHz channels are 20 MHz wide but can be bundled.
289
What command is used to enter an encrypted password for Privileged Exec mode?
The command to enter is enable secret FlackboxPass0!.
290
What CoS values are reserved for network use?
CoS values 6 and 7 are reserved for network use.
291
What is the timeout for the command 'exec-timeout 15 30'?
The administrator can stay inactive for 15 minutes 30 seconds before getting logged out.
292
What does a Class Map define in MQC?
This MQC section defines the traffic to take an action on.
293
What is a private cloud?
The cloud deployment model where the cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers.
294
What is APIC?
It is the main component of the Cisco ACI solution and it is designed to manage data center environments with Nexus switches.
295
What does NMS stand for?
Network Management System
296
What is an Ad Hoc Network?
Using this WLAN network, two or more wireless stations communicate directly with each other.
297
What does the REST response code 404 mean?
Rest response code 404 means 'Not Found'.
298
What are Standalone Access Points also known as?
Standalone Access Points are known as Autonomous Access Points.
299
What is the default value of CoS?
300
What command configures a banner shown before logging in?
The command to configure a banner shown before logging in is banner login.
301
What organizes data variables on SNMP managed systems?
Management Information Base (MIB)
302
What does clustering support?
Clustering supports combining multiple physical systems into a single virtual system.
303
What does AAA stand for?
AAA stands for Authentication, Authorization, and Accounting.
304
What access does User (level 1) provide?
User (level 1) provides very limited read-only access to the router. When you enter User Exec Mode you’re at this level by default.
305
What does virtualization support?
Virtualization supports running multiple virtual systems on a single physical system.
306
What command disables logging to the console line?
no logging console
307
What command secures user exec mode with a password?
The command enable password secures the user exec mode with a password, that can be viewed in plain text in the running configuration by default.
308
What does SOAP stand for?
Simple Object Access Protocol.
309
What is the simulation of human-like intelligence by computer systems?
Artificial Intelligence (AI)
310
What does WPA Personal use?
WPA Personal uses pre-shared keys (PSKs).
311
What does Accounting keep track of?
Accounting keeps track of the options that a user has carried out. This can be used as an audit trail to check what commands an administrator entered.
312
What is cloud computing?
It is a model for enabling ubiquitous, convenient On-Demand Network access to a shared pool of configurable computing resources.
313
What does RSA stand for?
RSA stands for Rivest, Shamir, Adleman.
314
What type of hypervisor runs directly on the system hardware?
Type 1 (Bare Metal) Hypervisor
315
How many privilege levels of admin access are available on a Cisco router or switch?
There are 16 privilege levels of admin access available.
316
In what modes do wireless stations operate?
Wireless stations work in either Ad-Hoc or Infrastructure mode. They cannot operate in both at the same time.
317
What type of AI utilizes patterns from past data to create new outputs?
Generative AI ## Footnote Generative AI utilizes patterns and relationships learned from past data to create new outputs such as text, images, audio and video.
318
How are devices within the Basic Service Set identified?
Devices within the Basic Service Set are identified by Basic Service Set Identifier (BSSID) and that is based on their MAC address.
319
What does the 'C' in CRUD stand for?
The 'C' in CRUD stands for Create.
320
What influences the path data takes across a Neural Network?
Weight ## Footnote The path data takes across the Neural Network and the final output is influenced by the weight of connections.
321
What are Access Points that rely on a WLC known as?
Access Points that rely on a WLC are known as Lightweight Access Points.
322
What does the REST response code 201 mean?
The REST 201 response code means 'Created'.
323
What command shows all passwords in an encrypted form?
The command service password-encryption shows all passwords in the running configuration in an encrypted form.
324
What is congestion?
This can be experienced whenever packets come in quicker than they can be sent out.
325
What does NTP stand for?
NTP stands for Network Time Protocol.
326
What does CAPWAP stand for?
Control And Provisioning of Wireless Access Points.
327
In the RAG process, what converts a user query into numeric format?
Embedding Mode ## Footnote In the RAG process, when users enter a query, the Embedding Mode converts it into numeric format which is compared to the vector database.
328
What type of hypervisor runs on top of a host operating system?
Type 2 Hypervisor
329
What is a single pane of glass application for data center management?
Cisco Nexus Dashboard
330
Which Generative AI model is better for network diagrams due to detailed output?
Generative Adversarial Networks (GANs)
331
What does Authorization specify?
Authorization specifies what a particular user is allowed to do, such as whether they are allowed to run a particular command or not.
332
What is the format of Syslog messages?
seq no: time stamp: %facility-severity-MNEMONIC: description.
333
What analyzes network traffic to create a baseline of normal behavior?
Cisco Secure Network Analytics ## Footnote Cisco Secure Network Analytics is a Cisco security software which analyzes network traffic to create a baseline of normal network behavior.
334
In which frequency spectrums do Wi-Fi services operate?
Wi-Fi services operate in the 2.4 GHz and 5 GHz frequency spectrum. Wi-Fi 6 also added the 6 GHz frequency spectrum in 2021.
335
What type of AI analyzes past and current data for proactive maintenance and performance optimization?
Predictive AI ## Footnote Predictive AI analyses past and current data which can be used in Network Operations for proactive maintenance and performance optimisation.
336
What type of hypervisor is used in the image?
Type 2 Hypervisor
337
What community is used by the Manager to set information in SNMPv2c?
With SNMPv2c, the read write (rw) community is used by the Manager to set information.
338
What is the SNMPv3 security level that uses password authentication but no encryption?
AuthNoPriv
339
What does the provider manage in Software as a Service?
With Software as a Service, the provider is managing everything from the facility, all the way up to the data.
340
What does QoS Queuing do?
This can reduce latency, jitter and loss for particular traffic by giving each type of traffic the service it requires.
341
In a GAN model, what learns to distinguish between generated and real data?
Discriminator ## Footnote With GAN model, the discriminator learns to distinguish between the generated data and the real data.
342
What classification and marking method recognizes traffic based on Layer 3 to Layer 7 characteristics?
NBAR (Network Based Application Recognition)
343
What is eXtensible Markup Language (XML)?
This markup language was standardized in 1998 and it was designed to describe and transfer data.
344
What enhances the accuracy of an existing LLM by looking up an external database?
Retrieval-Augmented Generation (RAG)
345
What is an Array in JSON?
This JSON data type is an ordered list of values which are surrounded by square brackets [].
346
What is REST (Representational State Transfer)?
It is an architecture that gives guidelines for the structure and organization of an API. It also supports any transport and data format.
347
What is Simple Object Access Protocol (SOAP)?
It is an XML-based standard communication protocol system that permits processes using different operating systems like Linux and Windows to communicate via HTTP.
348
What is a Service Set Identifier (SSID)?
This is a unique identifier that names a wireless network (WLAN).
349
What is the SNMPv3 security level with no authentication and no encryption?
noAuthNoPriv
350
What is a community cloud?
The cloud deployment model where the cloud infrastructure is provisioned for exclusive use by a specific group of consumers from organizations that have shared concerns.
351
What enables machines to mimic intelligent human behavior by learning from data without being explicitly programmed?
Machine Learning
352
What is the maximum recommended Jitter value for voice traffic?
30 ms
353
What is Traffic Policing?
It drops or re-marks excess traffic to enforce the specified rate limit.
354
What does APIC stand for?
Application Policy Infrastructure Controller.
355
What is the Syslog severity level value for Informational?
6
356
What is a public cloud?
The cloud deployment model where the cloud infrastructure is provisioned for open use by the general public.
357
What protocols are used for AAA services?
The protocols which are used for AAA services are RADIUS and TACACS+.
358
What type of models take instructions from the same input type as their output?
Unimodal models ## Footnote Unimodal models take instructions from the same input type as their output.
359
What are the two components required for SD-Access?
1. Users are authenticated by the ISE Identity Services Engine. 2. The security policy is configured on the Catalyst Center.
360
What does CD in CI/CD stand for?
CD in CI/CD stands for Continuous Delivery or Continuous Deployment.
361
What is Zero Touch Provisioning (ZTP)?
With this, Lightweight Access Points can discover the Wireless LAN Controller and then download their configurations from there.
362
What type of models can take input from different sources and generate output in various forms?
Multimodal models ## Footnote Multimodal models can take input from different sources and generate output in various forms.
363
What is a type of Machine Learning based on a Neural Network with at least 2 hidden layers?
Deep Learning
364
What level does the customer get access to with IaaS?
With IaaS, the customer gets access at the operating system level.
365
What does SSH provide?
SSH gives you command line access to the router or switch just like Telnet, but all of the traffic is encrypted.
366
What is a way to reduce hallucination in LLMs using additional relevant data?
Fine tuning
367
What byte in the Layer 3 IP header carries the DSCP QoS marking?
The Type of Service (ToS) byte in the Layer 3 IP header is used to carry the DSCP QoS marking.
368
What is a private cloud?
Private Cloud works the same way as Public Cloud, but the services are provided to internal business units instead of to external public enterprises.
369
What protocol enables a Wireless LAN Controller to manage Wireless Access Points?
This protocol is a standardized protocol that enables a Wireless LAN Controller to manage a collection of Wireless Access Points.
370
What signals back through the neural network to change weights?
Backpropagation
371
What command enables debug output to the VTY lines?
terminal monitor
372
What is SNMPv2c?
This SNMP version uses plain text Community strings and it supports bulk retrieval.
373
In VAE, what compresses the input data to retain important information?
Encoder ## Footnote With VAE, the encoder compresses the input data, optimizing to retain only the most important information.
374
What is the Control Plane?
It is the router/switch plane that makes decisions about how to forward traffic. Its packets are destined to or locally originated on the device itself.
375
Where are Syslog events saved in RAM?
Logging Buffer
376
What does IBSS stand for?
IBSS stands for Independent Basic Service Set.
377
What is a Wireless Local Area Network (WLAN)?
This wireless network type provides access to a campus network, without the need for a cable. The devices are within 100m of a Wireless Access Point.
378
What happens in infrastructure mode?
In infrastructure mode, rather than the devices communicating directly with each other over wireless, they communicate via a wireless Access Point.
379
What command allows only SSH on the VTY lines?
To allow only SSH on the VTY lines, the command to enter is transport input ssh.
380
What is the Overlay network?
This SD-Access network is a logical topology used to virtually connect devices. It is built over the physical underlay network.
381
What do Neural Networks contain that are arranged in layers?
Nodes ## Footnote Neural Networks contain artificial neurons called nodes which are arranged in a series of layers.
382
What command causes the command prompt to be copied below Syslog messages?
logging synchronous
383
What is a Basic Service Area (BSA)?
This is a wireless coverage area of an Access Point. It is also known as a wireless cell.
384
What does a Service Policy do in MQC?
This MQC section applies the policy map to an interface.
385
What is the difference between 'enable secret' and 'enable password'?
'enable secret' performs the same function as 'enable password', but it is always stored in a hashed format in the running configuration.
386
What is the minimum key length for SSHv2 login?
A digital key with a length of at least 768 bits must be generated to enable SSHv2 login.
387
What is Wi-Fi Direct?
It allows devices to be connected to an Access Point and also be part of a peer-to-peer wireless network.
388
What is SNMPv3?
This SNMP version supports strong authentication and encryption with the use of usernames and passwords.
389
What is a Wireless Personal Area Network (WPAN)?
This wireless network type has devices that are within 10 meters of each other, and Bluetooth is often used.
390
What enables computers to understand and generate language as it is spoken and written?
Natural Language Processing (NLP)
391
What is WPA3?
This wireless security standard came out in 2018. It supports AES encryption, CCMP, and protection against KRACK attack.
392
What is the layer in a neural network that receives data for analysis?
Input Layer
393
Which Generative AI model tracks relationships in sequential data?
Transformer model
394
What is LLQ?
LLQ (Low Latency Queuing) is CBWFQ with a priority queue.
395
What is Authentication?
Authentication verifies somebody is who they say they are and it is most commonly achieved with a username and password.
396
What is an SNMP Manager?
An SNMP Manager (the SNMP server) can collect and organize information from an SNMP Agent, which is SNMP software that runs on managed devices such as routers and switches.
397
What type of hypervisor is used in the image?
Type 1 Hypervisor
398
What is the architecture composed of encoder and decoder neural networks?
Transformer architecture ## Footnote The Transformer architecture is composed of encoder and decoder neural networks.
399
What type of traffic can an enterprise classify and mark as bad traffic?
An enterprise can configure classification and marking to recognize bad traffic known as scavenger traffic.
400
What is a subset of AI?
Machine Learning ## Footnote Machine Learning is a subset of AI.
401
What is DHCP snooping?
With DHCP snooping, you configure the ports that your DHCP server is connected to as a trusted port.
402
What commands will you enter to enable DHCP snooping on VLAN 20?
Switch(config)# ip dhcp snooping Switch(config)# ip dhcp snooping vlan 20
403
What command will you enter to make an interface a trusted port?
Switch(config-if)# ip dhcp snooping trust
404
What is the purpose of DHCP snooping?
This access layer switch security mechanism can prevent attacks from rogue DHCP servers by dropping DHCP server traffic that comes in a port that is not trusted.
405
What does DAI stand for?
Dynamic ARP Inspection
406
What is a Gratuitous ARP?
It is an ARP update which is not in response to an actual request.
407
What do you need to enable before configuring DAI?
To configure DAI, you need to have enabled DHCP snooping already.
408
On which ports is DAI not performed?
DAI is not performed on trusted ports.
409
What command will you enter to enable DAI on VLAN 100?
Switch(config)# ip arp inspection vlan 100
410
What traffic is allowed on switch ports when 802.1x is enabled?
When 802.1x is enabled, only authentication traffic is allowed on switch ports until the host and user are authenticated.
411
What is the role of the PC in 802.1x terminology?
The PC is the supplicant in the 802.1x terminology.
412
What is the role of the access switch in 802.1x terminology?
The access switch where the user is connected to is the authenticator in the 802.1x terminology.
413
What happens when a user enters their username and password in 802.1x?
With 802.1x, when the user enters the username and password, the authenticator passes that information onto the authentication server and the authentication server will check if it's valid.
414
What is the purpose of 802.1x?
It is used to authenticate users on the network. They don't get access to the network at all until they put in a valid username and password which is checked by the authentication server.
415
What is Port Security?
This enables an administrator to specify which MAC address or addresses can send traffic into an individual switch port.
416
What command is used to verify the port security addresses?
show port-security address
417
What action does the Shutdown violation action take?
This port security violation action places the interfaces into error-disabled state, blocking all traffic.
418
What does the Restrict violation action do?
With this port security violation action, the traffic from unauthorized addresses is dropped, logged, and the violation counter is incremented.
419
What command will you enter to set the maximum number of MAC addresses allowed to send traffic into the interface to 5?
Switch(config-if)# switchport port-security maximum 5
420
What are Access Control Lists made up of?
Access Control Lists are made up of Access Control Entries which are a series of permit or deny rules.
421
How do Named ACLs begin?
Named ACLs begin with the command ‘ip access-list’ instead of ‘access-list’.
422
At what level are ACLs applied?
ACLs are applied at the interface level with the command ip access-group.
423
What is the maximum number of ACLs per interface per direction?
You can have a maximum of one ACL per interface per direction.
424
What do Extended ACLs check based on?
Extended ACLs check based on the protocol, source address, destination address, and port number.
425
What do Standard ACLs reference?
Standard ACLs reference the source address only.
426
What is the standard ACL range?
The standard ACL range is 1-99. Expanded: 1300-1999.
427
What is the extended ACL range?
The extended ACL range is 100-199. Expanded: 2000-2699.
428
What is the default wildcard mask for a Standard ACL?
0.0.0.0
429
What command will you enter to configure a standard ACL with an access-list number of 10 and allow traffic from 192.168.10.0/24?
access-list 10 permit 192.168.10.0 0.0.0.255
430
What commands are entered to configure a Standard ACL with access list number of 1 and will allow all traffic?
access-list 1 permit any
431
What will the configuration permit traffic from 192.168.1.1?
Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255 Router(config)# access-list 1 deny host 192.168.1.1 The configuration above will permit/allow traffic from 192.168.1.1.
432
What will the configuration deny traffic from 192.168.1.1?
Router(config)# access-list 1 deny host 192.168.1.1 Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255 The configuration above will deny/block traffic from 192.168.1.1.
433
How are ACEs numbered?
ACEs are automatically numbered in increments of 10.
434
What command will you enter to configure an extended ACL for 'FlackboxACL'?
ip access-list extended FlackboxACL
435
What keyword is used in the ACL command to match packets on a given port number?
eq
436
What keyword is used in the ACL command to match packets in a specified range of port numbers?
range
437
What ACL keyword is used to log to the console or an external monitoring server?
log
438
What was implemented as a temporary workaround to mitigate the lack of IPv4 addresses?
NAT (Network Address Translation)
439
What does RFC 1918 specify?
RFC 1918 specifies private IP address ranges which are not routable on the public Internet.
440
What type of NAT offers permanent one-to-one mapping usually between a public and private IP address?
Static NAT
441
What type of NAT uses a pool of public addresses assigned on a first-come, first-served basis?
Dynamic NAT
442
What is the NAT type that allows the same public IP address to be reused for all translations?
Dynamic NAT with overload, also known as PAT (Port Address Translation)
443
What command is used to remove all dynamic translations from the NAT translation table?
clear ip nat translation
444
What does Dynamic NAT with Overload use to allow more clients to be translated than IP addresses are available in the NAT pool?
Dynamic NAT with Overload uses PAT to allow more clients to be translated than IP addresses are available in the NAT pool.
445
What is the Inside Local Address?
It is the IP address actually configured on the inside host’s Operating System.
446
What is the Inside Global Address?
The NAT’d address of the inside host as it will be reached by the outside network.
447
What is the Outside Local Address?
The IP address of the outside host as it appears to the inside network.
448
What is the Outside Global Address?
It is the IP address assigned to the host on the outside network by the host’s owner.
449
In one-way NAT, how are the Outside Local and Outside Global addresses reported?
For one-way NAT, the Outside Local and Outside Global addresses will be reported as being the same.
450
What command will you enter to create a NAT pool named 'FlackboxNAT' with a global address range of 100.1.2.3 to 100.1.2.10 and a subnet mask of /27?
ip nat pool FlackboxNAT 100.1.2.3 100.1.2.10 netmask 255.255.255.224
451
What keyword allows multiple hosts to reuse the top address in the NAT pool?
overload
452
Which Router interface will be configured with 'ip nat inside' when running static NAT for the 'Server'?
interface G0/2
453
Which Router interface will be configured with 'ip nat outside'?
interface G0/1
454
What show command shows the Inside Global, Inside Local, Outside Local, and Outside Global address translations?
show ip nat translations
455
What is required with standard dynamic NAT for every inside host that needs to communicate with the outside?
With standard dynamic NAT, you need a public IP address for every inside host which needs to communicate with the outside.
456
What show command outputs how many addresses have been translated by NAT?
show ip nat statistics
457
What is a dual stack implementation?
In a dual stack implementation, a network interface can have both an IPv4 and an IPv6 address at the same time, and it can be used as an IPv4 to IPv6 transition strategy.
458
How many bits does IPv6 use for addressing?
IPv6 uses a 128 bit address compared to IPv4’s 32 bit address.
459
What is the mask used for addresses assigned to individual hosts in IPv6?
23377
460
What range are Global Unicast Addresses assigned from?
36586
461
What command enables IPv6 routing?
ipv6 unicast-routing
462
Does IPv6 support broadcast traffic?
IPv6 does not support broadcast traffic, but it does support multicast to all hosts on the local subnet which is functionally equivalent.
463
What does using /64 everywhere in IPv6 addressing enable?
Using /64 everywhere simplifies the IPv6 addressing and enables the use of EUI-64 addresses.
464
What is injected in the middle of the 48 bits MAC address with EUI-64?
With EUI-64, FF:FE is injected in the middle of the 48 bits MAC address to bring the host portion of the IPv6 address up to 64 bits. Also, the 7th bit in the MAC address is inverted.
465
What type of message is sent to the Solicited-Node multicast address in Neighbor Discovery?
Neighbor Solicitation
466
What is the IPv6 version of ARP?
Neighbor Discovery Protocol
467
What mask do local IPv6 routes always have?
/128
468
What are Unique Local Addresses in IPv6?
These IPv6 addresses are similar to IPv4 RFC 1918 private addresses. They are not publicly reachable.
469
What are Link local addresses in IPv6?
These IPv6 addresses are valid for communications on that link only.
470
What is the host portion of the IPv6 address 2001:100B:00D8:35A3:C004:7B01:09F0:1C01 /64?
C004:7B01:09F0:1C01
471
What is the network portion of the IPv6 address 2001:26CC:0F1D:C001:D330:5AF7:11A2:8000 /64?
2001:26CC:0F1D:C001
472
What is the long format of 2001:F:12::34:0:A3?
2001:000F:0012:0000:0000:0034:0000:00A3
473
What addresses are mandatory on IPv6 enabled interfaces?
Link local addresses
474
What messages does Neighbor Discovery use?
Neighbor Discovery uses ICMPv6 neighbor solicitation messages and neighbor advertisement messages.
475
What does the unspecified address (::) mean in IPv6?
This means 'Unspecified address' or 'Unknown address' in IPv6. It is also used as the source when an interface is trying to acquire an address.
476
What message can hosts send with SLAAC to request information from the router?
With SLAAC, the hosts can send a Router Solicitation message to request information from the router.
477
What is the shortened IPv6 version of 1000:00B8:0000:000F:0050:0000:0000:B001?
1000:B8:0:F:50::B001
478
What is the IPv6 equivalent of 0.0.0.0 0.0.0.0 (default route) in IPv4?
36526
479
What range are IPv6 link-local addresses assigned from?
FE80::/10 – FEB0::/10
480
What is a Virtual Private Network (VPN)?
This provides a virtual tunnel between private networks across a shared public network such as the Internet.
481
What is a Remote Access VPN?
VPN connections are between a router or firewall in the office and VPN software installed on an individual user’s device.
482
What is a Site to Site VPN?
VPN connections are terminated on a router or firewall in each office. Software does not need to be installed on user desktops.
483
What is an IPsec Tunnel?
This Site-to-Site VPN configuration option is open standard and it does not support multicast.
484
What does GRE over IPsec provide?
By using GRE over IPsec, you get the encryption from IPsec, and you also get the multicast support from GRE.
485
What is DMVPN?
This is a Cisco proprietary Site-to-Site VPN configuration option, which provides scalable, simple, hub and spoke style configuration, and enables direct full mesh connectivity between all offices.
486
What is GETVPN?
This Site-to-Site IPsec VPN configuration option is Cisco proprietary. It enables a scalable, centralised policy for VPN over a non-public infrastructure.
487
What is MPLS?
This WAN connectivity option uses a shared core infrastructure at the service provider. It can be used for connectivity to the Internet and/or connectivity between offices over VPN.
488
What does the acronym MPLS stand for?
Multi Protocol Label Switching
489
What is DWDM?
It combines or ‘multiplexes' multiple optical signals into one optical signal transmitted over a single fiber strand.
490
What bandwidth do T1 leased lines offer?
T1 leased lines offer a bandwidth of 1.544 Mbps.
491
What does VPWS stand for?
VPWS stands for Virtual PseudoWire Service and that is a point-to-point Layer 2 VPN.
492
What does VPLS stand for?
VPLS stands for Virtual Private LAN Service and it is a multipoint Layer 2 MPLS VPN.
493
What routers does MPLS run across?
MPLS runs across the provider's core on the PE and P routers.
494
What are Customer Edge (CE) routers?
These routers do not run MPLS but they peer at Layer 3 with the provider PE routers.
495
What does the acronym DSL stand for?
Digital Subscriber Line
496
What does PPPoE stand for?
PPPoE stands for Point-to-Point Protocol over Ethernet.
497
What type of topology is a Full Mesh topology?
The topology option below is a Full Mesh topology.
498
What are targeted attacks?
These attacks are directed against a particular individual or organisation. Skilled attackers will typically start off with low impact reconnaissance.
499
What are script kiddies?
It is a derogatory term for low skilled attackers who download and use off-the-shelf hacking software to launch exploits.
500
What is ransomware?
This type of malware encrypts data with an attacker’s key, and asks the victim to pay money to obtain that key.
501
What is a vulnerability?
A vulnerability is a weakness that compromises the security or functionality of a system.
502
What is an exploit?
An exploit uses a weakness to compromise the security or functionality of a system.
503
What is phishing?
It is a Social Engineering attack where the victim is often directed to enter their personal details into the attacker’s website which looks like the reputable company’s legitimate website.
504
What is an Intrusion Detection System (IDS)?
It sits alongside the traffic flow and informs security administrators of any potential concerns.
505
What is an Intrusion Prevention System (IPS)?
It sits inline with the traffic flow and can also block attacks.
506
How do firewalls operate?
Firewalls block or permit traffic based on rules such as destination IP address and port number.
507
What are stateful firewalls?
Stateful firewalls maintain a connection table which tracks the two-way ‘state’ of traffic passing through the firewall.
508
What are Next Generation Firewalls?
Next Generation Firewalls move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and user-based security.
509
What is cryptography?
It transforms readable messages into an unintelligible form and then later reverses the process.
510
What is symmetric encryption?
With symmetric encryption, the same shared key both encrypts and decrypts the data.
511
What is asymmetric encryption?
This type of encryption uses private and public key pairs where in the data encrypted with the public key can only be decrypted with the private key, and vice versa.
512
What are examples of asymmetric encryption algorithms?
RSA and ECDSA are Asymmetric encryption algorithms.
513
What are examples of symmetric encryption algorithms?
DES and AES are examples of Symmetric encryption algorithms.
514
What does HMAC stand for?
Hash-Based Message Authentication Code
515
What is Public Key Infrastructure (PKI)?
This solves the secure key distribution problem and it uses a Certificate Authority for the parties who need secure communication.
516
What is Transport Layer Security (TLS)?
This is the successor to SSL.
517
What is a Site-to-Site VPN?
This type of VPN uses symmetric encryption algorithms such to send encrypted traffic between locations over an untrusted network such as the Internet.
518
What does Internet Key Exchange (IKE) do?
Internet Key Exchange (IKE) handles negotiation of protocols and algorithms, and generates the encryption and authentication keys.
519
What is Internet Security Association and Key Management Protocol (ISAKMP)?
It defines the procedures for authenticating and communicating, peer creation, and management of Security Associations. It typically uses IKE for key exchange.
520
What does ESP stand for?
Encapsulating Security Payload
521
What is Tunnel mode in IPsec?
This IPsec mode protects the internal routing information by encrypting the IP header of the original packet.
522
What is Transport mode in IPsec?
This IPsec mode encrypts only the payload and the ESP trailer, so the IP header of the original packet is not encrypted.
523
What is the OSI Model?
Its seven-layered approach to data transmission divides the operations into specific related groups of actions at each layer.
524
What does the OSI Layer do?
The OSI Layer organizes data transmission into seven distinct layers.
525
What is the purpose of the first layer in the OSI Model?
The first layer is responsible for the physical transmission of data.
526
What is the function of the second layer in the OSI Model?
The second layer handles data link protocols and error detection.
527
What does the third layer of the OSI Model manage?
The third layer is responsible for network routing and addressing.
528
What is the role of the fourth layer in the OSI Model?
The fourth layer manages transport protocols and ensures reliable data transfer.
529
What does the fifth layer of the OSI Model focus on?
The fifth layer is concerned with session management and control.
530
What is the sixth layer in the OSI Model responsible for?
The sixth layer handles data representation and encryption.
531
What does the seventh layer of the OSI Model do?
The seventh layer provides application services for user processes.
532
What is the TCP/IP Stack?
It is a protocol stack that consists of multiple protocols including TCP (Transmission Control Protocol) and IP (Internet Protocol).
533
Which OSI layer provides network services to the applications of the user?
Application Layer
534
What does the OSI presentation layer ensure?
The OSI presentation layer ensures that the information that is sent at the application layer of one system is readable by the application layer of another system.
535
What does the OSI session layer do?
The OSI session layer establishes, manages, and terminates sessions between two communicating hosts.
536
Which OSI layer defines the specifications for activating, maintaining, and deactivating the physical link between end devices?
Physical Layer
537
What does the OSI data link layer define?
The OSI data link layer defines how data is formatted for transmission and how access to physical media is controlled.
538
What does the OSI transport layer define?
This OSI layer defines services to segment, transfer and reassemble the data for individual communications between the end devices.
539
What does the OSI network layer provide?
This OSI layer provides connectivity and path selection between two host systems that may be located on geographically separated networks.
540
What is the purpose of the mask in the image loading script?
The mask prevents the original image from loading before the overlay image is fully loaded.
541
What happens when the mask is clicked?
Clicking the mask toggles the display of the answer mask.
542
What is the function of the 'loaded' function in the script?
The 'loaded' function sets the visibility of the original image to 'visible' once the mask is loaded.
543
What does the variable 'mask' represent in the script?
The variable 'mask' represents the overlay image element in the DOM.
544
What does the 'toggle' function do?
The 'toggle' function changes the display property of the answer mask between 'block' and 'none'.
545
What is the initial display state of the answer mask?
The initial display state of the answer mask is 'block' or empty, which means it is visible.
546
What is the significance of the 'aFade' and 'qFade' variables?
The 'aFade' and 'qFade' variables are used to control the fading effects, although their specific implementation is not detailed in the provided text.
547
What does Ping verify?
Ping verifies two-way connectivity, meaning it sends a packet from the source to the destination and the destination will send a ping reply back.
548
What protocol does Ping use?
ICMP (Internet Control Message Protocol)
549
What command does a ping, hop by hop, from the source to the destination?
Traceroute
550
What is the Cisco troubleshooting methodology that starts at the Application Layer?
Top Down Approach
551
What is the Cisco troubleshooting methodology that starts at the Physical Layer?
Bottom Up Approach
552
What does TTL stand for?
TTL stands for Time to Live.
553
What does the traceroute command send with increasing values?
The traceroute command sends the ping with increasing Time To Live (TTL) values.
554
Which router is most likely to have a problem based on Ping results?
Router3
555
What layer problems do Ping and traceroute commands troubleshoot?
Ping and traceroute commands troubleshoot Layer 3 problems.
556
What command is usually used to access the CLI of a device via port 23?
The telnet command is usually used to access the CLI of a device via port 23 but it also helps with troubleshooting layer 4 and above problems by being able to telnet to a particular port.
557
What does SVI stand for?
Switched Virtual Interface
558
What is configured on the Switched Virtual Interface (SVI) for the default VLAN 1?
The switch Management IP address and subnet mask.
559
What command configures a descriptive name to a device?
hostname
560
What is the default setting for interface speed and duplex?
auto
561
What is Cisco Discovery Protocol (CDP)?
A Cisco proprietary Layer 2 protocol used to share information with other directly connected Cisco equipment.
562
What is LLDP?
Link Layer Discovery Protocol, an open standard protocol that provides similar information to CDP.
563
What is an example of a Layer 1 problem?
The cable getting disconnected on either or both ends.
564
What command will you enter to configure the IP address 10.128.254.254/30 on an interface?
ip address 10.128.254.254 255.255.255.252
565
What command is used to configure the default gateway on Layer 2 switches?
ip default-gateway
566
What command will set the interface to full duplex?
duplex full
567
What command is entered on the interface level to configure a speed of 100 Mbps?
speed 100
568
What command enables auto duplex configuration?
duplex auto
569
What command shows the entire running configuration on the device?
show running-config
570
What does an 'administratively down' interface status mean?
The interface is not issued with the ‘no shutdown’ command.
571
What command shows the version of IOS running on the device?
show version
572
What does CDP stand for?
Cisco Discovery Protocol
573
What command is used to disable CDP globally on a device?
'no cdp run'
574
What command is used to disable CDP at the interface level?
no cdp enable
575
What does LLDP stand for?
Link Layer Discovery Protocol
576
What does the 'show interfaces brief' command output indicate?
A Layer 2 issue or a speed mismatch on serial interfaces.
577
What command will you enter to configure the IP address 10.128.254.255/30 on an interface?
None. 10.128.254.255 is the broadcast address in the /30 network and will not be accepted.
578
What prompt is shown if an IOS image cannot be found?
The device will show the ROMMON prompt at the command line.
579
Where does the device first load from when powered on?
The device will first load from ROM (Read Only Memory).
580
What does the system load by default from ROM?
The system will load the first IOS image found in Flash by default.
581
Where does the system load the startup-config configuration file from after loading the IOS image?
The system will load the startup-config configuration file from NVRAM.
582
What happens if no startup-config file is found in NVRAM?
The device will load the Setup Wizard.
583
What is loaded into RAM during bootup?
The IOS system image and startup-config are loaded from Flash and NVRAM into RAM during bootup.
584
What does TFTP stand for?
TFTP stands for Trivial File Transfer Protocol.
585
How do you replace a configuration?
Factory reset the device and then copy the new configuration into the startup-config.
586
What happens when you copy a config file into the running-config?
It will be merged with the current configuration.
587
What command is used to copy the running configuration to the TFTP server?
copy running-config tftp
588
What Configuration Register value ignores contents of NVRAM?
8514
589
What configuration register value will allow you to boot into ROMMON?
8480
590
What command is used to copy the IOS image to the device's Flash using TFTP?
copy tftp flash
591
What command sets where the system will find the IOS image to load?
boot system
592
What happens when you enter a command in IOS?
It takes effect immediately and goes into the running-config.
593
What is the normal working memory of the device?
RAM
594
How do you configure the configuration register?
Use 'config-register' command in global configuration mode or 'confreg' at the ROMMON prompt.
595
What does POST stand for?
Power On Self Test
596
What does a routing table consist of?
It consists of directly connected networks and routes configured statically by the administrator or dynamically learned through a routing protocol.
597
What type of route always has a /32 mask?
Local routes always have a /32 mask and show the IP address configured on the interface.
598
What type of route is indicated by 'C' in the routing table?
Connected Route
599
What type of route is indicated by 'L' in the routing table?
Local Route
600
What is the benefit of summary routes in static routing?
For static routing, summary routes lessen the administrative overhead because there are less routes to configure. It also lessens the memory usage on the routers.
601
Which of the following has the longest prefix match: 192.168.10.0/24, 192.168.10.0/28, 192.168.0.0/16?
192.168.10.0/28
602
What happens when multiple equal length routes are added for the same destination?
The router will add them all to the routing table and load balance between them.
603
What is a default route?
This is a route going out to everywhere else that we haven't specifically had a route for elsewhere.
604
What is a catch-all route for any traffic that does not match specific routes?
Default Route
605
How can an administrator add a route to a destination?
An administrator can manually add a static route to the destination, or the router can learn it via a routing protocol.
606
What is listed in a router’s routing table?
The best available next hop or next hops to a destination network are listed in a router’s routing table and will be used for forwarding traffic.
607
What is the show command used to view the routing table on a router?
show ip route
608
What is the IP address of Router1's interface that is connected to Router2?
10.10.20.1
609
What command will you enter to configure a static route to 172.16.0.0/16 with the next hop address of 172.17.1.1?
ip route 172.16.0.0 255.255.0.0 172.17.1.1
610
What value is assigned to each possible path by the routing protocol?
Each possible path will be assigned a metric value by the routing protocol which indicates how preferred the path is.
611
What is the metric of RIP?
Hop Count
612
What metric does OSPF use?
OSPF uses Cost as the metric, which is automatically derived from interface bandwidth by default.
613
What does Equal Cost Multi Path do?
Equal Cost Multi Path will load balance the outbound traffic to the destination over the different paths.
614
What is a measure of how trusted the routing protocol is?
Administrative Distance
615
What are floating static routes used for?
Floating static routes allow us to change the Administrative Distance of a static route to make it act as the backup route.
616
Which route is most preferred for a destination IP of 192.168.1.1?
192.168.1.0/28 RIP route (longest prefix match)
617
Which of the following routes is the most preferred: 10.10.1.0/24 RIP route, 10.10.1.0/24 EIGRP route, or 10.10.1.0/24 OSPF route?
10.10.1.0/24 EIGRP route
618
What are passive interfaces?
These interfaces allow you to include an IP subnet in the routing protocol without sending updates out of the interface.
619
What is the best practice for configuring loopback interfaces in routing protocols?
It is best practice to configure loopback interfaces as passive interfaces.
620
What happens when an IGP is enabled on an interface?
The router will look for other devices on the link running the routing protocol and form an adjacency with matching peers.
621
What are Interior Gateway Protocols used for?
Interior Gateway Protocols are used for routing within an organisation.
622
What are Exterior Gateway Protocols used for?
Exterior Gateway Protocols are used for routing between organisations over the Internet.
623
Which is the preferred path from R1 to reach R5 when RIP is enabled?
R1>R6>R7>R5
624
Which is the preferred path from R1 to reach R5 when OSPF is enabled?
R1>R2>R3>R4>R5
625
What do dynamic routing protocols do?
Dynamic routing protocols allow routers to automatically advertise available subnets to each other.
626
What are Distance Vector routing protocols often called?
Distance Vector routing protocols are often called ‘Routing by rumour’.
627
What will be the source IP address of the ICMP echo request when Router2 pings PC2?
10.10.3.1
628
What does the destination host send back when it receives an ICMP echo request?
ICMP echo reply
629
What will you see if the ping is successful on a Cisco router?
You will see exclamation marks.
630
What does a dot in ping result indicate?
A dot in ping result indicates failure.
631
What does 'U' in ping results mean?
Unreachable
632
What will the ping result be if the router discards the packet?
U (Unreachable)
633
What is the command to invoke an extended ping?
To invoke an extended ping, input the command 'ping' and then hit Enter.
634
What does MTU stand for?
Maximum Transmission Unit
635
What is the default ping timeout?
2 seconds
636
What command is similar to 'ping' and traces the path of traffic across the network?
Traceroute
637
What protocol is used by traceroute?
ICMP (Windows) or UDP (Linux and Cisco IOS)
638
What is used as a loop prevention mechanism in networking?
TTL (Time to Live)
639
How can we ping to see if a DNS server can resolve a name?
We can ping by the FQDN to see if a DNS server is able to resolve that name.
640
How can we troubleshoot at Layer 4?
To troubleshoot at Layer 4, we can telnet to the destination IP address and the port number.
641
What is Flow Control?
The process of adjusting the flow of data from the sender to ensure that the receiving host can handle all of it.
642
What is Session Multiplexing?
The process by which a host is able to support multiple sessions simultaneously and manage the individual traffic streams over a single link.
643
How can sessions be tracked?
The combination of source and destination port numbers can be used to track sessions.
644
What does the Transport Layer do?
This OSI layer provides transparent transfer of data between hosts and is responsible for end-to-end error recovery and flow control.
645
What are the most common Layer 4 protocols?
The most common Layer 4 protocols are TCP and UDP.
646
What port does HTTP use?
HTTP uses port 80.
647
What port does SMTP email use?
SMTP email uses port 25.
648
Which transport layer protocol is used by TFTP?
UDP
649
What does the acronym UDP stand for?
User Datagram Protocol
650
Which transport layer protocol sends traffic best effort, TCP or UDP?
UDP
651
What does TCP do?
This transport layer protocol carries out sequencing to ensure segments are processed in the correct order and none are missing.
652
Which transport layer protocol is connection oriented, TCP or UDP?
TCP
653
What does UDP not do?
This transport layer protocol does not carry out sequencing to ensure segments are processed in the correct order and none are missing.
654
Which transport layer protocol is not reliable?
UDP
655
Which transport layer protocol does not perform flow control, TCP or UDP?
UDP
656
Which transport layer protocol is reliable where lost segments are resent, TCP or UDP?
TCP
657
Which transport layer protocol is used by Telnet?
TCP
658
What is Flow Control?
The process of adjusting the flow of data from the sender to ensure that the receiving host can handle all of it.
659
What is Session Multiplexing?
The process by which a host is able to support multiple sessions simultaneously and manage the individual traffic streams over a single link.
660
How can sessions be tracked?
The combination of source and destination port numbers can be used to track sessions.
661
What does the Transport Layer do?
This OSI layer provides transparent transfer of data between hosts and is responsible for end-to-end error recovery and flow control.
662
What are the most common Layer 4 protocols?
The most common Layer 4 protocols are TCP and UDP.
663
What port does HTTP use?
HTTP uses port 80.
664
What port does SMTP email use?
SMTP email uses port 25.
665
Which transport layer protocol is used by TFTP?
UDP
666
What does the acronym UDP stand for?
User Datagram Protocol
667
Which transport layer protocol sends traffic best effort, TCP or UDP?
UDP
668
What does TCP do?
This transport layer protocol carries out sequencing to ensure segments are processed in the correct order and none are missing.
669
Which transport layer protocol is connection oriented, TCP or UDP?
TCP
670
What does UDP not do?
This transport layer protocol does not carry out sequencing to ensure segments are processed in the correct order and none are missing.
671
Which transport layer protocol is not reliable?
UDP
672
Which transport layer protocol does not perform flow control, TCP or UDP?
UDP
673
Which transport layer protocol is reliable where lost segments are resent, TCP or UDP?
TCP
674
Which transport layer protocol is used by Telnet?
TCP
675
What OSI layer is responsible for routing packets to their destination and for Quality of Service?
Network Layer
676
What does IP stand for?
IP stands for Internet Protocol.
677
What are the two binary choices for electrical impulses?
Electrical impulses are either off or on, so there are only two binary choices, 0 or 1.
678
What is 159 in binary?
159 is 1001 1111 in binary.
679
What is 1100 1011 in decimal?
203
680
How long is an IPv4 address?
An IPv4 address is 32 bits long.
681
What is 255.255.192.0 in slash notation?
/18
682
What is /27 in dotted decimal notation?
255.255.255.224
683
What is 255.248.0.0 in slash notation?
255.248.0.0 is /13 in slash notation.
684
What does the host portion of the IP address specify?
The host portion of the IP address specifies the individual host and must be unique on that subnet.
685
How is a host’s IP address divided?
A host’s IP address is divided into a network portion and a host portion.
686
What is the subnet mask length?
The subnet mask is 32 bits long, and can be written in dotted decimal or slash notation.
687
What defines the boundary between the IP address network portion and host portion?
Subnet Mask
688
What happens to traffic with the broadcast address as the destination?
Traffic with this as destination address will be sent to all hosts in the subnet.
689
What does all '0's in the host portion designate?
All '0's in the host portion designates the network address which is not allowed to be allocated to a host.
690
691
What does IANA stand for?
Internet Assigned Numbers Authority
692
What is the address class reserved for IP multicast addresses?
Class D
693
What is the address class that is ‘experimental and reserved for future use’?
Class E
694
What address class is assigned to networks with a very large number of hosts?
Class A
695
What is the default subnet mask of Class A addresses?
37104
696
What is the valid network address range of Class A?
Class A valid network addresses range from 1.0.0.0 to 126.0.0.0 /8 ## Footnote 0.0.0.0/8 and 127.0.0.0/8 are reserved (RFC 870).
697
What network in the Class A space is reserved for loopback address used for testing the local computer?
The network 127.0.0.0 /8
698
What address class is assigned to medium-sized to large-sized networks?
Class B
699
What is the default subnet mask of Class B addresses?
/16
700
What is the valid network address range of Class B?
128.0.0.0 to 191.255.0.0 /16
701
What address class is used for small networks?
Class C
702
What is the default subnet mask of Class C addresses?
/24
703
What is the valid network address range of Class C?
The valid network address of Class C range from 192.0.0.0 to 223.255.255.0 /24
704
What are private addresses?
These addresses are valid to be assigned to hosts but they are not routable on the public internet. ## Footnote (RFC 1918)
705
What is the Class A private IP address range?
10.0.0.0 to 10.255.255.255
706
What is the Class B private IP address range?
172.16.0.0 to 172.31.255.255
707
What is the Class C private IP address range?
192.168.0.0 to 192.168.255.255
708
What is the Class E IP address range?
240.0.0.0 to 255.255.255.255
709
What is the range of Class D IP addresses?
Class D IP addresses range from 224.0.0.0 to 239.255.255.255
710
What does CIDR stand for?
Classless Inter-Domain Routing
711
What did CIDR remove?
CIDR removed the fixed /8, /16, and /24 requirements for the address classes, and allowed them to be split or ‘subnetted’ into smaller networks.
712
How to calculate the number of available subnets?
To calculate the number of available subnets, the formula is 2^subnet bits.
713
How to calculate the number of available hosts?
To calculate the number of available hosts, the formula is (2^host bits) - 2.
714
What allows us to size subnets differently?
Variable Length Subnet Masking (VLSM)
715
What did early routing protocols support?
Early routing protocols only supported Fixed Length Subnet Masking where all subnets had to be the same size.
716
What network does 192.123.45.67 255.255.255.192 belong to?
192.123.45.64 /26
717
How many usable IP addresses are in a /27 network for hosts?
30 ## Footnote The network IP address or broadcast IP address cannot be assigned to hosts.
718
Which office would you allocate the first subnet to when subnetting 10.150.100.0/24 using VLSM?
Management Office ## Footnote Start with the subnet with the most hosts.
719
How many subnets like 172.205.7.0/25 are available on the corresponding network?
512
720
What is the usable IP address range of 172.80.250.148 255.255.224.0?
172.80.224.1 - 172.80.255.254
721
What is the broadcast address of 10.64.250.14 255.192.0.0?
10.127.255.255
722
What is the usable IP address range of 126.12.16.0 255.255.254.0?
126.12.16.1 - 126.12.17.254
723
What is the fade value in the script?
Fade = 0;
724
What is the purpose of the loaded function?
The loaded function sets the visibility of the original image to visible.
725
What does the script do if the mask is null or complete?
It calls the loaded function.
726
What happens when the mask image loads?
The loaded function is triggered.
727
What is the purpose of the toggle function?
The toggle function shows or hides the answer mask when the image is clicked.
728
What is the subnet bit count for 100.1.16.0 255.255.240.0?
12 ## Footnote 100.1.16.0 is within a class A network with 8 network bits. The subnet mask 255.255.240.0 has 20 '1's. So, you have 12 (=20-8) subnet bits.
729
What is the host bit count for 172.17.7.2 255.255.255.128?
7
730
What is the formula for calculating usable IP addresses?
The formula to get the number of usable IP addresses is (2^host bits) - 2. We subtract 2 for the Network address and Broadcast address.
731
What does the Physical Layer of the OSI model do?
This OSI layer puts the actual bits onto the wire.
732
What does the Physical Layer provide?
This OSI layer provides the hardware means of sending and receiving data, including defining cables, interface cards and physical aspects.
733
What does UTP stand for?
Unshielded Twisted Pair
734
How can the receive and transmit wires in a UTP cable be wired to the RJ-45 connector?
The receive and transmit wires in a UTP cable can be wired to the RJ-45 connector as either straight-through or crossover.
735
What does OSI Layer 1 convey?
The OSI Layer 1 conveys the bitstream, which could be electrical impulse, light or radio signals.
736
What are straight-through cables used for?
These Ethernet cables are used to connect devices of different types together, such as a PC or router to a switch or hub.
737
What are crossover cables used for?
These cables are most often used to connect two devices of the same type directly, like two switches to each other.
738
What feature do modern switches support?
Modern switches support Auto MDI-X where the receive and transmit signals are reconfigured automatically to yield the expected result.
739
What are the two types of fiber optic cables?
The two types of fiber optic cables are Single Mode and Multi Mode.
740
What is the characteristic of Single Mode fiber cable?
This fiber cable type is more expensive and supports higher bandwidth and longer distances.
741
What does PoE stand for?
Power over Ethernet
742
What does Power over Ethernet (PoE) do?
It delivers power to the devices over the standard network cable. This saves you from using a separate power supply for all connected devices.
743
What's the maximum length of UTP cables?
100 meters
744
What UTP cable is used to connect devices with Auto MDI-X disabled?
Crossover cable
745
What UTP cables are used to connect devices with Auto MDI-X disabled?
Straight-through
746
What connector type is on the end of a standard UTP cable?
RJ-45
747
What is the maximum distance supported by Multi Mode fiber cable?
This fiber cable type supports a few hundred meters maximum distance.
748
Where does the connector of fiber optical cables typically plug into?
With fiber optical cables, the connector typically plugs into a transceiver, which then plugs into the switch or router.
749
What duplex mode do hubs operate in?
Half-duplex
750
At which layer of the OSI model do hubs operate?
Physical Layer (Layer 1)
751
In half-duplex mode, what can attached hosts do?
They can either send or receive data, but not both at the same time.
752
What does CSMA/CD stand for?
Carrier-Sense Multiple Access with Collision Detection
753
What duplex mode allows hosts to send and receive data simultaneously?
Full-duplex
754
In full-duplex mode, what is unique about collision domains?
All hosts have their own dedicated collision domain.
755
What are Layer 3 switches?
These are advanced switches that are Layer 3 aware and can route traffic between different IP subnets.
756
What type of address are Layer 2 switches aware of?
MAC address
757
What type of device is needed to route traffic between different subnets?
A Layer 3 device
758
What MAC address will the switch enter in the MAC address table if PC2 sends traffic to PC3 and the table is empty?
0002.2222.000B
759
What port will the switch enter in the MAC address table if PC2 sends traffic to PC3 and the table is empty?
F0/2
760
What will the switch do with traffic to an unknown unicast address from PC4?
The switch will send it out all ports, except port F0/4.
761
What will PC1 do with a frame that has a destination MAC address of 0003.3333.000C?
Discard/Drop the frame
762
What MAC address will the switch enter in the MAC address table if PC4 sends traffic to PC1 and the table has an entry for 0001.1111.000A?
0004.4444.000D
763
Which port will the switch forward traffic to if PC1 sends traffic to PC3 and the MAC address table has an entry for 0003.3333.000C?
F0/3
764
What MAC address will the switch enter if it receives a frame with a source MAC address of 1001.00A5.30A9?
1001.00A5.30A9
765
What domain are devices connected to a hub in?
Devices connected to a Hub are in the same collision domain.
766
What happens when a switch receives a frame for the broadcast address or an unknown unicast address?
It will be flooded out all ports apart from the one it was received on.
767
What does DNS stand for?
DNS stands for Domain Name System.
768
What does FQDN stand for?
Fully Qualified Domain Name
769
What resolves an FQDN to an IP address?
Domain Name System (DNS)
770
What does ARP stand for?
Address Resolution Protocol
771
What is used to map an IP address to a MAC address?
Address Resolution Protocol (ARP)
772
Where are ARP messages saved?
ARP messages (replies and requests from neighboring hosts) are saved in a host's ARP cache, so it doesn’t need to send an ARP request every time it wants to communicate.
773
What port do DNS requests use?
DNS requests are sent using UDP port 53.
774
What command is entered on a router for it to be able to resolve hostnames?
ip domain-lookup
775
What command will you enter to create a primary domain named 'flackbox.com'?
ip domain-name flackbox.com
776
What command is entered on a router for it to act as a DNS server?
ip dns server
777
What command is entered on the DNS-Client to allow it to send DNS queries to the DNS-Server?
ip name-server 172.16.1.1
778
What are the two message types used by ARP?
ARP uses two message types, which are ARP Request and ARP Reply.
779
What is the Destination MAC of the ARP Request sent by PC1 to PC2?
FFFF.FFFF.FFFF
780
What is the Source MAC address in the ARP Reply sent by PC2 to PC1?
PC2 sends an ARP Reply with Source MAC address of 00B2.2000.000B and Destination MAC address of 00A1.1000.000A.
781
When sending a packet to another subnet, who does the end host send an ARP request to first?
When sending a packet to another subnet, the end host will send an ARP request to its own default gateway first.
782
What IP address will the ARP Request be sent to by PC1 when sending a packet to PC2?
192.168.1.1
783
What is the Source IP Address when PC1 sends an IP packet to PC2?
192.168.1.10
784
What is the Destination IP Address when PC1 sends an IP packet to PC2?
192.168.1.20
785
What is the broadcast MAC address?
The broadcast MAC address is FFFF.FFFF.FFFF.
786
What request does PC1 send to resolve the destination IP address for www.flackboxlab.com?
PC1 sends a DNS request to the IP address 10.10.48.25.
787
What IP address does PC1 send a DNS request to when trying to resolve www.flackboxlab.com?
PC1 sends a DNS request to the IP address 10.10.48.25.
788
What is DHCP snooping?
With DHCP snooping, you configure the ports that your DHCP server is connected to as a trusted port.
789
What commands will you enter to enable DHCP snooping on VLAN 20?
Switch(config)# ip dhcp snooping Switch(config)# ip dhcp snooping vlan 20
790
What command will you enter to make an interface a trusted port?
Switch(config-if)# ip dhcp snooping trust
791
What is the purpose of DHCP snooping?
This access layer switch security mechanism can prevent attacks from rogue DHCP servers by dropping DHCP server traffic that comes in a port that is not trusted.
792
What does DAI stand for?
Dynamic ARP Inspection
793
What is a Gratuitous ARP?
It is an ARP update which is not in response to an actual request.
794
What do you need to enable before configuring DAI?
To configure DAI, you need to have enabled DHCP snooping already.
795
On which ports is DAI not performed?
DAI is not performed on trusted ports.
796
What command will you enter to enable DAI on VLAN 100?
Switch(config)# ip arp inspection vlan 100
797
What traffic is allowed on switch ports when 802.1x is enabled?
When 802.1x is enabled, only authentication traffic is allowed on switch ports until the host and user are authenticated.
798
What is the role of the PC in 802.1x terminology?
The PC is the supplicant in the 802.1x terminology.
799
What is the role of the access switch in 802.1x terminology?
The access switch where the user is connected to is the authenticator in the 802.1x terminology.
800
What happens when a user enters their username and password in 802.1x?
With 802.1x, when the user enters the username and password, the authenticator passes that information onto the authentication server and the authentication server will check if it's valid.
801
What is the purpose of 802.1x?
It is used to authenticate users on the network. They don't get access to the network at all until they put in a valid username and password which is checked by the authentication server.
802
What is Port Security?
This enables an administrator to specify which MAC address or addresses can send traffic into an individual switch port.
803
What command is used to verify the port security addresses?
show port-security address
804
What action does the Shutdown violation action take?
This port security violation action places the interfaces into error-disabled state, blocking all traffic.
805
What does the Restrict violation action do?
With this port security violation action, the traffic from unauthorized addresses is dropped, logged, and the violation counter is incremented.
806
What command will you enter to set the maximum number of MAC addresses allowed to send traffic into the interface to 5?
Switch(config-if)# switchport port-security maximum 5
807
What are Access Control Lists made up of?
Access Control Lists are made up of Access Control Entries which are a series of permit or deny rules.
808
How do Named ACLs begin?
Named ACLs begin with the command ‘ip access-list’ instead of ‘access-list’.
809
At what level are ACLs applied?
ACLs are applied at the interface level with the command ip access-group.
810
What is the maximum number of ACLs per interface per direction?
You can have a maximum of one ACL per interface per direction.
811
What do Extended ACLs check based on?
Extended ACLs check based on the protocol, source address, destination address, and port number.
812
What do Standard ACLs reference?
Standard ACLs reference the source address only.
813
What is the standard ACL range?
The standard ACL range is 1-99. Expanded: 1300-1999.
814
What is the extended ACL range?
The extended ACL range is 100-199. Expanded: 2000-2699.
815
What is the default wildcard mask for a Standard ACL?
0.0.0.0
816
What command will you enter to configure a standard ACL with an access-list number of 10 and allow traffic from 192.168.10.0/24?
access-list 10 permit 192.168.10.0 0.0.0.255
817
What commands are entered to configure a Standard ACL with access list number of 1 and will allow all traffic?
access-list 1 permit any
818
What will the configuration permit traffic from 192.168.1.1?
Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255 Router(config)# access-list 1 deny host 192.168.1.1 The configuration above will permit/allow traffic from 192.168.1.1.
819
What will the configuration deny traffic from 192.168.1.1?
Router(config)# access-list 1 deny host 192.168.1.1 Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255 The configuration above will deny/block traffic from 192.168.1.1.
820
How are ACEs numbered?
ACEs are automatically numbered in increments of 10.
821
What command will you enter to configure an extended ACL for 'FlackboxACL'?
ip access-list extended FlackboxACL
822
What keyword is used in the ACL command to match packets on a given port number?
eq
823
What keyword is used in the ACL command to match packets in a specified range of port numbers?
range
824
What ACL keyword is used to log to the console or an external monitoring server?
log
825
What was implemented as a temporary workaround to mitigate the lack of IPv4 addresses?
NAT (Network Address Translation)
826
What does RFC 1918 specify?
RFC 1918 specifies private IP address ranges which are not routable on the public Internet.
827
What type of NAT offers permanent one-to-one mapping usually between a public and private IP address?
Static NAT
828
What type of NAT uses a pool of public addresses assigned on a first-come, first-served basis?
Dynamic NAT
829
What is the NAT type that allows the same public IP address to be reused for all translations?
Dynamic NAT with overload, also known as PAT (Port Address Translation)
830
What command is used to remove all dynamic translations from the NAT translation table?
clear ip nat translation
831
What does Dynamic NAT with Overload use to allow more clients to be translated than IP addresses are available in the NAT pool?
Dynamic NAT with Overload uses PAT to allow more clients to be translated than IP addresses are available in the NAT pool.
832
What is the Inside Local Address?
It is the IP address actually configured on the inside host’s Operating System.
833
What is the Inside Global Address?
The NAT’d address of the inside host as it will be reached by the outside network.
834
What is the Outside Local Address?
The IP address of the outside host as it appears to the inside network.
835
What is the Outside Global Address?
It is the IP address assigned to the host on the outside network by the host’s owner.
836
In one-way NAT, how are the Outside Local and Outside Global addresses reported?
For one-way NAT, the Outside Local and Outside Global addresses will be reported as being the same.
837
What command will you enter to create a NAT pool named 'FlackboxNAT' with a global address range of 100.1.2.3 to 100.1.2.10 and a subnet mask of /27?
ip nat pool FlackboxNAT 100.1.2.3 100.1.2.10 netmask 255.255.255.224
838
What keyword allows multiple hosts to reuse the top address in the NAT pool?
overload
839
Which Router interface will be configured with 'ip nat inside' when running static NAT for the 'Server'?
interface G0/2
840
Which Router interface will be configured with 'ip nat outside'?
interface G0/1
841
What show command shows the Inside Global, Inside Local, Outside Local, and Outside Global address translations?
show ip nat translations
842
What is required with standard dynamic NAT for every inside host that needs to communicate with the outside?
With standard dynamic NAT, you need a public IP address for every inside host which needs to communicate with the outside.
843
What show command outputs how many addresses have been translated by NAT?
show ip nat statistics
844
What is a dual stack implementation?
In a dual stack implementation, a network interface can have both an IPv4 and an IPv6 address at the same time, and it can be used as an IPv4 to IPv6 transition strategy.
845
How many bits does IPv6 use for addressing?
IPv6 uses a 128 bit address compared to IPv4’s 32 bit address.
846
What is the mask used for addresses assigned to individual hosts in IPv6?
23377
847
What range are Global Unicast Addresses assigned from?
36586
848
What command enables IPv6 routing?
ipv6 unicast-routing
849
Does IPv6 support broadcast traffic?
IPv6 does not support broadcast traffic, but it does support multicast to all hosts on the local subnet which is functionally equivalent.
850
What does using /64 everywhere in IPv6 addressing enable?
Using /64 everywhere simplifies the IPv6 addressing and enables the use of EUI-64 addresses.
851
What is injected in the middle of the 48 bits MAC address with EUI-64?
With EUI-64, FF:FE is injected in the middle of the 48 bits MAC address to bring the host portion of the IPv6 address up to 64 bits. Also, the 7th bit in the MAC address is inverted.
852
What type of message is sent to the Solicited-Node multicast address in Neighbor Discovery?
Neighbor Solicitation
853
What is the IPv6 version of ARP?
Neighbor Discovery Protocol
854
What mask do local IPv6 routes always have?
/128
855
What are Unique Local Addresses in IPv6?
These IPv6 addresses are similar to IPv4 RFC 1918 private addresses. They are not publicly reachable.
856
What are Link local addresses in IPv6?
These IPv6 addresses are valid for communications on that link only.
857
What is the host portion of the IPv6 address 2001:100B:00D8:35A3:C004:7B01:09F0:1C01 /64?
C004:7B01:09F0:1C01
858
What is the network portion of the IPv6 address 2001:26CC:0F1D:C001:D330:5AF7:11A2:8000 /64?
2001:26CC:0F1D:C001
859
What is the long format of 2001:F:12::34:0:A3?
2001:000F:0012:0000:0000:0034:0000:00A3
860
What addresses are mandatory on IPv6 enabled interfaces?
Link local addresses
861
What messages does Neighbor Discovery use?
Neighbor Discovery uses ICMPv6 neighbor solicitation messages and neighbor advertisement messages.
862
What does the unspecified address (::) mean in IPv6?
This means 'Unspecified address' or 'Unknown address' in IPv6. It is also used as the source when an interface is trying to acquire an address.
863
What message can hosts send with SLAAC to request information from the router?
With SLAAC, the hosts can send a Router Solicitation message to request information from the router.
864
What is the shortened IPv6 version of 1000:00B8:0000:000F:0050:0000:0000:B001?
1000:B8:0:F:50::B001
865
What is the IPv6 equivalent of 0.0.0.0 0.0.0.0 (default route) in IPv4?
36526
866
What range are IPv6 link-local addresses assigned from?
FE80::/10 – FEB0::/10
867
What is a Virtual Private Network (VPN)?
This provides a virtual tunnel between private networks across a shared public network such as the Internet.
868
What is a Remote Access VPN?
VPN connections are between a router or firewall in the office and VPN software installed on an individual user’s device.
869
What is a Site to Site VPN?
VPN connections are terminated on a router or firewall in each office. Software does not need to be installed on user desktops.
870
What is an IPsec Tunnel?
This Site-to-Site VPN configuration option is open standard and it does not support multicast.
871
What does GRE over IPsec provide?
By using GRE over IPsec, you get the encryption from IPsec, and you also get the multicast support from GRE.
872
What is DMVPN?
This is a Cisco proprietary Site-to-Site VPN configuration option, which provides scalable, simple, hub and spoke style configuration, and enables direct full mesh connectivity between all offices.
873
What is GETVPN?
This Site-to-Site IPsec VPN configuration option is Cisco proprietary. It enables a scalable, centralised policy for VPN over a non-public infrastructure.
874
What is MPLS?
This WAN connectivity option uses a shared core infrastructure at the service provider. It can be used for connectivity to the Internet and/or connectivity between offices over VPN.
875
What does the acronym MPLS stand for?
Multi Protocol Label Switching
876
What is DWDM?
It combines or ‘multiplexes' multiple optical signals into one optical signal transmitted over a single fiber strand.
877
What bandwidth do T1 leased lines offer?
T1 leased lines offer a bandwidth of 1.544 Mbps.
878
What does VPWS stand for?
VPWS stands for Virtual PseudoWire Service and that is a point-to-point Layer 2 VPN.
879
What does VPLS stand for?
VPLS stands for Virtual Private LAN Service and it is a multipoint Layer 2 MPLS VPN.
880
What routers does MPLS run across?
MPLS runs across the provider's core on the PE and P routers.
881
What are Customer Edge (CE) routers?
These routers do not run MPLS but they peer at Layer 3 with the provider PE routers.
882
What does the acronym DSL stand for?
Digital Subscriber Line
883
What does PPPoE stand for?
PPPoE stands for Point-to-Point Protocol over Ethernet.
884
What type of topology is a Full Mesh topology?
The topology option below is a Full Mesh topology.
885
What are targeted attacks?
These attacks are directed against a particular individual or organisation. Skilled attackers will typically start off with low impact reconnaissance.
886
What are script kiddies?
It is a derogatory term for low skilled attackers who download and use off-the-shelf hacking software to launch exploits.
887
What is ransomware?
This type of malware encrypts data with an attacker’s key, and asks the victim to pay money to obtain that key.
888
What is a vulnerability?
A vulnerability is a weakness that compromises the security or functionality of a system.
889
What is an exploit?
An exploit uses a weakness to compromise the security or functionality of a system.
890
What is phishing?
It is a Social Engineering attack where the victim is often directed to enter their personal details into the attacker’s website which looks like the reputable company’s legitimate website.
891
What is an Intrusion Detection System (IDS)?
It sits alongside the traffic flow and informs security administrators of any potential concerns.
892
What is an Intrusion Prevention System (IPS)?
It sits inline with the traffic flow and can also block attacks.
893
How do firewalls operate?
Firewalls block or permit traffic based on rules such as destination IP address and port number.
894
What are stateful firewalls?
Stateful firewalls maintain a connection table which tracks the two-way ‘state’ of traffic passing through the firewall.
895
What are Next Generation Firewalls?
Next Generation Firewalls move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and user-based security.
896
What is cryptography?
It transforms readable messages into an unintelligible form and then later reverses the process.
897
What is symmetric encryption?
With symmetric encryption, the same shared key both encrypts and decrypts the data.
898
What is asymmetric encryption?
This type of encryption uses private and public key pairs where in the data encrypted with the public key can only be decrypted with the private key, and vice versa.
899
What are examples of asymmetric encryption algorithms?
RSA and ECDSA are Asymmetric encryption algorithms.
900
What are examples of symmetric encryption algorithms?
DES and AES are examples of Symmetric encryption algorithms.
901
What does HMAC stand for?
Hash-Based Message Authentication Code
902
What is Public Key Infrastructure (PKI)?
This solves the secure key distribution problem and it uses a Certificate Authority for the parties who need secure communication.
903
What is Transport Layer Security (TLS)?
This is the successor to SSL.
904
What is a Site-to-Site VPN?
This type of VPN uses symmetric encryption algorithms such to send encrypted traffic between locations over an untrusted network such as the Internet.
905
What does Internet Key Exchange (IKE) do?
Internet Key Exchange (IKE) handles negotiation of protocols and algorithms, and generates the encryption and authentication keys.
906
What is Internet Security Association and Key Management Protocol (ISAKMP)?
It defines the procedures for authenticating and communicating, peer creation, and management of Security Associations. It typically uses IKE for key exchange.
907
What does ESP stand for?
Encapsulating Security Payload
908
What is Tunnel mode in IPsec?
This IPsec mode protects the internal routing information by encrypting the IP header of the original packet.
909
What is Transport mode in IPsec?
This IPsec mode encrypts only the payload and the ESP trailer, so the IP header of the original packet is not encrypted.