Modul 3 Subiecte Cisco (Nerezolvate)
Modul 3 Subiecte Cisco (Nerezolvate)
1) – System
Test Exam Answers
Mar 9, 2021 Last Updated: Mar 9, 2021 CCNA v7.0 2 Comments
Share TweetSharePin it
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
In the Simulation mode, capture the packets. What is the application layer service
being requested from Server0 by PC0?
Return to the assessment to answer the question.
FTP
DNS
HTTPS
HTTP
SMTP
Explanation: From the PDU, the destination port is 443, which means the service
requested is HTTPS.
CCNA 1 System Test Course (Version 1.1) – System Test Exam PT Answer
4. Which statement describes the physical topology for a LAN?
It defines how hosts and network devices connect to the LAN.
It shows the order in which hosts access the network.
It depicts the addressing scheme that is employed in the LAN.
It describes whether the LAN is a broadcast or token-passing network.
Explanation: A physical topology defines the way in which computers and other
network devices are connected to a network.
5. Match the term to the value represented.
15. What will an OSPF router prefer to use first as a router ID?
a loopback interface that is configured with the highest IP address on the
router
any IP address that is configured using the router-id command
the highest active interface IP that is configured on the router
the highest active interface that participates in the routing process because
of a specifically configured network statement
Explanation: The first preference for an OSPF router ID is an explicitly configured
32-bit address. This address is not included in the routing table and is not defined
by the network command. If a router ID that is configured through the router-
id command is not available, OSPF routers next use the highest IP address
available on a loopback interface, as loopbacks used as router IDs are also not
routable addresses. Lacking either of these alternatives, an OSPF router will use
the highest IP address from its active physical interfaces.
16. What are the two purposes of an OSPF router ID? (Choose two.)
to uniquely identify the router within the OSPF domain
to facilitate router participation in the election of the designated router
to enable the SPF algorithm to determine the lowest cost path to remote
networks
to facilitate the establishment of network convergence
to facilitate the transition of the OSPF neighbor state to Full
Explanation: OSPF router ID does not contribute to SPF algorithm calculations,
nor does it facilitate the transition of the OSPF neighbor state to Full. Although
the router ID is contained within OSPF messages when router adjacencies are
being established, it has no bearing on the actual convergence process.
17. Refer to the exhibit. If no router ID was manually configured, what would
router Branch1 use as its OSPF router ID?
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
Explanation: In OSPFv2, a Cisco router uses a three-tier method to derive its
router ID. The first choice is the manually configured router ID with the router-
id command. If the router ID is not manually configured, the router will choose
the highest IPv4 address of the configured loopback interfaces. Finally if no
loopback interfaces are configured, the router chooses the highest active IPv4
address of its physical interfaces.
18. A network technician issues the following commands when configuring a router:
782
74
128
65
Explanation: The formula used to calculate the OSPF cost is as follows:
Cost = reference bandwidth / interface bandwidth
The default reference bandwidth is 10^8 (100,000,000); therefore, the formula is
Cost = 100,000,000 bps / interface bandwidth in bps
Thus the cost to reach the A LAN 172.16.1.0/24 from B is as follows:
Serial link (1544 Kbps) from B to A cost => 100,000,000 / 1,544,000 = 64
Gigabit Ethernet link on A cost => 100,000,000 / 1,000,000,000 = 1
Total cost to reach 172.16.1.0/24 = 64 + 1 = 65
24. Refer to the exhibit. On which router or routers would a default route be
statically configured in a corporate environment that uses single area OSPF as the
routing protocol?
R0-A
ISP, R0-A, R0-B, and R0-C
ISP
R0-B and R0-C
ISP and R0-A
R0-A, R0-B, and R0-C
Explanation: The default route is applied to the router that connects to the
Internet, or R0-A. R0-A then distributes that default route using the OSPF routing
protocol.
25. What command would be used to determine if a routing protocol-initiated
relationship had been made with an adjacent router?
ping
show ip ospf neighbor
show ip interface brief
show ip protocols
Explanation: While the show ip interface brief and ping commands can be used to
determine if Layer 1, 2, and 3 connectivity exists, neither command can be used
to determine if a particular OSPF or EIGRP-initiated relationship has been made.
The show ip protocols command is useful in determining the routing parameters
such as timers, router ID, and metric information associated with a specific
routing protocol. The show ip ospf neighbor command shows if two adjacent
routers have exchanged OSPF messages in order to form a neighbor
relationship.
26. Refer to the exhibit. Which command did an administrator issue to produce this
output?
R1# show ip ospf interface serial0/0/1
R1# show ip route ospf
R1# show ip ospf
R1# show ip ospf neighbor
27. Which command is used to verify that OSPF is enabled and also provides a list
of the networks that are being advertised by the network?
show ip interface brief
show ip ospf interface
show ip protocols
show ip route ospf
Explanation: The command show ip ospf interface verifies the active OSPF
interfaces. The command show ip interface brief is used to check that the
interfaces are operational. The command show ip route ospf displays the entries
that are learned via OSPF in the routing table. The command show ip
protocols checks that OSPF is enabled and lists the networks that are advertised.
28. Refer to the exhibit. A network administrator has configured OSPFv2 on the
two Cisco routers but PC1 is unable to connect to PC2. What is the most likely
problem?
Interface Fa0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 is configured as a passive-interface on router R2.
Interface S0/0 is configured as a passive-interface on router R2.
Interface s0/0 has not been activated for OSPFv2 on router R2.
Explanation: If a LAN network is not advertised using OSPFv2, a remote network
will not be reachable. The output displays a successful neighbor adjacency
between router R1 and R2 on the interface S0/0 of both routers.
29. What is the recommended Cisco best practice for configuring an OSPF-enabled
router so that each router can be easily identified when troubleshooting routing
issues?
Configure a value using the router-id command.
Use the highest active interface IP address that is configured on the router.
Use a loopback interface configured with the highest IP address on the
router.
Use the highest IP address assigned to an active interface participating in
the routing process.
Explanation: A Cisco router is assigned a router ID to uniquely identify it. It can
be automatically assigned and take the value of the highest configured IP
address on any interface, the value of a specifically-configured loopback
address, or the value assigned (which is in the exact form of an IP address)
using the router-id command. Cisco recommends using the router-id command.
30. Which step in the link-state routing process is described by a router running an
algorithm to determine the best path to each destination?
load balancing equal-cost paths
declaring a neighbor to be inaccessible
choosing the best route
executing the SPF algorithm
31. An administrator is configuring single-area OSPF on a router. One of the
networks that must be advertised is 192.168.223.0 255.255.254.0. What wildcard
mask would the administrator use in the OSPF network statement?
0.0.1.255
0.0.7.255
0.0.15.255
0.0.31.255
32. What is the format of the router ID on an OSPF-enabled router?
a unique router host name that is configured on the router
a unique phrase with no more than 16 characters
a 32-bit number formatted like an IPv4 address
an 8-bit number with a decimal value between 0 and 255
a character string with no space
Explanation: A router ID is a 32-bit number formatted like an IPv4 address and
assigned in order to uniquely identify a router among OSPF peers.
33. Question as presented:
DUAL is the algorithm used by EIGRP. In multiarea OSPF, OSPF is implemented
using multiple areas, and all of them must be connected to the backbone area.
34. After modifying the router ID on an OSPF router, what is the preferred method
to make the new router ID effective?
HQ# copy running-config startup-config
HQ# resume
HQ# clear ip route *
HQ# clear ip ospf process
Explanation: To modify a router-id on an OSPF-enabled router, it is necessary to
reset the OSPF routing process by entering either the clear ip ospf
process command or the reload command.
35. In an OSPFv2 configuration, what is the effect of entering the command
network 192.168.1.1 0.0.0.0 area 0 ?
It allows all 192.168.1.0 networks to be advertised.
It tells the router which interface to turn on for the OSPF routing process.
It changes the router ID of the router to 192.168.1.1.
It enables OSPF on all interfaces on the router.
Explanation: Entering the command network 192.168.1.1 0.0.0.0 area 0 will turn on
only the interface with that IP address for OSPF routing. It does not change the
router ID. Instead, OSPF will use the network that is configured on that interface.
36. What is the reason for a network engineer to alter the default reference
bandwidth parameter when configuring OSPF?
to force that specific link to be used in the destination route
to more accurately reflect the cost of links greater than 100 Mb/s
to enable the link for OSPF routing
to increase the speed of the link
Explanation: By default, Fast Ethernet, Gigabit, and 10 Gigabit Ethernet
interfaces all have a cost of 1. Altering the default reference bandwidth alters the
cost calculation, allowing each speed to be more accurately reflected in the cost.
37. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Modules 1 – 2: OSPF Concepts and Configuration Packet Tracer 40.09 KB 5091 downloads
...
Download
Explanation: Each interface on the link connecting the OSPF routers must be in
the same subnet for an adjacency to be established. The IP address subnet
mask on FastEthernet interface 0/0 must be changed to 255.255.255.0. The
FastEthernet interface 0/0 is not passive. The 10.0.1.0/24 network is only
connected to Router2 so should not be advertised by Router1. The clear ip ospf
process command will start the OPSF process on Router1 but will not cause an
adjacency to be established if the subnet mask mismatch on the connecting
interfaces still exists.
38. Match the description to the term. (Not all options are used.)
Explanation: DUAL is the algorithm used by EIGRP. In multiarea OSPF, OSPF is
implemented using multiple areas, and all of them must be connected to the
backbone area.
39. What is a benefit of multiarea OSPF routing?
Topology changes in one area do not cause SPF recalculations in other areas.
Routers in all areas share the same link-state database and have a complete
picture of the entire network.
A backbone area is not required.
Automatic route summarization occurs by default between areas.
Explanation: With multiarea OSPF, only routers within an area share the same
link-state database. Changes to the network topology in one area do not impact
other areas, which reduces the number of SPF algorithm calculations and the of
link-state databases.
40. Match the OSPF state with the order in which it occurs. (Not all options are
used.)
Modules 1 – 2: OSPF Concepts and Configuration Exam
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
ACL 10 is removed from both the running configuration and the interface
Fa0/1.
ACL 10 is removed from the running configuration.
ACL 10 is disabled on Fa0/1.
ACL 10 will be disabled and removed after R1 restarts.
Explanation: The R1(config)# no access-list <access-list number> command
removes the ACL from the running-config immediately. However, to disable an
ACL on an interface, the command R1(config-if)# no ip access-group should be
entered.
16. Refer to the exhibit. A network administrator has configured ACL 9 as shown.
Users on the 172.31.1.0 /24 network cannot forward traffic through router
CiscoVille. What is the most likely cause of the traffic failure?
The established keyword is not specified.
The sequence of the ACEs is incorrect.
The port number for the traffic has not been identified with the eq keyword.
The permit statement specifies an incorrect wildcard mask.
Explanation: When verifying an ACL, the statements are always listed in a
sequential order. Even though there is an explicit permit for the traffic that is
sourced from network 172.31.1.0 /24, it is being denied due to the previously
implemented ACE of CiscoVille(config)# access-list 9 deny 172.31.0.0 0.0.255.255.
The sequence of the ACEs must be modified to permit the specific traffic that is
sourced from network 172.31.1.0 /24 and then to deny 172.31.0.0 /16.
17. A network administrator needs to configure a standard ACL so that only the
workstation of the administrator with the IP address 192.168.15.23 can access the
virtual terminal of the main router. Which two configuration commands can
achieve the task? (Choose two.)
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
Router1(config)# access-list 10 permit host 192.168.15.23
Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0
Explanation: To permit or deny one specific IP address, either the wildcard
mask 0.0.0.0 (used after the IP address) or the wildcard mask keyword host (used
before the IP address) can be used.
18. Refer to the exhibit. Which command would be used in a standard ACL to allow
only devices on the network attached to R2 G0/0 interface to access the networks
attached to R1?
access-list 1 permit 192.168.10.128 0.0.0.63
access-list 1 permit 192.168.10.0 0.0.0.255
access-list 1 permit 192.168.10.96 0.0.0.31
access-list 1 permit 192.168.10.0 0.0.0.63
Explanation: Standard access lists only filter on the source IP address. In the
design, the packets would be coming from the 192.168.10.96/27 network (the R2
G0/0 network). The correct ACL is access-list 1 permit 192.168.10.96 0.0.0.31.
19. A network administrator is writing a standard ACL that will deny any traffic
from the 172.16.0.0/16 network, but permit all other traffic. Which two commands
should be used? (Choose two.)
Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 172.16.0.0 255.255.255.255
Router(config)# access-list 95 deny any
Explanation: To deny traffic from the 172.16.0.0/16 network, the access-list 95
deny 172.16.0.0 0.0.255.255 command is used. To permit all other traffic,
the access-list 95 permit any statement is added.
20. Refer to the exhibit. An ACL was configured on R1 with the intention of denying
traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into
subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied
outbound on interface Fa0/0. Which conclusion can be drawn from this
configuration?
The ACL should be applied outbound on all interfaces of R1.
The ACL should be applied to the FastEthernet 0/0 interface of R1 inbound
to accomplish the requirements.
All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.
Only traffic from the 172.16.4.0/24 subnet is blocked, and all other traffic is
allowed.
An extended ACL must be used in this situation.
Explanation: Because of the implicit deny at the end of all ACLs, the access-list 1
permit any command must be included to ensure that only traffic from the
172.16.4.0/24 subnet is blocked and that all other traffic is allowed.
21. Refer to the exhibit. A network administrator needs to add an ACE to the
TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20.
Which ACE will meet this requirement?
The commands are added at the end of the existing Managers ACL.
The commands overwrite the existing Managers ACL.
The commands are added at the beginning of the existing Managers ACL.
The network administrator receives an error that states that the ACL already
exists.
27. In which TCP attack is the cybercriminal attempting to overwhelm a target host
with half-open TCP connections?
port scan attack
SYN flood attack
session hijacking attack
reset attack
Explanation: In a TCP SYN flood attack, the attacker sends to the target host a
continuous flood of TCP SYN session requests with a spoofed source IP
address. The target host responds with a TCP-SYN-ACK to each of the SYN
session requests and waits for a TCP ACK that will never arrive. Eventually the
target is overwhelmed with half-open TCP connections.
28. Which protocol is attacked when a cybercriminal provides an invalid gateway in
order to create a man-in-the-middle attack?
DHCP
DNS
ICMP
HTTP or HTTPS
Explanation: A cybercriminal could set up a rogue DHCP server that provides
one or more of the following:
Wrong default gateway that is used to create a man-in-the-middle attack and
allow the attacker to intercept data
Wrong DNS server that results in the user being sent to a malicious website
Invalid default gateway IP address that results in a denial of service attack on
the DHCP client
29. Refer to the exhibit. An administrator has configured a standard ACL on R1
and applied it to interface serial 0/0/0 in the outbound direction. What happens to
traffic leaving interface serial 0/0/0 that does not match the configured ACL
statements?
33.
Refer to the exhibit. An administrator first configured an extended ACL as shown
by the output of the show access-lists command. The administrator then edited this
access-list by issuing the commands below.
Router(config-ext-nacl)# no 20
Which two conclusions can be drawn from this new configuration? (Choose two.)
TFTP packets will be permitted.
Ping packets will be permitted.
Telnet packets will be permitted.
SSH packets will be permitted.
All TCP and UDP packets will be denied.
Explanation: After the editing, the final configuration is as follows:
Router# show access-lists
Extended IP access list 101
5 permit tcp any any eq ssh
10 deny tcp any any
20 deny udp any any
30 permit icmp any any
So, only SSH packets and ICMP packets will be permitted.
34. Which set of access control entries would allow all users on the 192.168.10.0/24
network to access a web server that is located at 172.17.80.1, but would not allow
them to use Telnet?
access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet
access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
Explanation: For an extended ACL to meet these requirements the following
need to be included in the access control entries:
identification number in the range 100-199 or 2000-2699
permit or deny parameter
protocol
source address and wildcard
destination address and wildcard
port number or name
35. What is the term used to describe a mechanism that takes advantage of a
vulnerability?
mitigation
exploit
vulnerability
threat
36. Refer to the exhibit. The network administrator has an IP address of
192.168.11.10 and needs access to manage R1. What is the best ACL type and
placement to use in this situation?
extended ACL outbound on R2 WAN interface towards the internet
standard ACL inbound on R1 vty lines
extended ACLs inbound on R1 G0/0 and G0/1
extended ACL outbound on R2 S0/0/1
Explanation: Standard ACLs permit or deny packets based only on the source
IPv4 address. Because all traffic types are permitted or denied, standard ACLs
should be located as close to the destination as possible.
Extended ACLs permit or deny packets based on the source IPv4 address and
destination IPv4 address, protocol type, source and destination TCP or UDP
ports and more. Because the filtering of extended ACLs is so specific, extended
ACLs should be located as close as possible to the source of the traffic to be
filtered. Undesirable traffic is denied close to the source network without crossing
the network infrastructure.
37. A technician is tasked with using ACLs to secure a router. When would the
technician use the any configuration option or command?
to add a text entry for documentation purposes
to generate and send an informational message whenever the ACE is
matched
to identify any IP address
to identify one specific IP address
38. Which statement accurately characterizes the evolution of threats to network
security?
Internet architects planned for network security from the beginning.
Early Internet users often engaged in activities that would harm other users.
Internal threats can cause even greater damage than external threats.
Threats have become less sophisticated while the technical knowledge
needed by an attacker has grown.
Explanation: Internal threats can be intentional or accidental and cause greater
damage than external threats because the internal user has direct access to the
internal corporate network and corporate data.
39. A user receives a phone call from a person who claims to represent IT services
and then asks that user for confirmation of username and password for auditing
purposes. Which security threat does this phone call represent?
spam
social engineering
DDoS
anonymous keylogging
Explanation: Social engineering attempts to gain the confidence of an employee
and convince that person to divulge confidential and sensitive information, such
as usernames and passwords. DDoS attacks, spam, and keylogging are all
examples of software based security threats, not social engineering.
40. In what way are zombies used in security attacks?
They target specific individuals to gain corporate or personal information.
They probe a group of machines for open ports to learn which services are
running.
They are maliciously formed code segments used to replace legitimate
applications.
They are infected machines that carry out a DDoS attack.
Explanation: Zombies are infected computers that make up a botnet. The
zombies are used to deploy a distributed denial of service (DDoS) attack.
41. Which attack involves threat actors positioning themselves between a source and
destination with the intent of transparently monitoring, capturing, and controlling
the communication?
man-in-the-middle attack
SYN flood attack
DoS attack
ICMP attack
Explanation: The man-in-the-middle attack is a common IP-related attack where
threat actors position themselves between a source and destination to
transparently monitor, capture, and control the communication.
42. Which two keywords can be used in an access control list to replace a wildcard
mask or address and wildcard mask pair? (Choose two.)
host
most
gt
some
any
all
Explanation: The host keyword is used when using a specific device IP address
in an ACL. For example, the deny host 192.168.5.5 command is the same is
the deny 192.168.5.5 0.0.0.0 command. The any keyword is used to allow any
mask through that meets the criteria. For example, the permit any command is
the same as permit 0.0.0.0 255.255.255.255 command.
43. Which statement describes a difference between the operation of inbound and
outbound ACLs?
Inbound ACLs are processed before the packets are routed while outbound
ACLs are processed after the routing is completed.
In contrast to outbound ALCs, inbound ACLs can be used to filter packets
with multiple criteria.
On a network interface, more than one inbound ACL can be configured but
only one outbound ACL can be configured.
Inbound ACLs can be used in both routers and switches but outbound ACLs
can be used only on routers.
Explanation: With an inbound ACL, incoming packets are processed before they
are routed. With an outbound ACL, packets are first routed to the outbound
interface, then they are processed. Thus processing inbound is more efficient
from the router perspective. The structure, filtering methods, and limitations (on
an interface, only one inbound and one outbound ACL can be configured) are the
same for both types of ACLs.
44. What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255
any eq www command have when implemented inbound on the f0/0 interface?
All TCP traffic is permitted, and all other traffic is denied.
Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80
destinations.
All traffic from 172.16.4.0/24 is permitted anywhere on any port.
The command is rejected by the router because it is incomplete.
45. Which ACE will permit a packet that originates from any network and is
destined for a web server at 192.168.1.1?
access-list 101 permit tcp any host 192.168.1.1 eq 80
access-list 101 permit tcp host 192.168.1.1 eq 80 any
access-list 101 permit tcp host 192.168.1.1 any eq 80
access-list 101 permit tcp any eq 80 host 192.168.1.1
46. Refer to the exhibit. A new network policy requires an ACL denying FTP and
Telnet access to a Corp file server from all interns. The address of the file server is
172.16.1.15 and all interns are assigned addresses in the 172.18.200.0/24 network.
After implementing the ACL, no one in the Corp network can access any of the
servers. What is the problem?
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
192.168.0.10
192.168.0.1
209.165.200.225
209.165.200.254
Explanation: There are four types of addresses in NAT terminology.
Inside local address
Inside global address
Outside local address
Outside global address
The inside global address of PC1 is the address that the ISP sees as the source
address of packets, which in this example is the IP address on the serial
interface of R1, 209.165.200.224.
6. Refer to the exhibit. Given the commands as shown, how many hosts on the
internal LAN off R1 can have simultaneous NAT translations on R1?
244
10
1
255
Explanation: The NAT configuration on R1 is static NAT which translates a single
inside IP address, 192.168.0.10 into a single public IP address, 209.165.200.255.
If more hosts need translation, then a NAT pool of inside global address or
overloading should be configured.
7. Refer to the exhibit. A network administrator has just configured address
translation and is verifying the configuration. What three things can the
administrator verify? (Choose three.)
A standard access list numbered 1 was used as part of the configuration
process.
Three addresses from the NAT pool are being used by hosts.
Address translation is working.
One port on the router is not participating in the address translation.
The name of the NAT pool is refCount.
Two types of NAT are enabled.
Explanation: The show ip nat statistics, show ip nat translations, and debug ip
nat commands are useful in determining if NAT is working and and also useful in
troubleshooting problems that are associated with NAT. NAT is working, as
shown by the hits and misses count. Because there are four misses, a problem
might be evident. The standard access list numbered 1 is being used and the
translation pool is named NAT as evidenced by the last line of the output. Both
static NAT and NAT overload are used as seen in the Total translations line.
8. Refer to the exhibit. NAT is configured on RT1 and RT2. The PC is sending a
request to the web server. What IPv4 address is the source IP address in the packet
between RT2 and the web server?
192.168.1.5
203.0.113.10
172.16.1.254
172.16.1.10
209.165.200.245
192.0.2.2
Explanation: Because the packet is between RT2 and the web server, the source
IP address is the inside global address of PC, 209.165.200.245.
9. Refer to the exhibit. Based on the output that is shown, what type of NAT has
been implemented?
10.6.15.2
209.165.202.141
198.51.100.3
209.165.200.225
Explanation: The source address for packets forwarded by the router to the
Internet will be the inside global address of 209.165.200.225. This is the address
that the internal addresses from the 10.6.15.0 network will be translated to by
NAT.
14. Refer to the exhibit. The NAT configuration applied to the router is as follows:
Based on the configuration and the output shown, what can be determined about
the NAT status within the organization?
Static NAT is working, but dynamic NAT is not.
Dynamic NAT is working, but static NAT is not.
Not enough information is given to determine if both static and dynamic NAT
are working.
NAT is working.
Explanation: There is not enough information given because the router might not
be attached to the network yet, the interfaces might not have IP addresses
assigned yet, or the command could have been issued in the middle of the night.
The output does match the given configuration, so no typographical errors were
made when the NAT commands were entered.
15. Which situation describes data transmissions over a WAN connection?
A network administrator in the office remotely accesses a web server that is
located in the data center at the edge of the campus.
A manager sends an email to all employees in the department with offices
that are located in several buildings.
An employee prints a file through a networked printer that is located in
another building.
An employee shares a database file with a co-worker who is located in a branch
office on the other side of the city.
Explanation: When two offices across a city are communicating , it is most likely
that the data transmissions are over some type of WAN connection. Data
communications within a campus are typically over LAN connections.
16. Which two technologies are categorized as private WAN infrastructures?
(Choose two.)
Frame Relay
VPN
MetroE
DSL
cable
Explanation: Private WAN technologies include leased lines, dialup, ISDN,
Frame Relay, ATM, Ethernet WAN (an example is MetroE), MPLS, and VSAT.
17. Which network scenario will require the use of a WAN?
Employees need to connect to the corporate email server through a VPN while
traveling.
Employees need to access web pages that are hosted on the corporate web
servers in the DMZ within their building.
Employee workstations need to obtain dynamically assigned IP addresses.
Employees in the branch office need to share files with the headquarters
office that is located in a separate building on the same campus network.
Explanation: When traveling employees need to connect to a corporate email
server through a WAN connection, the VPN will create a secure tunnel between
an employee laptop and the corporate network over the WAN connection.
Obtaining dynamic IP addresses through DHCP is a function of LAN
communication. Sharing files among separate buildings on a corporate campus
is accomplished through the LAN infrastructure. A DMZ is a protected network
inside the corporate LAN infrastructure.
18. What are two hashing algorithms used with IPsec AH to guarantee authenticity?
(Choose two.)
SHA
RSA
DH
MD5
AES
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two popular algorithms used to ensure that data is not intercepted
and modified (data integrity and authenticity) are MD5 and SHA.
19. What two algorithms can be part of an IPsec policy to provide encryption and
hashing to protect interesting traffic? (Choose two.)
SHA
RSA
AES
DH
PSK
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two algorithms that can be used within an IPsec policy to protect
interesting traffic are AES, which is an encryption protocol, and SHA, which is a
hashing algorithm.
20. Which VPN solution allows the use of a web browser to establish a secure,
remote-access VPN tunnel to the ASA?
client-based SSL
site-to-site using an ACL
clientless SSL
site-to-site using a preshared key
Explanation: When a web browser is used to securely access the corporate
network, the browser must use a secure version of HTTP to provide SSL
encryption. A VPN client is not required to be installed on the remote host, so a
clientless SSL connection is used.
21. Which IPsec security function provides assurance that the data received via a
VPN has not been modified in transit?
integrity
authentication
confidentiality
secure key exchange
Explanation: Integrity is a function of IPsec and ensures data arrives unchanged
at the destination through the use of a hash algorithm. Confidentiality is a
function of IPsec and utilizes encryption to protect data transfers with a key.
Authentication is a function of IPsec and provides specific access to users and
devices with valid authentication factors. Secure key exchange is a function of
IPsec and allows two peers to maintain their private key confidentiality while
sharing their public key.
22. Which two types of VPNs are examples of enterprise-managed remote access
VPNs? (Choose two.)
clientless SSL VPN
client-based IPsec VPN
IPsec VPN
IPsec Virtual Tunnel Interface VPN
GRE over IPsec VPN
Explanation: Enterprise managed VPNs can be deployed in two configurations:
Remote Access VPN – This VPN is created dynamically when required to
establish a secure connection between a client and a VPN server. Remote
access VPNs include client-based IPsec VPNs and clientless SSL VPNs.
Site-to-site VPN – This VPN is created when interconnecting devices are
preconfigured with information to establish a secure tunnel. VPN traffic is
encrypted only between the interconnecting devices, and internal hosts have
no knowledge that a VPN is used. Site-to-site VPNs include IPsec, GRE over
IPsec, Cisco Dynamic Multipoint (DMVPN), and IPsec Virtual Tunnel
Interface (VTI) VPNs.
23. Which is a requirement of a site-to-site VPN?
It requires hosts to use VPN client software to encapsulate traffic.
It requires the placement of a VPN server at the edge of the company
network.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt
traffic.
It requires a client/server architecture.
Explanation: Site-to-site VPNs are static and are used to connect entire
networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN
gateways. The VPN gateway is responsible for encapsulating the traffic and
forwarding it through the VPN tunnel to a peer gateway at the other end which
decapsulates the traffic.
24. What is the function of the Diffie-Hellman algorithm within the IPsec
framework?
guarantees message integrity
allows peers to exchange shared keys
provides authentication
provides strong data encryption
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a
public key exchange method that allows two IPsec peers to establish a shared
secret key over an insecure channel.
25. What does NAT overloading use to track multiple internal hosts that use one
inside global address?
port numbers
IP addresses
autonomous system numbers
MAC addresses
Explanation: NAT overloading, also known as Port Address Translation (PAT),
uses port numbers to differentiate between multiple internal hosts.
26. Question as presented:
Explanation: The inside local address is the private IP address of the source or
the PC in this instance. The inside global address is the translated address of the
source or the address as seen by the outside device. Since the PC is using the
outside address of the R1 router, the inside global address is 192.0.2.1. The
outside addressing is simply the address of the server or 203.0.113.5.
27. Refer to the exhibit. R1 is configured for static NAT. What IP address will
Internet hosts use to reach PC1?
192.168.0.1
192.168.0.10
209.165.201.1
209.165.200.225
Explanation: In static NAT a single inside local address, in this case
192.168.0.10, will be mapped to a single inside global address, in this case
209.165.200.225. Internet hosts will send packets to PC1 and use as a
destination address the inside global address 209.165.200.225.
28. Which type of VPN uses the public key infrastructure and digital certificates?
SSL VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
29. Which two WAN infrastructure services are examples of private connections?
(Choose two.)
cable
DSL
Frame Relay
T1/E1
wireless
Explanation: Private WANs can use T1/E1, T3/E3, PSTN, ISDN, Metro Ethernet,
MPLS, Frame Relay, ATM, or VSAT technology.
30. Which two statements about the relationship between LANs and WANs are
true? (Choose two.)
Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but LANs are typically
operated by single organizations or individuals.
WANs must be publicly-owned, but LANs can be owned by either public or
private entities.
WANs connect LANs at slower speed bandwidth than LANs connect their
internal end devices.
LANs connect multiple WANs together.
Explanation: Although LANs and WANs can employ the same network media
and intermediary devices, they serve very different areas and purposes. The
administrative and geographical scope of a WAN is larger than that of a LAN.
Bandwidth speeds are slower on WANs because of their increased complexity.
The Internet is a network of networks, which can function under either public or
private management.
31. Which statement describes an important characteristic of a site-to-site VPN?
It must be statically set up.
It is ideally suited for use by mobile workers.
It requires using a VPN client on the host PC.
After the initial connection is established, it can dynamically change
connection information.
It is commonly implemented over dialup and cable modem networks.
Explanation: A site-to-site VPN is created between the network devices of two
separate networks. The VPN is static and stays established. The internal hosts of
the two networks have no knowledge of the VPN.
32. How is “tunneling” accomplished in a VPN?
New headers from one or more VPN protocols encapsulate the original packets.
All packets between two hosts are assigned to a single physical medium to
ensure that the packets are kept private.
Packets are disguised to look like other types of traffic so that they will be
ignored by potential attackers.
A dedicated circuit is established between the source and destination
devices for the duration of the connection.
Explanation: Packets in a VPN are encapsulated with the headers from one or
more VPN protocols before being sent across the third party network. This is
referred to as “tunneling”. These outer headers can be used to route the packets,
authenticate the source, and prevent unauthorized users from reading the
contents of the packets.
33. Which statement describes a VPN?
VPNs use open source virtualization software to create the tunnel through
the Internet.
VPNs use logical connections to create public networks through the Internet.
VPNs use dedicated physical connections to transfer data between remote
users.
VPNs use virtual connections to create a private network through a public
network.
Explanation: A VPN is a private network that is created over a public network.
Instead of using dedicated physical connections, a VPN uses virtual connections
routed through a public network between two network devices.
34. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
What problem is causing PC-A to be unable to communicate with the Internet?
Refer to the exhibit. The PC is sending a packet to the Server on the remote
network. Router R1 is performing NAT overload. From the perspective of the PC,
match the NAT address type with the correct IP address. (Not all options are used.)
Explanation: The inside local address is the private IP address of the source or
the PC in this instance. The inside global address is the translated address of the
source or the address as seen by the outside device. Since the PC is using the
outside address of the R1 router, the inside global address is 192.0.2.1. The
outside addressing is simply the address of the server or 203.0.113.5.
39. Refer to the exhibit. What has to be done in order to complete the static NAT
configuration on R1?
Interface Fa0/0 should be configured with the command no ip nat inside.
Interface S0/0/0 should be configured with the command ip nat outside.
R1 should be configured with the command ip nat inside source static
209.165.200.200 192.168.11.11.
R1 should be configured with the command ip nat inside source static
209.165.200.1 192.168.11.11.
Explanation: In order for NAT translations to work properly, both an inside and
outside interface must be configured for NAT translation on the router.
40. In NAT terms, what address type refers to the globally routable IPv4 address of
a destination host on the Internet?
outside global
inside global
outside local
inside local
Explanation: From the perspective of a NAT device, inside global addresses are
used by external users to reach internal hosts. Inside local addresses are the
addresses assigned to internal hosts. Outside global addresses are the
addresses of destinations on the external network. Outside local addresses are
the actual private addresses of destination hosts behind other NAT devices.
41. Refer to the exhibit. Which two statements are correct based on the output as
shown in the exhibit? (Choose two.)
The output is the result of the show ip nat translations command.
The host with the address 209.165.200.235 will respond to requests by using a
source address of 192.168.10.10.
The output is the result of the show ip nat statistics command.
Traffic with the destination address of a public web server will be sourced
from the IP of 192.168.1.10.
The host with the address 209.165.200.235 will respond to requests by using
a source address of 209.165.200.235.
Explanation: The output displayed in the exhibit is the result of the show ip nat
translations command. Static NAT entries are always present in the NAT table,
while dynamic entries will eventually time out.
42. Which circumstance would result in an enterprise deciding to implement a
corporate WAN?
when the enterprise decides to secure its corporate LAN
when its employees become distributed across many branch locations
when the number of employees exceeds the capacity of the LAN
when the network will span multiple buildings
Explanation: WANs cover a greater geographic area than LANs do, so having
employees distributed across many locations would require the implementation
of WAN technologies to connect those locations. Customers will access
corporate web services via a public WAN that is implemented by a service
provider, not by the enterprise itself. When employee numbers grow, the LAN
has to expand as well. A WAN is not required unless the employees are in
remote locations. LAN security is not related to the decision to implement a
WAN.
43. What is the function of the Hashed Message Authentication Code (HMAC)
algorithm in setting up an IPsec VPN?
protects IPsec keys during session negotiation
authenticates the IPsec peers
creates a secure channel for key negotiation
guarantees message integrity
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. The Hashed Message Authentication Code (HMAC) is a data integrity
algorithm that uses a hash value to guarantee the integrity of a message.
44. What algorithm is used with IPsec to provide data confidentiality?
Diffie-Hellman
SHA
MD5
RSA
AES
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two popular algorithms that are used to ensure that data is not
intercepted and modified (data integrity) are MD5 and SHA. AES is an encryption
protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm
that is used for key exchange. RSA is an algorithm that is used for
authentication.
45. Which two technologies provide enterprise-managed VPN solutions? (Choose
two.)
remote access VPN
Frame Relay
Layer 2 MPLS VPN
site-to-site VPN
Layer 3 MPLS VPN
Explanation: VPNs can be managed and deployed as either of two types:
Enterprise VPNs – Enterprise-managed VPNs are a common solution for
securing enterprise traffic across the internet. Site-to-site and remote access
VPNs are examples of enterprise managed VPNs.
Service Provider VPNs – Service provider managed VPNs are created and
managed over the provider network. Layer 2 and Layer 3 MPLS are
examples of service provider managed VPNs. Other legacy WAN solutions
include Frame Relay and ATM VPNs.
46. Question as presented:
Explanation: The inside local address is the private IP address of the source or
the PC in this instance. The inside global address is the translated address of the
source or the address as seen by the outside device. Since the PC is using the
outside address of the R1 router, the inside global address is 192.0.2.1. The
outside addressing is simply the address of the server or 203.0.113.5.
47. Refer to the exhibit. A network administrator is viewing the output from the
command show ip nat translations. Which statement correctly describes the NAT
translation that is occurring on router RT2?
59. Which type of VPN allows multicast and broadcast traffic over a secure site-to-
site VPN?
dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec
60. Match the steps with the actions that are involved when an internal host with IP
address 192.168.10.10 attempts to send a packet to and external server at the IP
address 209.165.200.254 across a router R1 that running dynamic NAT. (Not all
options are used.)
Place the options in the following order:
step 5 => R1 replaces the address 192.168.10.10 with a translated inside
global address.
step 2 => R1 checks the NAT configuration to determine if this packet should
be translated.
step 4 => R1 selects an available global address from the dynamic address
pool.
step 1 => The host sends packets that request a connection to the server at
the address 209.165.200.254
step 3 => If there is no translation entry for this IP address, R1 determines
that the source address 192.168.10.10 must be translated
Explanation: The translation of the IP addresses from 209.65.200.254 to
192.168.10.10 will take place when the reply comes back from the server.
61. Which type of VPN involves passenger, carrier, and transport protocols?
GRE over IPsec
dynamic multipoint VPN
MPLS VPN
IPsec virtual tunnel interface
Explanation: In a GRE over IPsec tunnel, the term passenger protocol refers to
the original packet that is to be encapsulated by GRE. The carrier protocol is the
protocol that encapsulates the original passenger packet. The transport protocol
is the protocol that will be used to forward the packet.
62. Match the steps with the actions that are involved when an internal host with IP
address 192.168.10.10 attempts to send a packet to an external server at the IP
address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all
options are used.)
The traffic from a source IPv4 public address that originates traffic on the
internet would be able to reach private internal IPv4 addresses.
The traffic from a source IPv4 address of 192.168.2.20 is being translated by
router RT2 to reach a destination IPv4 address of 192.0.2.254.
The traffic from a source IPv4 address of 192.168.254.253 is being translated to
192.0.2.88 by means of static NAT.
The traffic from a source IPv4 address of 192.0.2.88 is being translated by
router RT2 to reach a destination IPv4 address of 192.168.254.253.
Explain: Because no outside local or outside global address is referenced, the
traffic from a source IPv4 address of 192.168.254.253 is being translated to
192.0.2.88 by using static NAT. In the output from the command show ip nat
translations , the inside local IP address of 192.168.2.20 is being translated into
an outside IP address of 192.0.2.254 so that the traffic can cross the public
network. A public IPv4 device can connect to the private IPv4 device
192.168.254.253 by targeting the destination IPv4 address of 192.0.2.88.
64. What type of address is 10.131.48.7?
Private
Public
65. Which type of VPN supports multiple sites by applying configurations to virtual
interfaces instead of physical interfaces?
dynamic multipoint VPN
IPsec virtual tunnel interface
MPLS VPN
GRE over IPsec
Explanation: An IPsec VTI is a newer IPsec VPN technology that simplifies the
configuration required to support multiple sites and remote access. IPsec VTI
configurations use virtual interfaces to send and receive IP unicast and multicast
encrypted traffic. Therefore, routing protocols are automatically supported without
requiring configuration of GRE tunnels.
66. Which type of VPN involves a nonsecure tunneling protocol being encapsulated
by IPsec?
dynamic multipoint VPN
SSL VPN
IPsec virtual tunnel interface
GRE over IPsec
67. What type of address is 10.19.6.7?
private
public
68. What type of address is 64.101.198.197?
public
private
69. What type of address is 64.101.198.107
public
private
70. What type of address is 10.100.34.34?
private
public
71. What type of address is 192.168.7.126?
Private.
Public
72. What type of address is 198.133.219.148?
Private.
Public
73. Which two end points can be on the other side of an ASA site-to-site VPN?
(Choose two.)
DSL switch
router
another ASA
multilayer switch
Frame Relay switch
Explanation: In a site-to-site VPN, end hosts send and receive normal
unencrypted TCP/IP traffic through a VPN terminating device, typically called a
VPN gateway. A VPN gateway device could be a router or a firewall. A Cisco
Adaptive Security Appliance (ASA) is a standalone firewall device that combines
firewall, VPN concentrator, and intrusion prevention functionality into one
software image.
me
CCNA
Security
CyberOps
CCNA 3 v7 Modules 9 – 12: Optimize, Monitor, and
Troubleshoot Networks Exam Answers
Dec 22, 2019 Last Updated: Oct 20, 2021 CCNA v7 Course #3 44 Comments
Share TweetSharePin it
Playvolume00:00/01:03Tech around the worldTruvidfullScreen
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
The router selects an image depending on the boot system command in the
configuration.
The router selects an image depending on the value of the configuration
register.
The router selects the third Cisco IOS image because it is the most recent
IOS image.
The router selects the third Cisco IOS image because it contains the
advipservicesk9 image.
The router selects the second Cisco IOS image because it is the smallest
IOS image.
Explanation: When performing an upgrade or testing different IOS versions,
the boot system command is used to select which image is used to boot the Cisco
device.
22. Refer to the exhibit. What two types of devices are connected to R1? (Choose
two.)
switch
hub
router
repeater
Source Route Bridge
Explanation: The capabilities of the devices displayed by the output show them
to be a Cisco 2811 series router, Cisco 1941 series router, and a Cisco 2960
switch.
23. What are three functions provided by the syslog service? (Choose three.)
to select the type of logging information that is captured
to periodically poll agents for data
to provide statistics on packets that are flowing through a Cisco device
to provide traffic analysis
to gather logging information for monitoring and troubleshooting
to specify the destinations of captured messages
Explanation: There are three primary functions provided by the syslog service:
1. gathering logging information
2. selection of the type of information to be logged
3. selection of the destination of the logged information
24. What is the function of the MIB element as part of a network management
system?
to collect data from SNMP agents
to send and retrieve network management information
to change configurations on SNMP agents
to store data about a device
Explanation: The Management Information Base (MIB) resides on a networking
device and stores operational data about the device. The SNMP manager can
collect information from SNMP agents. The SNMP agent provides access to the
information.
25. What network design would contain the scope of disruptions on a network
should a failure occur?
the reduction in the number of redundant devices and connections in the
network core
the installation of only enterprise class equipment throughout the network
the deployment of distribution layer switches in pairs and the division of access
layer switch connections between them
the configuration of all access layer devices to share a single gateway
Explanation: One way to contain the impact of a failure on the network is to
implement redundancy. One way this is accomplished is by deploying redundant
distribution layer switches and dividing the access layer switch connections
between the redundant distribution layer switches. This creates what is called a
switch block. Failures in a switch block are contained to that block and do not
bring down the whole network.
26. Which action should be taken when planning for redundancy on a hierarchical
network design?
add alternate physical paths for data to traverse the network
continually purchase backup equipment for the network
implement STP portfast between the switches on the network
immediately replace a non-functioning module, service or device on a
network
Explanation: One method of implementing redundancy is path redundancy,
installing alternate physical paths for data to traverse the network. Redundant
links in a switched network supports high availability and can be used for load
balancing, reducing congestion on the network.
27. What are two benefits of extending access layer connectivity to users through a
wireless medium? (Choose two.)
increased flexibility
increased network management options
decreased number of critical points of failure
reduced costs
increased bandwidth availability
Explanation: Wireless connectivity at the access layer provides increased
flexibility, reduced costs, and the ability to grow and adapt to changing business
requirements. Utilizing wireless routers and access points can provide an
increase in the number of central points of failure. Wireless routers and access
points will not provide an increase in bandwidth availability.
28. What is a basic function of the Cisco Borderless Architecture access layer?
aggregates Layer 2 broadcast domains
provides access to the user
aggregates Layer 3 routing boundaries
provides fault isolation
Explanation: A function of the Cisco Borderless Architecture access layer is
providing network access to the users. Layer 2 broadcast domain aggregation,
Layer 3 routing boundaries aggregation, and high availability are distribution
layer functions. The core layer provides fault isolation and high-speed backbone
connectivity.
29. Which characteristic would most influence a network design engineer to select a
multilayer switch over a Layer 2 switch?
ability to have multiple forwarding paths through the switched network based
on VLAN number(s)
ability to build a routing table
ability to provide power to directly-attached devices and the switch itself
ability to aggregate multiple ports for maximum data throughput
Explanation: Multilayer switches, also known as Layer 3 switches, can route and
build a routing table. This capability is required in a multi-VLAN network and
would influence the network designer to select a multilayer switch. The other
options are features also available on Layer 2 switches, so they would not
influence the decision to select a multilayer switch.
30. Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF
adjacency?
39. What are two characteristics of the best-effort QoS model? (Choose two.)
It allows end hosts to signal their QoS needs to the network.
It uses a connection-oriented approach with QoS.
It provides preferential treatment for voice packets.
It does not provide a delivery guarantee for packets.
It treats all network packets in the same way.
Explanation: The best-effort QoS model provides no guarantees and it is
commonly used on the Internet. The best-effort QoS model treats all network
packets in the same way.
40. Why is QoS an important issue in a converged network that combines voice,
video, and data communications?
Data communications are sensitive to jitter.
Legacy equipment is unable to transmit voice and video without QoS.
Correct Response
Voice and video communications are more sensitive to latency.
Data communications must be given the first priority.
Explanation: Without any QoS mechanisms in place, time-sensitive packets,
such as voice and video, will be dropped with the same frequency as email and
web browsing traffic.
41. A network administrator configures a router with the command sequence:
XML
YAML
HTML
JSON
Explanation: The common data formats that are used in many applications
including network automation and programmability are as follows:
JavaScript Object Notation (JSON) – In JSON, the data known as an object is
one or more key/value pairs enclosed in braces { }. Keys must be strings
within double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a
related set of tags <tag>data</tag>.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an
object is one or more key value pairs. Key value pairs are separated by a
colon without the use of quotation marks. YAML uses indentation to define its
structure, without the use of brackets or commas.
19. What is the function of the key contained in most RESTful APIs?
It is the top-level object of the API query.
It is used to authenticate the requesting source.
It represents the main query components in the API request.
It is used in the encryption of the message by an API request.
Explanation: Many RESTful APIs, including public APIs, require a key. The key is
used to identify the source of the request through authentication.
20. Which two configuration management tools are developed using Ruby? (Choose
two.)
Puppet
Ansible
SaltStack
Chef
RESTCONF
Explanation: Chef and Puppet are configuration management tools developed
using Ruby. Ansible and SaltStack are configuration management tools
developed using Python. Ruby is typically considered a more difficult language to
learn than Python. RESTCONF is a network management protocol.
21. Which term is used to describe a set of instructions for execution by the
configuration management tool Puppet?
Playbook
Cookbook
Manifest
Pillar
Explanation: The configuration management tool Puppet uses the name Manifest
to describe the set of instructions to be executed.
22. Which term is used to describe a set of instructions for execution by the
configuration management tool SaltStack?
Cookbook
Manifest
Pillar
Playbook
Explanation: The configuration management tool SaltStack uses the name Pillar
to describe the set of instructions to be executed.
23. Which scenario describes the use of a public API?
It requires a license.
It can be used with no restrictions.
It is used between a company and its business partners.
It is used only within an organization.
Explanation: Public, or open, APIs have no restrictions and are available to the
public. Some API providers do require a user to obtain a free key or token prior to
using the API in order to control the volume of API requests received and
processed.
24. What is YAML?
It is a scripting language.
It is a data format and superset of JSON.
It is a compiled programming language.
It is a web application.
Explanation: Like JSON, YAML Ain’t Markup Language (YAML) is a data format
used by applications to store and transport data. YAML is considered a superset
of JSON.
25. Which RESTFul operation corresponds to the HTTP GET method?
post
patch
update
read
Explanation: RESTful operations correspond to the following HTTP methods
(shown to the left with the RESTful operation on the right):
POST > Create
GET > Read
PUT/PATCH > Update
DELETE > Delete
26. Which technology virtualizes the network control plane and moves it to a
centralized controller?
SDN
fog computing
cloud computing
IaaS
Explanation: Networking devices operate in two planes: the data plane and the
control plane. The control plane maintains Layer 2 and Layer 3 forwarding
mechanisms using the CPU. The data plane forwards traffic flows. SDN
virtualizes the control plane and moves it to a centralized network controller.
27. What are two functions of hypervisors? (Choose two.)
to partition the hard drive to run virtual machines
to manage virtual machines
to protect the host from malware infection from the virtual machines
to share the antivirus software across the virtual machines
to allocate physical system resources to virtual machines
Explanation: The hypervisor does not protect the hosting OS from malware.
Neither does it allow sharing software across virtual machines. The hard drive of
the supporting computer does not need to be partitioned to run virtual machines.
The hypervisor creates and manages virtual machines on a host computer and
allocates physical system resources to them.
28. What is a difference between the functions of Cloud computing and
virtualization?
Cloud computing requires hypervisor technology whereas virtualization is a
fault tolerance technology.
Cloud computing separates the application from the hardware whereas
virtualization separates the OS from the underlying hardware.
Cloud computing provides services on web-based access whereas
virtualization provides services on data access through virtualized Internet
connections.
Cloud computing utilizes data center technology whereas virtualization is not
used in data centers.
Explanation: Cloud computing separates the application from the hardware.
Virtualization separates the OS from the underlying hardware. Virtualization is a
typical component within cloud computing. Virtualization is also widely used in
data centers. Although the implementation of virtualization facilitates an easy
server fault tolerance setup, it is not a fault tolerance technology by design. The
Internet connection from a data center or service provider needs redundant
physical WAN connections to ISPs.
29. How is the YAML data format structure different from JSON?
It uses indentations.
It uses end tags.
It uses hierarchical levels of nesting.
It uses brackets and commas.
Explanation: The structure in YAML is defined by indentations rather than
brackets and commas.
30. What is the most widely used API for web services?
XML-RPC
SOAP
JSON-RPC
REST
Explanation: REST accounts for more than 80% of all API types used for web
services, making it the most widely used web service API.
31. What is REST?
It is a way to store and interchange data in a structured format.
It is an architecture style for designing web service applications.
It is a human readable data structure that is used by applications for storing,
transforming, and reading data.
It is a protocol that allows administrators to manage nodes on an IP network.
Explanation: REST is not a protocol or service, but rather a style of software
architecture for designing web service applications.
32. What is a difference between the XML and HTML data formats?
XML does not use predefined tags whereas HTML does use predefined tags.
XML encloses data within a pair of tags whereas HTML uses a pair of
quotation makes to enclose data.
XML formats data in binary whereas HTML formats data in plain text.
XML does not require indentation for each key/value pair but HTML does
require indentation.
Explanation: XML is a human readable data structure used to store, transfer, and
read data by applications. Like HTML, XML uses a related set of tags to enclose
data. However, unlike HTML, XML uses no predefined tags or document
structure.
33. To avoid purchasing new hardware, a company wants to take advantage of idle
system resources and consolidate the number of servers while allowing for multiple
operating systems on a single hardware platform. What service or technology would
support this requirement?
dedicated servers
Cisco ACI
virtualization
software defined networking
34. Match the term to the RESTful API request
http://www.mapquestapi.com/directions/v2/route?
outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca component.
(Not all options are used.)
35. Which cloud computing opportunity would provide the use of network
hardware such as routers and switches for a particular company?
software as a service (SaaS)
wireless as a service (WaaS)
infrastructure as a service (IaaS)
browser as a service (BaaS)
Explanation: This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in
the cloud.
36. What component is considered the brains of the ACI architecture and translates
application policies?
the Application Network Profile endpoints
the Nexus 9000 switch
the hypervisor
the Application Policy Infrastructure Controller
Explanation: The ACI architecture consists of three core components: the
Application Network Profile, the Application Policy Infrastructure Controller, which
serves as the brains of the ACI architecture, and the Cisco Nexus 9000 switch.
37. Which statement describes the concept of cloud computing?
separation of management plane from control plane
separation of control plane from data plane
separation of application from hardware
separation of operating system from hardware
Explanation: Cloud computing is used to separate the application or service from
hardware. Virtualization separates the operating system from the hardware.
38. In which situation would a partner API be appropriate?
an internet search engine allowing developers to integrate the search engine
into their own software applications
company sales staff accessing internal sales data from their mobile devices
someone creating an account on an external app or website by using his or
her social media credentials
a vacation service site interacting with hotel databases to display information
from all the hotels on its web site
Explanation: Partner API programs incorporate collaboration with other business.
They facilitate communication and integration of software between a company
and its business partners.
39. Because of enormous growth in web traffic, a company has planned to purchase
additional servers to help handle the web traffic. What service or technology would
support this requirement?
virtualization
data center
cloud services
dedicated servers
40. ABCTech is investigating the use of automation for some of its products. In
order to control and test these products, the programmers require Windows, Linux,
and MAC OS on their computers. What service or technology would support this
requirement?
dedicated servers
software defined networking
virtualization
Cisco ACI
41. What are three components used in the query portion of a typical RESTful API
request? (Choose three.)
API server
format
parameters
key
protocol
resources
42. A company has recently become multinational. Employees are working
remotely, in different time zones, and they need access to company services from
any place at any time. What service or technology would support this requirement?
dedicated servers
cloud services
Cisco ACI
virtualization
43. Following a multicontinent advertising campaign for a new product, a company
finds its client database and volume of orders are overloading its on-site computer
systems but the company does not have any room to expand. What service or
technology would support this requirement?
cloud services
dedicated servers
data center
virtualization
44. A network administrator has been tasked with creating a disaster recovery plan.
As part of this plan, the administrator is looking for a backup site for all of the data
on the company servers. What service or technology would support this
requirement?
virtualization
software defined networking
data center
dedicated servers
45. Which is a requirement of a site-to-site VPN?
It requires hosts to use VPN client software to encapsulate traffic.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt
traffic.
It requires the placement of a VPN server at the edge of the company
network.
It requires a client/server architecture.
Explanation: Site-to-site VPNs are static and are used to connect entire
networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN
gateways. The VPN gateway is responsible for encapsulating the traffic and
forwarding it through the VPN tunnel to a peer gateway at the other end which
decapsulates the traffic.
46. Which statement describes an important characteristic of a site-to-site VPN?
It must be statically set up.
After the initial connection is established, it can dynamically change
connection information.
It requires using a VPN client on the host PC.
It is commonly implemented over dialup and cable modem networks.
It is ideally suited for use by mobile workers.
Explanation: A site-to-site VPN is created between the network devices of two
separate networks. The VPN is static and stays established. The internal hosts of
the two networks have no knowledge of the VPN.
47. Which protocol is attacked when a cybercriminal provides an invalid gateway in
order to create a man-in-the-middle attack?
DHCP
ICMP
DNS
HTTP or HTTPS
Explanation: A cybercriminal could set up a rogue DHCP server that provides
one or more of the following:
Wrong default gateway that is used to create a man-in-the-middle attack and
allow the attacker to intercept data
Wrong DNS server that results in the user being sent to a malicious website
Invalid default gateway IP address that results in a denial of service attack on
the DHCP client
48. In which TCP attack is the cybercriminal attempting to overwhelm a target host
with half-open TCP connections?
reset attack
session hijacking attack
SYN flood attack
port scan attack
Explanation: In a TCP SYN flood attack, the attacker sends to the target host a
continuous flood of TCP SYN session requests with a spoofed source IP
address. The target host responds with a TCP-SYN-ACK to each of the SYN
session requests and waits for a TCP ACK that will never arrive. Eventually the
target is overwhelmed with half-open TCP connections.
49. Which statement describes a VPN?
VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through
the Internet.
VPNs use dedicated physical connections to transfer data between remote
users.
VPNs use virtual connections to create a private network through a public
network.
Explanation: A VPN is a private network that is created over a public network.
Instead of using dedicated physical connections, a VPN uses virtual connections
routed through a public network between two network devices.
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that questio are two types of attacks used on DNS open resolvers?
(Choose n/answer.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
R1#
192.168.0.100
10.1.1.2
any address in the 10.1.1.0 network
209.165.20.25
22. Which two IPsec protocols are used to provide data integrity?
MD5
DH
AES
SHA
RSA
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two popular algorithms used to ensure that data is not intercepted
and modified (data integrity) are MD5 and SHA. AES is an encryption protocol
and provides data confidentiality. DH (Diffie-Hellman) is an algorithm used for
key exchange. RSA is an algorithm used for authentication.
23. If an outside host does not have the Cisco AnyConnect client preinstalled, how
would the host gain access to the client image?
The Cisco AnyConnect client is installed by default on most major operating
systems.
The host initiates a clientless VPN connection using a compliant web browser to
download the client.
The host initiates a clientless connection to a TFTP server to download the
client.
The host initiates a clientless connection to an FTP server to download the
client.
Explanation: If an outside host does not have the Cisco AnyConnect client
preinstalled, the remote user must initiate a clientless SSL VPN connection via a
compliant web browser, and then download and install the AnyConnect client on
the remote host.
24. A company is considering updating the campus WAN connection. Which two
WAN options are examples of the private WAN architecture? (Choose two.)
leased line
cable
digital subscriber line
Ethernet WAN
municipal Wi-Fi
Explanation: An organization can connect to a WAN through basic two options:
Private WAN infrastructure – such as dedicated point-to-point leased lines,
PSTN, ISDN, Ethernet WAN, ATM, or Frame Relay
Public WAN infrastructure – such as digital subscriber line (DSL), cable,
satellite access, municipal Wi-Fi, WiMAX, or wireless cellular including
3G/4G
782
74
128
65
50. What is one reason to use the ip ospf priority command when the OSPF routing
protocol is in use?
to activate the OSPF neighboring process
to influence the DR/BDR election process
to provide a backdoor for connectivity during the convergence process
to streamline and speed up the convergence process
Explanation: The OSPF priority can be set to a number between 0 and 255. The
higher the number set, the more likely the router becomes the DR. A priority 0
stops a router from participating in the election process and the router does not
become a DR or a BDR.
51. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2
Explanation: Traffic should be classified and marked as close to its source as
possible. The trust boundary identifies at which device marked traffic should be
trusted. Traffic marked on VoIP phones would be considered trusted as it moves
into the enterprise network.
71. What are two benefits of extending access layer connectivity to users through a
wireless medium? (Choose two.)
reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options
Explanation: Wireless connectivity at the access layer provides increased
flexibility, reduced costs, and the ability to grow and adapt to changing business
requirements. Utilizing wireless routers and access points can provide an
increase in the number of central points of failure. Wireless routers and access
points will not provide an increase in bandwidth availability.
72. What are two purposes of launching a reconnaissance attack on a network?
(Choose two.)
to scan for accessibility
to retrieve and modify data
to gather information about the network and devices
to prevent other users from accessing the system
to escalate access privileges
Explanation: Gathering information about a network and scanning for access is a
reconnaissance attack. Preventing other users from accessing a system is a
denial of service attack. Attempting to retrieve and modify data, and attempting to
escalate access privileges are types of access attacks.
73. A group of users on the same network are all complaining about their computers
running slowly. After investigating, the technician determines that these computers
are part of a zombie network. Which type of malware is used to control these
computers?
botnet
spyware
virus
rootkit
Explanation: A botnet is a network of infected computers called a zombie
network. The computers are controlled by a hacker and are used to attack other
computers or to steal data.
74. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
flash memory
NVRAM?
RAM
ROM
a TFTP server?
76. Refer to the exhibit. Which data format is used to represent the data for network
automation applications?
XML
YAML
HTML
JSON
Explanation: The common data formats that are used in many applications
including network automation and programmability are as follows:
JavaScript Object Notation (JSON) – In JSON, the data known as an object is
one or more key/value pairs enclosed in braces { }. Keys must be strings
within double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a
related set of tags <tag>data</tag>.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an
object is one or more key value pairs. Key value pairs are separated by a
colon without the use of quotation marks. YAML uses indentation to define its
structure, without the use of brackets or commas.
77. What QoS step must occur before packets can be marked?
classifying
shaping
queuing
policing
78. What is the main function of a hypervisor?
It is used to create and manage multiple VM instances on a host machine.
It is a device that filters and checks security credentials.
It is a device that synchronizes a group of sensors.
It is software used to coordinate and prepare data for analysis.
It is used by ISPs to monitor cloud computing resources.
Explanation: A hypervisor is a key component of virtualization. A hypervisor is
often software-based and is used to create and manage multiple VM instances.
79. A company needs to interconnect several branch offices across a metropolitan
area. The network engineer is seeking a solution that provides high-speed converged
traffic, including voice, video, and data on the same network infrastructure. The
company also wants easy integration to their existing LAN infrastructure in their
office locations. Which technology should be recommended?
Frame Relay
Ethernet WAN
VSAT
ISDN
Explanation: Ethernet WAN uses many Ethernet standards and it connects easily
to existing Ethernet LANs. It provides a switched, high-bandwidth Layer 2
network capable of managing data, voice, and video all on the same
infrastructure. ISDN, while capable of supporting both voice and data, does not
provide high bandwidth. VSAT uses satellite connectivity to establish a private
WAN connection but with relatively low bandwidth. Use of VSAT, ISDN, and
Frame Relay require specific network devices for the WAN connection and data
conversion between LAN and WAN.
80. Refer to the exhibit. As traffic is forwarded out an egress interface with QoS
treatment, which congestion avoidance technique is used?
traffic shaping
weighted random early detection
classification and marking
traffic policing
Explanation: Traffic shaping buffers excess packets in a queue and then
forwards the traffic over increments of time, which creates a smoothed packet
output rate. Traffic policing drops traffic when the amount of traffic reaches a
configured maximum rate, which creates an output rate that appears as a saw-
tooth with crests and troughs.
81. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
Which two conclusions can be drawn from this new configuration? (Choose two.)
TFTP packets will be permitted.
Ping packets will be permitted.
Telnet packets will be permitted.
SSH packets will be permitted.
All TCP and UDP packets will be denied.
Explanation: After the editing, the final configuration is as follows:
Router# show access-lists
Extended IP access list 101
5 permit tcp any any eq ssh
10 deny tcp any any
20 deny udp any any
30 permit icmp any any
So, only SSH packets and ICMP packets will be permitted.
85. Which troubleshooting approach is more appropriate for a seasoned network
administrator rather than a less-experienced network administrator?
a less-structured approach based on an educated guess
an approach comparing working and nonworking components to spot
significant differences
a structured approach starting with the physical layer and moving up through
the layers of the OSI model until the cause of the problem is identified
an approach that starts with the end-user applications and moves down
through the layers of the OSI model until the cause of the problem has been
identified
86. Refer to the exhibit. Many employees are wasting company time accessing social
media on their work computers. The company wants to stop this access. What is the
best ACL type and placement to use in this situation?
The inside and outside NAT interlaces have been configured backwards
The inside global address is not on the same subnet as the ISP
The address on Fa0/0 should be 64.100.0.1.
The NAT source access list matches the wrong address range.
Explanation: The output of debug ip nat shows each packet that is translated by
the router. The “s” is the source IP address of the packet and the “d” is the
destination. The address after the arrow (“->”) shows the translated address. In
this case, the translated address is on the 209.165.201.0 subnet but the ISP
facing interface is in the 209.165.200.224/27 subnet. The ISP may drop the
incoming packets, or might be unable to route the return packets back to the host
because the address is in an unknown subnet.
88. Why is QoS an important issue in a converged network that combines voice,
video, and data communications?
Data communications must be given the first priority.
Voice and video communications are more sensitive to latency.
Legacy equipment is unable to transmit voice and video without QoS.
Data communications are sensitive to jitter.
Explanation: Without any QoS mechanisms in place, time-sensitive packets,
such as voice and video, will be dropped with the same frequency as email and
web browsing traffic.
89. Which statement describes a VPN?
VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through
the Internet.
VPNs use dedicated physical connections to transfer data between remote
users.
VPNs use virtual connections to create a private network through a public
network.
Explanation: A VPN is a private network that is created over a public network.
Instead of using dedicated physical connections, a VPN uses virtual connections
routed through a public network between two network devices.
90. In which OSPF state is the DR/BDR election conducted?
ExStart
Init
Two-Way
Exchange
91. Two corporations have just completed a merger. The network engineer has been
asked to connect the two corporate networks without the expense of leased lines.
Which solution would be the most cost effective method of providing a proper and
secure connection between the two corporate networks?
Cisco Secure Mobility Clientless SSL VPN
Frame Relay
remote access VPN using IPsec
Cisco AnyConnect Secure Mobility Client with SSL
site-to-site VPN
Explanation: The site-to-site VPN is an extension of a classic WAN network that
provides a static interconnection of entire networks. Frame Relay would be a
better choice than leased lines, but would be more expensive than implementing
site-to-site VPNs. The other options refer to remote access VPNs which are
better suited for connecting users to the corporate network versus
interconnecting two or more networks.
92. What is the final operational state that will form between an OSPF DR and a
DROTHER once the routers reach convergence?
loading
established
full
two-way
93. Refer to the exhibit. If the switch reboots and all routers have to re-establish
OSPF adjacencies, which routers will become the new DR and BDR?
Router R3 will become the DR and router R1 will become the BDR.
Router R4 will become the DR and router R3 will become the BDR.
Router R1 will become the DR and router R2 will become the BDR.
Router R3 will become the DR and router R2 will become the BDR.
Explanation: OSPF elections of a DR are based on the following in order of
precedence:
highest pritority from 1 -255 (0 = never a DR)
highest router ID
highest IP address of a loopback or active interface in the absence of a
manually configured router ID. Loopback IP addresses take higher
precedence than other interfaces.
In this case routers R3 and R1 have the highest router priority. Between the two,
R3 has the higher router ID. Therefore, R3 will become the DR and R1 will
become the BDR.
Case 2:
Enterprise Networking, Security, and Automation (Version 7.00) – ENSA Final Exam
Router R2 will become the DR and router R4 will become the BDR.
Router R1 will become the DR and router R3 will become the BDR.
Router R4 will become the DR and router R3 will become the BDR.
Router R3 will become the DR and router R2 will become the BDR.
94. Which type of server would be used to keep a historical record of messages from
monitored network devices?
DNS
print
DHCP
syslog
authentication
Explanation: A syslog server is used as a centralized location for logged
messages from monitored network devices.
95. When QoS is implemented in a converged network, which two factors can be
controlled to improve network performance for real-time traffic? (Choose two.)
packet addressing
delay
jitter
packet routing
link speed
Explanation: Delay is the latency between a sending and receiving device. Jitter
is the variation in the delay of the received packets. Both delay and jitter need to
be controlled in order to support real-time voice and video traffic.
96. In which step of gathering symptoms does the network engineer determine if the
problem is at the core, distribution, or access layer of the network?
Determine ownership.
Determine the symptoms.
Narrow the scope.
Document the symptoms.
Gather information.
Explanation: In the “narrow the scope” step of gathering symptoms, a network
engineer will determine if the network problem is at the core, distribution, or
access layer of the network. Once this step is complete and the layer is
identified, the network engineer can determine which pieces of equipment are the
most likely cause.
97. What protocol sends periodic advertisements between connected Cisco devices in
order to learn device name, IOS version, and the number and type of interfaces?
CDP
SNMP
NTP
LLDP
98. An administrator is configuring single-area OSPF on a router. One of the
networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask
would the administrator use in the OSPF network statement?
0.0.0.127
0.0.0.31
0.0.3.255
0.0.0.63
99. Refer to the exhibit. An administrator configures the following ACL in order to
prevent devices on the 192.168.1.0 subnet from accessing the server at 10.1.1.5:
i386046n1v2.gif
router ospf 1
network 192.168.10.0 area 0
router ospf 1
network 192.168.10.0
router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252
router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0
105. An administrator is configuring single-area OSPF on a router. One of the
networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask
would the administrator use in the OSPF network statement?
0.0.7.255
0.0.1.255
0.0.3.255
0.0.15.255
106. How does virtualization help with disaster recovery within a data center?
improvement of business practices
supply of consistent air flow
support of live migration
guarantee of power
Explanation: Live migration allows moving of one virtual server to another virtual
server that could be in a different location that is some distance from the original
data center.
Case 2:
Less energy is consumed.
Server provisioning is faster.
Hardware at the recovery site does not have to be identical to production
equipment.
Power is always provided.
Explanation: Improved disaster recovery – Virtualization offers advanced
business continuity solutions. It provides hardware abstraction capability so that
the recovery site no longer needs to have hardware that is identical to the
hardware in the production environment. Most enterprise server virtualization
platforms also have software that can help test and automate the failover before
a disaster does happen.
107. How does virtualization help with disaster recovery within a data center?
Hardware does not have to be identical.
(Other case) Hardware at the recovery site does not have to be identical to
production equipment.
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Explanation: Disaster recovery is how a company goes about accessing
applications, data, and the hardware that might be affected during a disaster.
Virtualization provides hardware independence which means the disaster
recovery site does not have to have the exact equipment as the equipment in
production. Server provisioning is relevant when a server is built for the first time.
Although data centers do have backup generators, the entire data center is
designed for disaster recovery. One particular data center could never guarantee
that the data center itself would never be without power.
108. Refer to the exhibit. Which devices exist in the failure domain when switch S3
loses power?
S4 and PC_2
PC_3 and AP_2
AP_2 and AP_1
PC_3 and PC_2
S1 and S4
A failure domain is the area of a network that is impacted when a critical device
such as switch S3 has a failure or experiences problems.
109. Which set of access control entries would allow all users on the 192.168.10.0/24
network to access a web server that is located at 172.17.80.1, but would not allow
them to use Telnet?
access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet
For an extended ACL to meet these requirements the following need to be
included in the access control entries:
identification number in the range 100-199 or 2000-2699
permit or deny parameter
protocol
source address and wildcard
destination address and wildcard
port number or name
110. Refer to the exhibit. A network administrator needs to add an ACE to the
TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20.
Which ACE will meet this requirement?
115. What type of traffic is described as having a high volume of data per packet?
data
video
voice
116. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity
and capabilities of the host device to other connected network devices?
LLDP
NTP
TFTP
SNMP
117. Which step in the link-state routing process is described by a router running an
algorithm to determine the best path to each destination?
building the topology table
selecting the router ID
declaring a neighbor to be inaccessible
executing the SPF algorithm
118. Refer to the exhibit. Which conclusion can be drawn from this OSPF
multiaccess network?
If the DR stops producing Hello packets, a BDR will be elected, and then it
promotes itself to assume the role of DR.
With an election of the DR, the number of adjacencies is reduced from 6 to 3.
When a DR is elected all other non-DR routers become DROTHER.
All DROTHER routers will send LSAs to the DR and BDR to multicast
224.0.0.5.
On OSPF multiaccess networks, a DR is elected to be the collection and
distribution point for LSAs sent and received. A BDR is also elected in case the
DR fails. All other non-DR or BDR routers become DROTHER. Instead of
flooding LSAs to all routers in the network, DROTHERs only send their LSAs to
the DR and BDR using the multicast address 224.0.0.6. If there is no DR/BDR
election, the number of required adjacencies is n(n-1)/2 = > 4(4-1)/2 = 6. With the
election, this number is reduced to 3.
119. Refer to the exhibit. The network administrator has an IP address of
192.168.11.10 and needs access to manage R1. What is the best ACL type and
placement to use in this situation?
The file already exists on the USB drive and cannot be overwritten.
The drive was not properly formatted with the FAT16 file system.
There is no space left on the USB drive.
The USB drive is not recognized by the router.
The command that the administrator used was incorrect.
126. Which three types of VPNs are examples of enterprise-managed site-to-site
VPNs? (Choose three.)
Layer 3 MPLS VPN
IPsec VPN
Cisco Dynamic Multipoint VPN
GRE over IPsec VPN
clientless SSL VPN
client-based IPsec VPN
127. Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive
information and are not allowed access off their network. What is the best ACL type
and placement to use in this situation?
XML
HTML
YAML
JSON
Explanation:
Common data formats that are used in many applications including network
automation and programmability include these:
JavaScript Object Notation (JSON) – In JSON, the data known as an object is
one or more key/value pairs enclosed in braces { }. Keys must be strings within
double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a
related set of tags data.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is
one or more key value pairs. Key value pairs are separated by a colon without
the use of quotation marks. YAML uses indentation to define its structure, without
the use of brackets or commas.
135. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
137. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity
and capabilities of the host device to other connected network devices?
NTP
LLDP
SNMP
MPLS
138. Which type of VPN uses a hub-and-spoke configuration to establish a full mesh
topology?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
139. What is a characteristic of the REST API?
evolved into what became SOAP
used for exchanging XML structured information over HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services
141. A student, doing a summer semester of study overseas, has taken hundreds of
pictures on a smartphone and wants to back them up in case of loss. What service or
technology would support this requirement?
Cisco ACI
cloud services
software defined networking
dedicated servers
142. Consider the following access list that allows IP phone configuration file
transfers from a particular host to a TFTP server:
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range
1024 5000
Which method would allow the network administrator to modify the ACL and
include FTP transfers from any source IP address?
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range
1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range
1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
143. Which three statements are generally considered to be best practices in the
placement of ACLs? (Choose three.)
Filter unwanted traffic before it travels onto a low-bandwidth link.
Place standard ACLs close to the destination IP address of the traffic.
Place standard ACLs close to the source IP address of the traffic.
Place extended ACLs close to the destination IP address of the traffic.
Place extended ACLs close to the source IP address of the traffic.
For every inbound ACL placed on an interface, there should be a matching
outbound ACL.
Explanation: Extended ACLs should be placed as close as possible to the source
IP address, so that traffic that needs to be filtered does not cross the network and
use network resources. Because standard ACLs do not specify a destination
address, they should be placed as close to the destination as possible. Placing a
standard ACL close to the source may have the effect of filtering all traffic, and
limiting services to other hosts. Filtering unwanted traffic before it enters low-
bandwidth links preserves bandwidth and supports network functionality.
Decisions on placing ACLs inbound or outbound are dependent on the
requirements to be met.
144.
A.
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip access-group 5 out
B.
R1(config)# access-list 5 permit 10.0.54.0 0.0.1.255
C.
R1(config)# interface Serial0/0/0
R1(config-if)# ip access-group 5 in
D.
R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127
E.
R1(config)# access-list 5 permit any
159. A network administrator is writing a standard ACL that will deny any traffic
from the 172.16.0.0/16 network, but permit all other traffic. Which two commands
should be used? (Choose two.)
Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 172.16.0.0 255.255.255.255
Router(config)# access-list 95 deny any
Explanation: To deny traffic from the 172.16.0.0/16 network, the access-list 95
deny 172.16.0.0 0.0.255.255 command is used. To permit all other traffic,
the access-list 95 permit any statement is added.
160. Refer to the exhibit. The company has decided that no traffic initiating from
any other existing or future network can be transmitted to the Research and
Development network. Furthermore, no traffic that originates from the Research
and Development network can be transmitted to any other existing or future
networks in the company. The network administrator has decided that extended
ACLs are better suited for these requirements. Based on the information given,
what will the network administrator do?
One ACL will be placed on the R1 Gi0/0 interface and one ACL will be
placed on the R2 Gi0/0 interface.
Only a numbered ACL will work for this situation.
One ACL will be placed on the R2 Gi0/0 interface and one ACL will be
placed on the R2 S0/0/0 interface.
Two ACLs (one in each direction) will be placed on the R2 Gi0/0 interface.
161. What protocol uses smaller stratum numbers to indicate that the server is
closer to the authorized time source than larger stratum numbers?
TFTP
SYSLOG
NTP
MPLS
162. Refer to the exhibit. If no router ID was manually configured, what would
router Branch1 use as its OSPF router ID?
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
Explanation: In OSPFv2, a Cisco router uses a three-tier method to derive its
router ID. The first choice is the manually configured router ID with the router-id
command. If the router ID is not manually configured, the router will choose the
highest IPv4 address of the configured loopback interfaces. Finally if no loopback
interfaces are configured, the router chooses the highest active IPv4 address of
its physical interfaces.
163. Match the HTTP method with the RESTful operation.
164. Refer to the exhibit. A web designer calls to report that the web server web-
s1.cisco.com is not reachable through a web browser. The technician uses command
line utilities to verify the problem and to begin the troubleshooting process. Which
two things can be determined about the problem? (Choose two.)
167. What type of traffic is described as consisting of traffic that requires a higher
priority if interactive?
voice
data
video
168. Which type of VPN provides a flexible option to connect a central site with
branch sites?
IPsec virtual tunnel interface
MPLS VPN
dynamic multipoint VPN
GRE over IPsec
169. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use fuzzers?
to discover security vulnerabilities of a computer
to detect any evidence of a hack or malware in a computer or network
to reverse engineer binary files when writing exploits and when analyzing
malware
to detect installed tools within files and directories that provide threat actors
remote access and control over a computer or network
170. Refer to the exhibit. A network administrator has configured a standard ACL
to permit only the two LAN networks attached to R1 to access the network that
connects to R2 G0/1 interface, but not the G0/0 interface. When following the best
practices, in what location should the standard ACL be applied?
R1 S0/0/0 outbound
R2 G0/0 outbound
R2 S0/0/1 outbound
R1 S0/0/0 inbound
R2 G0/1 inbound
171. Two OSPF-enabled routers are connected over a point-to-point link. During
the ExStart state, which router will be chosen as the first one to send DBD packets?
the router with the highest router ID
the router with the lowest IP address on the connecting interface
the router with the highest IP address on the connecting interface
the router with the lowest router ID
Explain:In the ExStart state, the two routers decide which router will send the
DBD packets first. The router with the higher router ID will be the first router to
send DBD packets during the Exchange state
172. Which step in the link-state routing process is described by a router sending
Hello packets out all of the OSPF-enabled interfaces?
exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies
Explanation: OSPF-enabled routers must recognize each other on the network
before they can share information. An OSPF-enabled router sends Hello packets
out all OSPF-enabled interfaces to determine if neighbors are present on those
links. If a neighbor is present, the OSPF-enabled router attempts to establish a
neighbor adjacency with that neighbor.
173. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use forensic tools?
to obtain specially designed operating systems preloaded with tools
optimized for hacking
to detect any evidence of a hack or malware in a computer or network
to detect installed tools within files and directories that provide threat actors
remote access and control over a computer or network
to reverse engineer binary files when writing exploits and when analyzing
malware
174. Refer to the exhibit. A network administrator has configured OSPFv2 on the
two Cisco routers but PC1 is unable to connect to PC2. What is the most likely
problem?
Interface Fa0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 is configured as a passive-interface on router R2.
Interface S0/0 is configured as a passive-interface on router R2.
Interface s0/0 has not been activated for OSPFv2 on router R2.
Explanation: If a LAN network is not advertised using OSPFv2, a remote network
will not be reachable. The output displays a successful neighbor adjacency
between router R1 and R2 on the interface S0/0 of both routers.
175. ABCTech is investigating the use of automation for some of its products. In
order to control and test these products, the programmers require Windows, Linux,
and MAC OS on their computers. What service or technology would support this
requirement?
dedicated servers
software defined networking
virtualization
Cisco ACI
176. A network engineer has noted that some expected network route entries are not
displayed in the routing table. Which two commands will provide additional
information about the state of router adjacencies, timer intervals, and the area ID?
(Choose two.)
show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
Explanation: The show ip ospf interface command will display routing table
information that is already known. The show running-configuration and show ip
protocols commands will display aspects of the OSPF configuration on the router
but will not display adjacency state details or timer interval details.
177. Which type of VPN involves the forwarding of traffic over the backbone
through the use of labels distributed among core routers?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
178. Which type of VPN involves a nonsecure tunneling protocol being encapsulated
by IPsec?
SSL VPN
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface
179. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use hacking
operation systems?
to detect any evidence of a hack or malware in a computer or network
to obtain specially designed operating systems preloaded with tools optimized
for hacking
to encode data, using algorithm schemes, to prevent unauthorized access to
the encrypted data
to reverse engineer binary files when writing exploits and when analyzing
malware
180. What command would be used as part of configuring NAT or PAT to identify
an interface as part of the external global network?
ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside
181. To avoid purchasing new hardware, a company wants to take advantage of idle
system resources and consolidate the number of servers while allowing for multiple
operating systems on a single hardware platform. What service or technology would
support this requirement?
data center
cloud services
virtualization
dedicated servers
Explain: Server virtualization takes advantage of idle resources and consolidates
the number of required servers. This also allows for multiple operating systems to
exist on a single hardware platform.
182. Which type of VPN routes packets through virtual tunnel interfaces for
encryption and forwarding?
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
183. Which step in the link-state routing process is described by a router flooding
link-state and cost information about each directly connected link?
building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route
184. What type of traffic is described as using either TCP or UDP depending on the
need for error recovery?
video
voice
data
185. Refer to the exhibit. The company CEO demands that one ACL be created to
permit email traffic to the internet and deny FTP access. What is the best ACL type
and placement to use in this situation?
197. What command would be used as part of configuring NAT or PAT to link the
inside local addresses to the pool of addresses available for PAT translation?
ip nat inside source list ACCTNG pool POOL-STAT
ip nat translation timeout 36000
ip nat inside source list 14 pool POOL-STAT overload
ip nat inside source static 172.19.89.13 198.133.219.65
198. What protocol is a vendor-neutral Layer 2 discovery protocol that must be
configured separately to transmit and receive information packets?
SNMP
MPLS
LLDP
NTP
199. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.55, a destination address of
172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted
or denied?
permitted
denied
200. Refer to the exhibit. Corporate policy demands that access to the server
network be restricted to internal employees only. What is the best ACL type and
placement to use in this situation?
Corporate policy demands that access to the server network be restricted to internal
employees only. What is the best ACL type and placement to use in this situation
extended ACL outbound on R2 S0/0/1
standard ACL outbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting to the internet
extended ACL inbound on R2 S0/0/0
201. A technician is working on a Layer 2 switch and notices that a %CDP-4-
DUPLEX_MISMATCH message keeps appearing for port G0/5. What command
should the technician issue on the switch to start the troubleshooting process?
show cdp neighbors
show ip interface brief
show interface g0/5
show cdp
202. Which virtual resource would be installed on a network server to provide direct
access to hardware resources?
VMware Fusion
a management console
a dedicated VLAN
a Type 1 hypervisor
Explanation: Type 1 hypervisors, the hypervisor is installed directly on the server
or networking hardware. Then, instances of an OS are installed on the
hypervisor, as shown in the figure. Type 1 hypervisors have direct access to the
hardware resources. Therefore, they are more efficient than hosted architectures.
Type 1 hypervisors improve scalability, performance, and robustness.
203. Refer to the exhibit. A network administrator has configured a standard ACL
to permit only the two LAN networks attached to R1 to access the network that
connects to R2 G0/1 interface. When following the best practices, in what location
should the standard ACL be applied?
Enterprise Networking, Security, and Automation ( Version 7.00) – ENSA Final Exam
R2 G0/1 inbound
R2 S0/0/1 outbound
R1 S0/0/0 outbound
R2 G0/1 outbound
R2 G0/0 outbound
204. Which OSPF database is identical on all converged routers within the same
OSPF area?
neighbor
forwarding
link-state
adjacency
Explanation: Regardless of which OSPF area a router resides in, the adjacency
database, routing table, and forwarding database are unique for each router. The
link-state database lists information about all other routers within an area and is
identical across all OSPF routers participating in that area.
205. What are two features to consider when creating a named ACL? (Choose two.)
Use alphanumeric characters if needed.
Use special characters, such as ! or * to show the importance of the ACL.
Modify the ACL using a text editor.
Be descriptive when creating the ACL name.
Use a space for ease of reading to separate the name from the description
Explanation: The following summarizes the rules to follow for named ACLs:
Assign a name to identify the purpose of the ACL.
Names can contain alphanumeric characters.
Names cannot contain spaces or punctuation.
It is suggested that the name be written in CAPITAL LETTERS.
Entries can be added or deleted within the ACL.
206. Match the RESTful API method to CRUD function.
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer. If the question is not here, find it
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
The switch will add the address 0800.069d.3841 to the MAC address table.
The switch will send the frame to ports Fa0/4 and Fa0/6.
The switch will flood the frame out all ports except port Fa0/8.
The switch will send the frame to port Fa0/6.
The switch will add the address 6400.6151.6821 to the MAC address table.
Explanation: Every frame that enters a switch is checked for new information to
learn. It does this by examining the source MAC address of the frame and port
number where the frame entered the switch:
If the source MAC address does not exist in the MAC address table, the MAC
address and incoming port number are added to the table.
5. A network engineer is giving a tour of the company network operations center to
a college class. The engineer is trying to describe how a WAN and connectivity to
the internet relate to the network infrastructure. Which statement correctly
describes network infrastructure and network communication?
Communication across the internet requires application of recognized
technologies and standards.
LANs are used to connect WANs around the world.
A LAN connects small networks to large global networks.
The internet is a worldwide collection of interconnected networks owned by
an organization.
Explanation:The internet is not owned by any individual or group. Ensuring
effective communication across this diverse infrastructure requires the
application of consistent and commonly recognized technologies and standards
as well as the cooperation of many network administration agencies.
6. A network engineer is designing a borderless switched network in a hierarchical
fashion. Which guideline might cause the engineer to implement a three-tier layer
model?
Fault isolation is one of the primary purposes of the distribution layer.
Access layer L2 switches connect to distribution layer L3 switches, which
implement routing, quality of service, and security.
The core layer provides differentiated services to various classes of service
applications at the edge of the network.
The access layer provides aggregation of Layer 2 broadcast domains.
Explanation:The access layer represents the network edge, where traffic enters
or exits the campus network. Traditionally, the primary function of an access
layer switch is to provide network access to the user. Access layer switches
connect to distribution layer switches, which implement network foundation
technologies such as routing, quality of service, and security.
7. Two students are discussing routers and one statement that is said between them
is accurate. Which statement is that?
A directly-connected network is automatically added to the routing table of an
adjacency neighbor if both routers are Cisco routers.
A gateway of last resort is added to the routing table when the router boots
up.
Remote networks can only be added after they are learned by routers
through dynamic routing protocols.
A default route provides a way for packets that do not match a specific route in
the routing table to be forwarded.
8. What are two benefits of using virtualization? (Choose two.)
The operating system of the virtual machine does not require licensing when
it is virtualized.
The virtual machine is no longer dependent on a specific hardware platform.
Because all virtual operating systems are contained within a single virtual
network, networking connections are simplified.
The performance of a virtual machine is faster than the performance of the
operating system running on physical hardware.
Multiple virtual machines can be running simultaneously on a single physical
device.
9. Students in a data networking class are reviewing materials in preparation for a
quiz. Which statement describes the operation of an access control method for
shared network media?
The controlled-based access method, used on legacy bus-topology Ethernet
LANs, decided the order of each device to transmit.
In the CSMA/CD method, when two devices transmit at the same time, a
collision is detected and data is resent immediately.
The CSMA/CA method attempts to avoid collisions by having each device
informing others how long the media will be unavailable.
In a contention-based multiaccess network, each node has its own time to
use the medium.
Explanation:CMSA/CA does not detect collisions but attempts to avoid them by
waiting before transmitting. Each device that transmits includes the time duration
that it needs for the transmission. All other wireless devices receive this
information and know how long the medium will be unavailable.
10. A network administrator is designing an IPv4 addressing scheme and requires
these subnets.
1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts
Which combination of subnets and masks will provide the best addressing plan for
these requirements?
9 subnets of 126 hosts with a 255.255.255.128 mask
3 subnets of 126 hosts with a 255.255.255.192 mask
6 subnets of 30 hosts with a 255.255.255.240 mask
3 subnets of 126 hosts with a 255.255.255.128 mask
6 subnets of 30 hosts with a 255.255.255.224 mask
1 subnet of 126 hosts with a 255.255.255.192 mask
2 subnets of 80 hosts with a 255.255.255.224 mask
6 subnets of 30 hosts with a 255.255.255.240 mask
Reference: VLSM Calculator Online
IPv4 subnets that require 100 and 80 hosts are provided by creating subnets of
126 usable addresses, each of which requires 7 host bits. The resulting mask is
255.255.255.128.
Subnets that require 30 and 20 hosts are provided by creating subnets of 30
usable addresses, each of which requires 5 host bits. The resulting mask is
255.255.255.224.
Creating nine subnets, each consisting of 126 usable addresses, would waste
large numbers of addresses in the six smaller subnets.
11. A group of network technicians is discussing IPv6 multicast processes. What is a
feature of one type of IPv6 multicast address that should be discussed?
A solicited-node multicast address is similar to the all-routers multicast address.
It can be a source or a destination address.
It has the prefix fe00::/8.
The all-nodes multicast group has the same effect as an IPv4 broadcast
address.
12. Which LAN attack allows for identification of connected Cisco devices which are
sending unencrypted broadcasts?
STP attack
CDP reconnaissance
ARP attack
address spoofing attack
13. What is a characteristic of the REST API?
evolved into what became SOAP
most widely used API for web services
used for exchanging XML structured information over HTTP or SMTP
considered slow, complex, and rigid
14. A network administrator is using the Cisco DNA Center to monitor network
health and to troubleshoot network issues. Which area should the administrator use
to perform these tasks?
ASSURANCE
PROVISION
PLATFORM
POLICY
15. Which term describes the process of managing configuration changes of network
devices in an orderly fashion?
version control
orchestration
automation
provisioning
Explanation: Configuration management tools typically include automation and
orchestration. Automation is automatically performing a task on a system.
Arranging the automated tasks into a coordinated process or workflow is called
orchestration.
16. Which function of the Cisco intent-based networking system (IBNS) enables
network operators to express the expected networking behavior that will best
support the business intent?
ACL analysis
assurance
activation
translation
Explanation: The translation feature of Cisco IBNS enables network operators to
express the expected network behavior that will best support the business intent.
17. Which type of API would be used to allow authorized salespeople of an
organization access to internal sales data from their mobile devices?
private
partner
public
open
18. Refer to the exhibit. In the displayed JSON data representation, which symbol
should be used to replace the question mark in lines 2 and 15?
square brackets [ ]
commas ,
double quotation marks ” “
braces { }
19. What action takes place when a frame entering a switch has a multicast
destination MAC address?
The switch will forward the frame out all ports except the incoming port.
The switch forwards the frame out of the specified port.
The switch adds a MAC address table entry mapping for the destination
MAC address and the ingress port.
The switch replaces the old entry and uses the more current port.
Explanation: If the destination MAC address is a broadcast or a multicast, the
frame is also flooded out all ports except the incoming port.
20. A network engineer is configuring secure remote access to a Cisco router. Which
two commands would be issued in the line configuration mode of the router to
implement SSH? (Choose two.)
login local
crypto key generate rsa
transport input ssh
username admin secret ccna
ip ssh version 2
21. When an end device requests services from a DHCPv4 server it receives a host
IPv4 address and a subnet mask. Which two other IPv4 addresses are also typically
provided to a DCHPv4 client? (Choose two.)
DNS server address
local HTTP web server address
LAN default gateway address
LAN NTP server address
automatic private IPv4 address
Explanation: LAN NTP server and local HTTP web server addresses are not
provided by DHCP. Automatic private IPv4 addresses (APIPA) are used by
DHCP clients when the clients fail to connect to a DHCPv4 server.
22. A network engineer wants to synchronize the time of a router with an NTP
server at the IPv4 address 209.165.200.225. The exit interface of the router is
configured with an IPv4 address of 192.168.212.11. Which global configuration
command should be used to configure the NTP server as the time source for this
router?
ntp peer 209.165.200.225
ntp server 192.168.212.11
ntp server 209.165.200.225
ntp peer 192.168.212.11
23. When testing a new web server, a network administrator cannot access the home
page when the server name is entered into a web browser on a PC. Pings to both the
IPv4 and IPv6 addresses of the server are successful. What could be the problem?
DNS is not resolving the server name to an IPv4 or IPv6 address.
ARP is not discovering the MAC address of the server.
DHCP has not assigned an IPv4 or IPv6 address to the server.
An FTP client must be installed on the PC.
24. A network engineer is using SNMP manager software to monitor and manage
network performance. In addition to polling network devices at regular time
intervals, the engineer is configuring the devices to generate messages that inform
the SNMP manager of specified events. What message type is configured on those
devices that allows them to send unsolicited messages?
set request
get-response
trap
get-bulk-request
Explanation: A network device stores information for SNMP in the MIB. This
information can be sent to the SNMP manager when specifically requested with a
get message. Unsolicited messages that are sent when pre-configured specified
events occur are trap messages.
25. A wireless network engineer is implementing updated wireless equipment within
the company. Which statement describes a wireless security protocol?
WPA secures the data using the Rivest Cipher 4 encryption method with a
static key.
WPA3-Personal uses 802.1X/EAP authentication that requires the use of a
192-bit cryptographic suite.
WPA2-Personal is intended for home or small office networks and uses
802.1X/EAP authentication.
WPA2-Enterprise is intended for enterprise networks and users must
authenticate using 802.1X standard.
26. Refer to the exhibit. Which access list configuration on router R1 will prevent
traffic from the 192.168.2.0 LAN from reaching the Restricted LAN while
permitting traffic from any other LAN?
10.0.0.0/8
128.107.0.0/16
192.168.2.0/24
192.168.1.0/24
172.16.40.0/24
64.100.0.0/16
43. The routing table of a Cisco router has four static routes for network 10.0.0.0.
Which route is the best match for a packet entering the router with a destination of
10.16.0.10?
S 10.0.0.0/16 is directly connected, GigabitEthernet 0/1
S 10.16.0.0/24 [1/0] via 202.16.0.2
S 10.16.0.0/16 is directly connected, GigabitEthernet 0/0
S 10.0.0.0/8 [1/0] via 202.16.0.2
44. Match the FHRP protocols to the appropriate description. (Not all options are
used.)
45. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
Which task has to be performed on Router 1 for it to establish an OSPF adjacency
with Router 2?
Issue the clear ip ospf process command.
Change the subnet mask of interface FastEthernet 0/0 to 255.255.255.0.
Remove the passive interface command from interface FastEthernet 0/0.
Add the network 10.0.1.0 0.0.0.255 area 0 command to the OSPF process.
Explanation: Each interface on the link connecting the OSPF routers must be in
the same subnet for an adjacency to be established. The IP address subnet
mask on FastEthernet interface 0/0 must be changed to 255.255.255.0. The
FastEthernet interface 0/0 is not passive. The 10.0.1.0/24 network is only
connected to Router2 so should not be advertised by Router1. The clear ip ospf
process command will start the OPSF process on Router1 but will not cause an
adjacency to be established if the subnet mask mismatch on the connecting
interfaces still exists.
46. What is the recommended Cisco best practice for configuring an OSPF-enabled
router so that each router can be easily identified when troubleshooting routing
issues?
Use the highest IP address assigned to an active interface participating in
the routing process.
Use a loopback interface configured with the highest IP address on the
router.
Use the highest active interface IP address that is configured on the router.
Configure a value using the router-id command.
Explanation: A Cisco router is assigned a router ID to uniquely identify it. It can
be automatically assigned and take the value of the highest configured IP
address on any interface, the value of a specifically-configured loopback
address, or the value assigned (which is in the exact form of an IP address)
using the router-id command. Cisco recommends using the router-id command.
47. In FHRP terminology, what represents a set of routers that present the illusion
of a single router to hosts?
standby router
forwarding router
default gateway
virtual router
Explanation: In FHRP multiple routers are configured to work together to present
to hosts a single gateway router. This single gateway router is a virtual router
which has a virtual IP address that is used by hosts as a default gateway.
48. A network administrator is configuring the SNMP function on a Cisco 3500
series WLC. The task is to add an SNMP trap server to which this WLC will
forward SNMP log messages. Which tab should the administrator use to add the
SNMP trap server information?
COMMANDS
MONITOR
MANAGEMENT
CONTROLLER
49. Match the STP port state with the appropriate description. (Not all options are
used.)
Explanation: The details of each port state are shown in the table.
The port is an alternate port and does not participate in frame forwarding. The port
receives BPDU frames to determine the location and root ID of the root bridge. BPDU
frames also determine which port roles each switch port should assume in the final
active STP topology. With a Max Age timer of 20 seconds, a switch port that has not
Blocking received an expected BPDU from a neighbor switch will go into the blocking state.
Listening After the blocking state, a port will move to the listening state. The port receives
Port State Description
BPDUs to determine the path to the root. The switch port also transmits its own BPDU
frames and informs adjacent switches that the switch port is preparing to participate in
the active topology.
A switch port transitions to the learning state after the listening state. During the
learning state, the switch port receives and processes BPDUs and prepares to
participate in frame forwarding. It also begins to populate the MAC address table.
Learning However, in the learning state, user frames are not forwarded to the destination.
In the forwarding state, a switch port is considered part of the active topology. The
Forwarding switch port forwards user traffic and sends and receives BPDU frames.
A switch port in the disabled state does not participate in spanning tree and does not
forward frames. The disabled state is set when the switch port is administratively
Disabled disabled.
50. Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the
same default priority and operating at the same bandwidth. Which three ports will
be STP designated ports? (Choose three.)
fa0/9
fa0/21
fa0/11
fa0/10
fa0/20
fa0/13
51. Refer to the exhibit. A network technician issues the command show vlan to
verify the VLAN configuration. Based on the output, which port should be assigned
with native VLAN?
Fa0/12
Fa0/20
Fa0/24
Gig0/1
52. What is the purpose of setting the native VLAN separate from data VLANs?
The native VLAN is for routers and switches to exchange their management
information, so it should be different from data VLANs.
A separate VLAN should be used to carry uncommon untagged frames to avoid
bandwidth contention on data VLANs.
The native VLAN is for carrying VLAN management traffic only.
The security of management frames that are carried in the native VLAN can
be enhanced.
Explanation: When a Cisco switch trunk port receives untagged frames (unusual
in well-designed networks), it forwards these frames to the native VLAN. When
the native VLAN is moved away from data VLANs, those untagged frames will
not compete for bandwidth in the data VLANs. The native VLAN is not designed
for carrying management traffic, but rather it is for backward compatibility with
legacy LAN scenarios.
53. Which is a characteristic of EtherChannel?
EtherChannel uses physical ports that have been upgraded to provide a faster
connection.
EtherChannel configuration is applied to each physical port.
STP treats all interfaces in an EtherChannel bundle as a single logical link.
STP will not block redundant EtherChannel bundles between two switches.
54. What characteristic describes how data or voice VLANs are configured on a
network?
Voice VLANs are configured on a trunk link between the IP phone and the
switch.
A switch port that has been configured in access mode can only belong to one
data VLAN at a time.
The switchport access vlan command must specify a VLAN currently
configured in the vlan.dat file
Data and voice VLANs have a different value range for VLAN IDs.
55. What are two load-balancing methods in the EtherChannel technology? (Choose
two.)
combination of source port and IP to destination port and IP
source IP to destination IP
source port to destination port
combination of source MAC and IP to destination MAC and IP
source MAC to destination MAC
Explanation: Depending on the hardware platform, one or more load-balancing
methods can be implemented. These methods include source MAC to
destination MAC load balancing or source IP to destination IP load balancing,
across the physical links.
56. A network administrator is configuring a WLAN with WPA2 Enterprise on a
Cisco 3500 series WLC. Client authentications will be handled by a RADIUS server.
Which tab should the administrator use to add the RADIUS server information?
WIRELESS
SECURITY
WLANs
MANAGEMENT
57. An administrator issues the show vlan brief command on a Cisco switch and the
output shows that all ports are currently assigned to the default VLAN. What
conclusion can be drawn?
Layer 2 control traffic is not associated with any VLAN.
The switch cannot be remotely managed using Telnet or SSH until a
management VLAN has been created.
All user data traffic will be separated and secured from other users.
There is a security risk because the management VLAN and the native VLAN
are the same.
58. If no bridge priority is configured in PVST, which criteria is considered when
electing the root bridge?
highest IP address
lowest IP address
lowest MAC address
highest MAC address
Explanation: Only one switch can be the root bridge for a VLAN. The root bridge
is the switch with the lowest BID. The BID is determined by priority and the MAC
address. If no priority is configured then all switches use the default priority and
the election of the root bridge will be based on the lowest MAC address.
59. Refer to the exhibit. A network administrator issues the show lldp neighbors
command to display information about neighboring devices. What can be
determined based on the information?
LACP
STP
DTP
PAGP
86. A network administrator is considering whether PoE features are required in a
specific network installation. Which option provides valid information about PoE?
The PoE pass-through feature is only supported by the Cisco Catalyst 3560-
C Series compact switch model or higher.
Any switch port can be configured with IOS commands to function as a PoE
port.
PoE allows the switch to deliver power to a device over the existing power
grid.
It can be used by IP phones, allowing them to be installed anywhere that there
is an Ethernet cable.
87. How are network data transmissions calculated?
goodput + traffic overhead = throughput
goodput + latency = bandwidth
throughput + goodput = bandwidth
throughput + latency = goodput
88. Refer to the exhibit. A corporate network is using NTP to synchronize the time
across devices. What can be determined from the displayed output?
The interface on Router03 that connects to the time sever has the IPv4
address 209.165.200.225.
Router03 is a stratum 2 device that can provide NTP service to other devices in
the network.
The time on Router03 may not be reliable because it is offset by more than 7
seconds to the time server.
Router03 time is synchronized to a stratum 2 time server.
89. Refer to the exhibit. Which source address is being used by router R1 for
packets being forwarded to the Internet?
10.6.15.2
198.51.100.3
209.165.200.225
209.165.202.141
90. A user is reading a book from the website
https://www.books-info.com/author50/book1.html#page150 . Which term is used to
describe the component http://www.books-info.com/author50/book1.html ?
URL
URI
fragment
URN
protocol
91. What are three components used in the query portion of a typical RESTful API
request? (Choose three.)
resources
key
API server
format
parameters
protocol
92. Which two configuration management tools are developed using Python?
(Choose two.)
Puppet
Chef
Ansible
SaltStack
NETCONF
93. What characteristic completes the following statement? When an IPv6 static
route is configured, and traffic is to be directed to one specific server, the static
route requires …
the next-hop address of two different adjacent routers.
a destination host route with a /128 prefix.
an administrative distance of 2.
the show ipv6 route static command.
94. When two or more routes to the same destination are learned from different
routing protocols, what does a router use to choose between the routes?
hop count
administrative distance
cost
metric
95. Which LAN attack enables traffic from one VLAN to be seen by another VLAN
without the aid of a router?
VLAN hopping attack
ARP attack
DHCP spoofing attack
DHCP starvation attack
96. What are the three categories of tools that can be used in IP networks to
implement QoS? (Choose three.)
classification and marking
integrated services
congestion management
differentiated services
congestion avoidance
best effort
97. Which is a QoS model that a network engineer would implement to ensure a
source to destination quality of service standard for a specified data flow?
differentiated services
integrated services
low latency queuing
class-based weighted fair queuing
best effort
Explanation: Best effort is the default packet forwarding design and provides no
QoS. The differentiated services model enforces and applies QoS mechanisms
on a hop-by-hop basis, not source to destination. Class-based weighted fair
queuing and low latency queuing are queuing algorithms.
98. A network engineer is configuring a Cisco switch when this message is displayed.
A = 209.165.201.2
A = 10.1.0.13
B = 209.165.201.7
B = 10.0.254.5
B = 209.165.201.1
Explanation: Static NAT is a one-to-one mapping between an inside local
address and an inside global address. By using static NAT, external devices can
initiate connections to internal devices by using the inside global addresses. The
NAT devices will translate the inside global address to the inside local address of
the target host.
130. In computer network communications which data transfer process does the
application layer protocol FTP use?
client-server
server message block
peer-to-peer
Gnutella
131. What action takes place when a frame entering a switch has a broadcast
destination MAC address?
The switch adds a MAC address table entry mapping for the destination
MAC address and the ingress port.
The switch replaces the old entry and uses the more current port.
The switch will forward the frame out all ports except the incoming port.
The switch forwards the frame out of the specified port.
132. Which LAN attack involves sending unsolicited ARP replies, with the MAC
Address of the threat actor and the IP address of the default gateway, to other hosts
on a subnet?
ARP attack
address spoofing attack
DHCP starvation attack
DHCP spoofing attack
133. A network engineer is examining the configuration of a router and notices that
interface Gi0/0 has been configured with the ip address dhcp command. Which
statement describes the IP address condition of this interface?
The router interface is configured as a DHCPv4 client.
The router is configured as a DHCPv4 server.
No IP address is required for this interface to operate.
The interface will use an IPv6 address instead of an IPv4 address.
134. What term describes holding packets in memory until resources become
available to transmit them?
playout delay
queuing
queuing delay
low latency queuing (LLQ)
weighted fair queuing (WFQ)
135. What defines a two-tier spine-leaf topology?
Everything is two hops from everything else.
The spine tier can be implemented with Cisco Nexus 9500 switches
connected to each other and to the leaf switches.
The APIC controller manipulates the data path directly.
The Cisco APICs and all other devices in the network physically attach to
leaf switches.
Explanation: In this two-tier topology, everything is one hop from everything else.
The leaf switches (Cisco Nexus 9300) always attach to the spines (Cisco Nexus
9500), but never to each other. Similarly, the spine switches only attach to the
leaf and core switches. The Cisco APICs and all other devices in the network
physically attach to leaf switches. When compared to SDN, the APIC controller
does not manipulate the data path directly.
136. What characteristic completes the following statement?
When an IPv6 static route is configured, as a default route, the destination network
is …
the next-hop address of two different adjacent routers.
a directly connected multiaccess network.
::/0.
the “ipv6 unicast-routing” command.
137. Which LAN attack involves a rogue server connected to the network providing
false IP configuration parameters to legitimate clients?
ARP attack
DHCP starvation attack
VLAN double-tagging attack
DHCP spoofing attack
Case 2:
DHCP starvation attack
ARP attack
address spoofing attack
STP attack
138. What term describes a process where a router simply discards any packet that
arrives at the end of a queue that has completely used up its packet-holding
resources?
latency
bandwidth
tail drop
jitter
congestion
139. What term describes adding a value to the packet header, as close to the source
as possible, so that the packet matches a defined policy?
policing
traffic marking
weighted random early detection (WRED)
traffic shaping
tail drop
140. What action takes place when the source MAC address of a frame entering a
switch is in the MAC address table?
The switch forwards the frame out of the specified port.
The switch updates the refresh timer for the entry.
The switch replaces the old entry and uses the more current port.
The switch adds a MAC address table entry for the destination MAC address
and the egress port.
141. What action takes place when a frame entering a switch has a unicast
destination MAC address that is not in the MAC address table?
The switch updates the refresh timer for the entry.
The switch resets the refresh timer on all MAC address table entries.
The switch replaces the old entry and uses the more current port.
The switch will forward the frame out all ports except the incoming port.
142. Which LAN attack prevents hosts from obtaining dynamically assigned IP
addresses?
DHCP spoofing attack
DHCP starvation attack
ARP attack
VLAN double-tagging attack