Soal Netacad Raider
Soal Netacad Raider
Which design feature will limit the size of a failure domain in an enterprise
network?
the purchase of enterprise equipment that is designed
for large traffic volume
the installation of redundant power supplies
the use of a collapsed core design
the use of the building switch block approach
Explanation: In order to best limit the of a failure domain, routers
or multilayer switches can be deployed in pairs. The failure of a
single device should not cause the network to go down. Installing
redundant power supplies may protect a single device from a
power failure, but if that device suffers from another type of
problem, a redundant device would have been a better solution.
Purchasing enterprise equipment that handles large flows of
traffic will not provide extra reliability in times of an outage. If a
collapsed core design is used, the core and distribution are
collapsed into a single device, increasing the chance of a
devastating outage.
Which two things should a network administrator modify on a router to perform
password recovery? (Choose two.)
the system image file
the NVRAM file system
the configuration register value
the startup configuration file
system ROM
What type of network uses one common infrastructure to carry voice, data, and
video signals?
borderless
converged
managed
switched
Explanation: A converged network has only one physical network
to install and manage. This results in substantial savings over
the installation and management of separate voice, video, and
data networks.
What are three advantages of using private IP addresses and NAT? (Choose three)
hides private LAN addressing from outside devices that are connected to
the Internet
permits LAN expansion without additional public IP addresses
reduces CPU usage on customer routers
creates multiple public IP addresses
improves the performance of the router that is
connected to the Internet
conserves registered public IP addresses
Explanation: Private IP addresses are designed to be exclusively
used for internal networks and they cannot be used on the
Internet. Thus they are not visible directly from the Internet and
they can be used freely by network administrators for internal
networks. In order for the internal hosts to access the Internet,
NAT is used to translate between private and public IP
addresses. NAT takes an internal private IP address and
translates it to a global public IP address before the packet is
forwarded.
Which two scenarios are examples of remote access VPNs? (Choose two.)
All users at a large branch office can access company
resources through a single VPN connection.
A small branch office with three employees has a Cisco
ASA that is used to create a VPN connection to the HQ.
A toy manufacturer has a permanent VPN connection to
one of its parts suppliers.
A mobile sales agent is connecting to the company network via the
Internet connection at a hotel.
An employee who is working from home uses VPN client software on a
laptop in order to connect to the company network.
Explanation: Remote access VPNs connect individual users to
another network via a VPN client that is installed on the user
device. Site-to-site VPNs are “always on” connections that use
VPN gateways to connect two sites together. Users at each site
can access the network on the other site without having to use
any special clients or configurations on their individual devices.
6. What are three benefits of cloud computing? (Choose three.)
It utilizes end-user clients to do a substantial amount of
data preprocessing and storage.
It uses open-source software for distributed processing of
large datasets.
It streamlines the IT operations of an organization by subscribing only to
needed services.
It enables access to organizational data anywhere and at any time.
It turns raw data into meaningful information by
discovering patterns and relationships.
It eliminates or reduces the need for onsite IT equipment, maintenance, and
management.
What is a WAN?
9. A network administrator has been tasked with creating a disaster recovery plan.
As part of this plan, the administrator is looking for a backup site for all of the data
on the company servers. What service or technology would support this
requirement?
data center
virtualization
dedicated servers
software defined networking
10. Which type of OSPF packet is used by a router to discover neighbor routers and
establish neighbor adjacency?
link-state update
hello
database description
link-state request
ISDN
DSL
cable
dialup
13. A customer needs a metropolitan area WAN connection that provides high-
speed, dedicated bandwidth between two sites. Which type of WAN connection
would best fulfill this need?
packet-switched network
Ethernet WAN
circuit-switched network
MPLS
Explanation: MPLS can use a variety of underlying technologies
such as T- and E-Carriers, Carrier Ethernet, ATM, Frame Relay,
and DSL, all of which support lower speeds than an Ethernet
WAN. Neither a circuit-switched network, such as the public
switched telephone network (PSTN) or Integrated Service Digital
Network (ISDN), nor a packet-switched network, is considered
high speed.
A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use debuggers?
15. Consider the following output for an ACL that has been applied to a router via
the access-class in command. What can a network administrator determine from the
output that is shown?
R1#
What command would be used as part of configuring NAT or PAT to clear dynamic
entries before the timeout has expired?
clear ip dhcp
clear ip nat translation
clear access-list counters
clear ip pat statistics
Refer to the exhibit. A technician is configuring R2 for static NAT to allow the client
to access the web server. What is a possible reason that the client PC cannot access
the web server?
online collaboration
BYOD
virtualization
maintaining communication integrity
Explanation: Virtualization technology can run several different
operating systems in parallel on a single CPU.
Refer to the exhibit. Which address or addresses represent the inside global
address?
192.168.0.100
10.1.1.2
any address in the 10.1.1.0 network
209.165.20.25
22. Which two IPsec protocols are used to provide data integrity?
MD5
DH
AES
SHA
RSA
Explanation: The IPsec framework uses various protocols and
algorithms to provide data confidentiality, data integrity,
authentication, and secure key exchange. Two popular
algorithms used to ensure that data is not intercepted and
modified (data integrity) are MD5 and SHA. AES is an encryption
protocol and provides data confidentiality. DH (Diffie-Hellman) is
an algorithm used for key exchange. RSA is an algorithm used for
authentication.
If an outside host does not have the Cisco AnyConnect client preinstalled, how
would the host gain access to the client image?
Explanation: The first two lines of the ACL allow host 10.0.70.23
FTP access to the server that has the IP address of 10.0.54.5.
The next line of the ACL allows HTTP access to the server from
any host that has an IP address that starts with the number 10.
The fourth line of the ACL denies any other type of traffic to the
server from any source IP address. The last line of the ACL
permits anything else in case there are other servers or devices
added to the 10.0.54.0/28 network. Because traffic is being
filtered from all other locations and for the 10.0.70.23 host
device, the best place to put this ACL is closest to the server.
Refer to the exhibit. If the network administrator created a standard ACL that
allows only devices that connect to the R2 G0/0 network access to the devices on the
R1 G0/1 interface, how should the ACL be applied?
inbound on the R2 G0/0 interface
outbound on the R1 G0/1 interface
inbound on the R1 G0/1 interface
outbound on the R2 S0/0/1 interface
Explanation: Because standard access lists only filter on the
source IP address, they are commonly placed closest to the
destination network. In this example, the source packets will be
coming from the R2 G0/0 network. The destination is the R1 G0/1
network. The proper ACL placement is outbound on the R1 G0/1
interface.
29. Which is a characteristic of a Type 2 hypervisor?
does not require management console software
has direct access to server hardware resources
best suited for enterprise environments
installs directly on hardware
Explanation: Type 2 hypervisors are hosted on an underlaying
operating system and are best suited for consumer applications
and those experimenting with virtualization. Unlike Type 1
hypervisors, Type 2 hypervisors do not require a management
console and do not have direct access to hardware.
30. What are the two types of VPN connections? (Choose two.)
PPPoE
Frame Relay
site-to-site
remote access
leased line
Explanation: PPPoE, leased lines, and Frame Relay are types of
WAN technology, not types of VPN connections.
Refer to the exhibit. What three conclusions can be drawn from the displayed
output? (Choose three)
32. Refer to the exhibit. A network administrator is configuring an ACL to limit the
connection to R1 vty lines to only the IT group workstations in the network
192.168.22.0/28. The administrator verifies the successful Telnet connections from a
workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after
the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the
cause of the connection failure?
CPE —> devices and inside wiring that are located on the
enterprise edge and connect to a carrier link
DCE —> devices that provide an interface for customers to
connect to within the WAN cloud
DTE —> customer devices that pass the data from a customer
network for transmission over the WAN
local loop —> a physical connection from the customer to the
service provider POP
38. Which statement describes a characteristic of standard IPv4 ACLs?
They filter traffic based on source IP addresses only.
They can be created with a number but not with a name.
They are configured in the interface configuration mode.
They can be configured to filter traffic based on both
source IP addresses and source ports.
Explanation: A standard IPv4 ACL can filter traffic based on source
IP addresses only. Unlike an extended ACL, it cannot filter traffic
based on Layer 4 ports. However, both standard and extended
ACLs can be identified with either a number or a name, and both
are configured in global configuration mode.
Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the
configuration?
782
74
128
65
50. What is one reason to use the ip ospf priority command when the OSPF routing
protocol is in use?
to activate the OSPF neighboring process
to influence the DR/BDR election process
to provide a backdoor for connectivity during the
convergence process
to streamline and speed up the convergence process
Explanation: The OSPF priority can be set to a number between 0
and 255. The higher the number set, the more likely the router
becomes the DR. A priority 0 stops a router from participating in
the election process and the router does not become a DR or a
BDR.
51. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32
0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of
172.18.20.40, and a protocol of 21 is received on the interface, is the packet
permitted or denied?
permitted
52. What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI
fabric architecture?
The spine and leaf switches are always linked through
core switches.
The spine switches attach to the leaf switches and
attach to each other for redundancy.
The leaf switches always attach to the spines and they
are interlinked through a trunk line.
The leaf switches always attach to the spines, but they never attach to
each other.
53. Which two scenarios would result in a duplex mismatch? (Choose two.)
connecting a device with autonegotiation to another that is manually set
to full-duplex
starting and stopping a router interface during a normal
operation
connecting a device with an interface running at 100
Mbps to another with an interface running at 1000 Mbps
configuring dynamic routing incorrectly
manually setting the two connected devices to different duplex modes
54. A network technician is configuring SNMPv3 and has set a security level of
auth . What is the effect of this setting?
authenticates a packet by a string match of the
username or community string
authenticates a packet by using either the HMAC with MD5 method or
the SHA method
authenticates a packet by using either the HMAC MD5 or
3.HMAC SHA algorithms and encrypts the packet with
either the DES, 3DES or AES algorithms
authenticates a packet by using the SHA algorithm only
Explanation: For enabling SNMPv3 one of three security levels can
be configured:
1) noAuth
2) auth
3) priv
The security level configured determines which security
algorithms are performed on SNMP packets. The auth security
level uses either HMAC with MD5 or SHA.
55. What are two types of attacks used on DNS open resolvers? (Choose two.)
amplification and reflection
resource utilization
fast flux
ARP poisoning
cushioning
Explanation: Three types of attacks used on DNS open resolvers
are as follows:DNS cache poisoning – attacker sends spoofed
falsified information to redirect users from legitimate sites to
malicious sites
DNS amplification and reflection attacks – attacker sends an
increased volume of attacks to mask the true source of the
attack
DNS resource utilization attacks – a denial of service (DoS)
attack that consumes server resources
56. An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
access-list 101 permit udp 192.168.100.0 0.0.2.255
64.100.40.0 0.0.0.15 eq telnet .
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2
Explanation: Traffic should be classified and marked as close to its
source as possible. The trust boundary identifies at which device
marked traffic should be trusted. Traffic marked on VoIP phones
would be considered trusted as it moves into the enterprise
network.
71. What are two benefits of extending access layer connectivity to users through a
wireless medium? (Choose two.)
reduced costs
decreased number of critical points of failure
increased flexibility
increased bandwidth availability
increased network management options
Explanation: Wireless connectivity at the access layer provides
increased flexibility, reduced costs, and the ability to grow and
adapt to changing business requirements. Utilizing wireless
routers and access points can provide an increase in the number
of central points of failure. Wireless routers and access points
will not provide an increase in bandwidth availability.
72. What are two purposes of launching a reconnaissance attack on a network?
(Choose two.)
to scan for accessibility
to retrieve and modify data
to gather information about the network and devices
to prevent other users from accessing the system
to escalate access privileges
Explanation: Gathering information about a network and scanning
for access is a reconnaissance attack. Preventing other users
from accessing a system is a denial of service attack.
Attempting to retrieve and modify data, and attempting to
escalate access privileges are types of access attacks.
73. A group of users on the same network are all complaining about their computers
running slowly. After investigating, the technician determines that these computers
are part of a zombie network. Which type of malware is used to control these
computers?
botnet
spyware
virus
rootkit
Explanation: A botnet is a network of infected computers called a
zombie network. The computers are controlled by a hacker and
are used to attack other computers or to steal data.
permitted
denied
75. Refer to the exhibit. From which location did this router load the IOS?
flash memory
NVRAM?
RAM
ROM
a TFTP server?
Refer to the exhibit. Which data format is used to represent the data for network
automation applications?
XML
YAML
HTML
JSON
classifying
shaping
queuing
policing
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS
treatment, which congestion avoidance technique is used?
traffic shaping
weighted random early detection
classification and marking
traffic policing
Explanation: Traffic shaping buffers excess packets in a queue and
then forwards the traffic over increments of time, which creates
a smoothed packet output rate. Traffic policing drops traffic
when the amount of traffic reaches a configured maximum rate,
which creates an output rate that appears as a saw-tooth with
crests and troughs.
denied
permitted
Refer to the exhibit. What is the purpose of the command marked with an arrow
shown in the partial configuration output of a Cisco broadband router?
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many
ACLs could be created and applied to it?
12
4
8
16
6
Explanation: In calculating how many ACLs can be configured, use
the rule of “three Ps”: one ACL per protocol, per direction, per
interface. In this case, 2 interfaces x 2 protocols x 2 directions
yields 8 possible ACLs.
Router(config-ext-nacl)# no 20
Which two conclusions can be drawn from this new configuration? (Choose two.)
Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is
unable to access the Internet. The administrator tries to ping a server on the
Internet from PC-A and collects the debugs that are shown in the exhibit. Based on
this output, what is most likely the cause of the problem?
Why is QoS an important issue in a converged network that combines voice, video,
and data communications?
What is the final operational state that will form between an OSPF DR and a
DROTHER once the routers reach convergence?
loading
established
full
two-way
Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF
adjacencies, which routers will become the new DR and BDR?
Router R3 will become the DR and router R1 will become the BDR.
Router R4 will become the DR and router R3 will become
the BDR.
Router R1 will become the DR and router R2 will become
the BDR.
Router R3 will become the DR and router R2 will become
the BDR.
Explanation: OSPF elections of a DR are based on the following in
order of precedence:
highest pritority from 1 -255 (0 = never a DR)
highest router ID
highest IP address of a loopback or active interface in
the absence of a manually configured router ID.
Loopback IP addresses take higher precedence than
other interfaces.
In this case routers R3 and R1 have the highest router priority.
Between the two, R3 has the higher router ID. Therefore, R3 will
become the DR and R1 will become the BDR.
Case 2:
Enterprise Networking, Security, and Automation (Version 7.00) – ENSA Final Exam
Router R2 will become the DR and router R4 will become
the BDR.
Router R1 will become the DR and router R3 will become the BDR.
Router R4 will become the DR and router R3 will become
the BDR.
Router R3 will become the DR and router R2 will become
the BDR.
Which type of server would be used to keep a historical record of messages from
monitored network devices?
DNS
print
DHCP
syslog
authentication
Explanation: A syslog server is used as a centralized location for
logged messages from monitored network devices.
95. When QoS is implemented in a converged network, which two factors can be
controlled to improve network performance for real-time traffic? (Choose two.)
packet addressing
delay
jitter
packet routing
link speed
Explanation: Delay is the latency between a sending and receiving
device. Jitter is the variation in the delay of the received
packets. Both delay and jitter need to be controlled in order to
support real-time voice and video traffic.
96. In which step of gathering symptoms does the network engineer determine if the
problem is at the core, distribution, or access layer of the network?
Determine ownership.
Determine the symptoms.
Narrow the scope.
Document the symptoms.
Gather information.
Explanation: In the “narrow the scope” step of gathering
symptoms, a network engineer will determine if the network
problem is at the core, distribution, or access layer of the
network. Once this step is complete and the layer is identified,
the network engineer can determine which pieces of equipment
are the most likely cause.
97. What protocol sends periodic advertisements between connected Cisco devices in
order to learn device name, IOS version, and the number and type of interfaces?
CDP
SNMP
NTP
LLDP
98. An administrator is configuring single-area OSPF on a router. One of the
networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask
would the administrator use in the OSPF network statement?
0.0.0.127
0.0.0.31
0.0.3.255
0.0.0.63
i386046n1v2.gif
router ospf 1
network 192.168.10.0 area 0
router ospf 1
network 192.168.10.0
router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252
router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0
0.0.7.255
0.0.1.255
0.0.3.255
0.0.15.255
106. How does virtualization help with disaster recovery within a data center?
improvement of business practices
supply of consistent air flow
support of live migration
guarantee of power
Explanation: Live migration allows moving of one virtual server to
another virtual server that could be in a different location that is
some distance from the original data center.
Case 2:
Less energy is consumed.
Server provisioning is faster.
Hardware at the recovery site does not have to be identical to production
equipment.
Power is always provided.
Explanation: Improved disaster recovery – Virtualization offers
advanced business continuity solutions. It provides hardware
abstraction capability so that the recovery site no longer needs
to have hardware that is identical to the hardware in the
production environment. Most enterprise server virtualization
platforms also have software that can help test and automate the
failover before a disaster does happen.
107. How does virtualization help with disaster recovery within a data center?
Hardware does not have to be identical.
(Other case) Hardware at the recovery site does not have to be identical to
production equipment.
Power is always provided.
Less energy is consumed.
Server provisioning is faster.
Explanation: Disaster recovery is how a company goes about
accessing applications, data, and the hardware that might be
affected during a disaster. Virtualization provides hardware
independence which means the disaster recovery site does not
have to have the exact equipment as the equipment in
production. Server provisioning is relevant when a server is built
for the first time. Although data centers do have backup
generators, the entire data center is designed for disaster
recovery. One particular data center could never guarantee that
the data center itself would never be without power.
Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses
power?
S4 and PC_2
PC_3 and AP_2
AP_2 and AP_1
PC_3 and PC_2
S1 and S4
A failure domain is the area of a network that is impacted when a
critical device such as switch S3 has a failure or experiences
problems.
109. Which set of access control entries would allow all users on the 192.168.10.0/24
network to access a web server that is located at 172.17.80.1, but would not allow
them to use Telnet?
access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
Which step in the link-state routing process is described by a router building a link-
state database based on received LSAs?
115. What type of traffic is described as having a high volume of data per packet?
data
video
voice
116. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity
and capabilities of the host device to other connected network devices?
LLDP
NTP
TFTP
SNMP
117. Which step in the link-state routing process is described by a router running an
algorithm to determine the best path to each destination?
building the topology table
selecting the router ID
declaring a neighbor to be inaccessible
executing the SPF algorithm
Refer to the exhibit. Which conclusion can be drawn from this OSPF multiaccess
network?
XML
HTML
YAML
JSON
Explanation:
Common data formats that are used in many applications
including network automation and programmability include
these:
JavaScript Object Notation (JSON) – In JSON, the data known as
an object is one or more key/value pairs enclosed in braces { }.
Keys must be strings within double quotation marks ” “. Keys and
values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is
enclosed within a related set of tags data.
YAML Ain’t Markup Language (YAML) – In YAML, the data known
as an object is one or more key value pairs. Key value pairs are
separated by a colon without the use of quotation marks. YAML
uses indentation to define its structure, without the use of
brackets or commas.
An ACL is applied inbound on a router interface. The ACL consists of a single
entry:
access-list 101 permit udp 192.168.100.32 0.0.0.7 host
198.133.219.76 eq telnet .
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
137. What protocol is a vendor-neutral Layer 2 protocol that advertises the identity
and capabilities of the host device to other connected network devices?
NTP
LLDP
SNMP
MPLS
138. Which type of VPN uses a hub-and-spoke configuration to establish a full mesh
topology?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
139. What is a characteristic of the REST API?
evolved into what became SOAP
used for exchanging XML structured information over
HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services
141. A student, doing a summer semester of study overseas, has taken hundreds of
pictures on a smartphone and wants to back them up in case of loss. What service or
technology would support this requirement?
Cisco ACI
cloud services
software defined networking
dedicated servers
142. Consider the following access list that allows IP phone configuration file
transfers from a particular host to a TFTP server:
R1(config)# access-list 105 permit udp host 10.0.70.23 host
10.0.54.5 range 1024 5000
Which method would allow the network administrator to modify the ACL and
include FTP transfers from any source IP address?
R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
A.
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip access-group 5 out
B.
R1(config)# access-list 5 permit 10.0.54.0 0.0.1.255
C.
R1(config)# interface Serial0/0/0
R1(config-if)# ip access-group 5 in
D.
R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127
E.
R1(config)# access-list 5 permit any
A network administrator is writing a standard ACL that will deny any traffic from
the 172.16.0.0/16 network, but permit all other traffic. Which two commands should
be used? (Choose two.)
Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 172.16.0.0 255.255.255.255
Router(config)# access-list 95 deny any
Explanation: To deny traffic from the 172.16.0.0/16 network,
the access-list 95 deny 172.16.0.0 0.0.255.255 command is used. To permit
all other traffic, the access-list 95 permit any statement is added.
Refer to the exhibit. The company has decided that no traffic initiating from any
other existing or future network can be transmitted to the Research and
Development network. Furthermore, no traffic that originates from the Research
and Development network can be transmitted to any other existing or future
networks in the company. The network administrator has decided that extended
ACLs are better suited for these requirements. Based on the information given,
what will the network administrator do?
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
Explanation: In OSPFv2, a Cisco router uses a three-tier method to
derive its router ID. The first choice is the manually configured
router ID with the router-id command. If the router ID is not
manually configured, the router will choose the highest IPv4
address of the configured loopback interfaces. Finally if no
loopback interfaces are configured, the router chooses the
highest active IPv4 address of its physical interfaces.
163. Match the HTTP method with the RESTful operation.
164. Refer to the exhibit. A web designer calls to report that the web server web-
s1.cisco.com is not reachable through a web browser. The technician uses command
line utilities to verify the problem and to begin the troubleshooting process. Which
two things can be determined about the problem? (Choose two.)
167. What type of traffic is described as consisting of traffic that requires a higher
priority if interactive?
voice
data
video
168. Which type of VPN provides a flexible option to connect a central site with
branch sites?
IPsec virtual tunnel interface
MPLS VPN
dynamic multipoint VPN
GRE over IPsec
169. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use fuzzers?
to discover security vulnerabilities of a computer
to detect any evidence of a hack or malware in a
computer or network
to reverse engineer binary files when writing exploits
and when analyzing malware
to detect installed tools within files and directories that
provide threat actors remote access and control over a
computer or network
170. Refer to the exhibit. A network administrator has configured a standard ACL
to permit only the two LAN networks attached to R1 to access the network that
connects to R2 G0/1 interface, but not the G0/0 interface. When following the best
practices, in what location should the standard ACL be applied?
R1 S0/0/0 outbound
R2 G0/0 outbound
R2 S0/0/1 outbound
R1 S0/0/0 inbound
R2 G0/1 inbound
171. Two OSPF-enabled routers are connected over a point-to-point link. During
the ExStart state, which router will be chosen as the first one to send DBD packets?
the router with the highest router ID
the router with the lowest IP address on the connecting
interface
the router with the highest IP address on the connecting
interface
the router with the lowest router ID
Explain:In the ExStart state, the two routers decide which router
will send the DBD packets first. The router with the higher router
ID will be the first router to send DBD packets during the
Exchange state
172. Which step in the link-state routing process is described by a router sending
Hello packets out all of the OSPF-enabled interfaces?
exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies
Explanation: OSPF-enabled routers must recognize each other on
the network before they can share information. An OSPF-enabled
router sends Hello packets out all OSPF-enabled interfaces to
determine if neighbors are present on those links. If a neighbor is
present, the OSPF-enabled router attempts to establish a
neighbor adjacency with that neighbor.
173. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use forensic tools?
to obtain specially designed operating systems
preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a computer or network
to detect installed tools within files and directories that
provide threat actors remote access and control over a
computer or network
to reverse engineer binary files when writing exploits
and when analyzing malware
174. Refer to the exhibit. A network administrator has configured OSPFv2 on the
two Cisco routers but PC1 is unable to connect to PC2. What is the most likely
problem?
Interface Fa0/0 has not been activated for OSPFv2 on router R2.
Interface Fa0/0 is configured as a passive-interface on
router R2.
Interface S0/0 is configured as a passive-interface on
router R2.
Interface s0/0 has not been activated for OSPFv2 on
router R2.
Explanation: If a LAN network is not advertised using OSPFv2, a
remote network will not be reachable. The output displays a
successful neighbor adjacency between router R1 and R2 on the
interface S0/0 of both routers.
175. ABCTech is investigating the use of automation for some of its products. In
order to control and test these products, the programmers require Windows, Linux,
and MAC OS on their computers. What service or technology would support this
requirement?
dedicated servers
software defined networking
virtualization
Cisco ACI
176. A network engineer has noted that some expected network route entries are not
displayed in the routing table. Which two commands will provide additional
information about the state of router adjacencies, timer intervals, and the area ID?
(Choose two.)
show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
Explanation: The show ip ospf interface command will display
routing table information that is already known. The show
running-configuration and show ip protocols commands will
display aspects of the OSPF configuration on the router but will
not display adjacency state details or timer interval details.
177. Which type of VPN involves the forwarding of traffic over the backbone
through the use of labels distributed among core routers?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
178. Which type of VPN involves a nonsecure tunneling protocol being encapsulated
by IPsec?
SSL VPN
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface
179. A company has contracted with a network security firm to help identify the
vulnerabilities of the corporate network. The firm sends a team to perform
penetration tests to the company network. Why would the team use hacking
operation systems?
to detect any evidence of a hack or malware in a
computer or network
to obtain specially designed operating systems preloaded with tools
optimized for hacking
to encode data, using algorithm schemes, to prevent
unauthorized access to the encrypted data
to reverse engineer binary files when writing exploits
and when analyzing malware
180. What command would be used as part of configuring NAT or PAT to identify
an interface as part of the external global network?
ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside
181. To avoid purchasing new hardware, a company wants to take advantage of idle
system resources and consolidate the number of servers while allowing for multiple
operating systems on a single hardware platform. What service or technology would
support this requirement?
data center
cloud services
virtualization
dedicated servers
Explain: Server virtualization takes advantage of idle resources
and consolidates the number of required servers. This also
allows for multiple operating systems to exist on a single
hardware platform.
182. Which type of VPN routes packets through virtual tunnel interfaces for
encryption and forwarding?
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
183. Which step in the link-state routing process is described by a router flooding
link-state and cost information about each directly connected link?
building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route
184. What type of traffic is described as using either TCP or UDP depending on the
need for error recovery?
video
voice
data
185. Refer to the exhibit. The company CEO demands that one ACL be created to
permit email traffic to the internet and deny FTP access. What is the best ACL type
and placement to use in this situation?
194. What type of traffic is described as being able to tolerate a certain amount of
latency, jitter, and loss without any noticeable effects?
voice
video
data
195. What term describes adding a value to the packet header, as close to the source
as possible, so that the packet matches a defined policy?
policing
traffic marking
weighted random early detection (WRED)
traffic shaping
tail drop
196. Which three traffic-related factors would influence selecting a particular WAN
link type? (Choose three.)
cost of the link
amount of traffic
distance between sites
reliability
security needs
type of traffic
Explanation: The traffic-related factors that influence selecting a
particular WAN link type include the type of traffic, amount of
traffic, quality requirements, and security requirements. Quality
requirements include ensuring that traffic that cannot tolerate
delay gets priority treatment as well as important business
transactional traffic.
Corporate policy demands that access to the server network be restricted to internal
employees only. What is the best ACL type and placement to use in this situation
extended ACL outbound on R2 S0/0/1
standard ACL outbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting
to the internet
extended ACL inbound on R2 S0/0/0
201. A technician is working on a Layer 2 switch and notices that a %CDP-4-
DUPLEX_MISMATCH message keeps appearing for port G0/5. What command
should the technician issue on the switch to start the troubleshooting process?
show cdp neighbors
show ip interface brief
show interface g0/5
show cdp
202. Which virtual resource would be installed on a network server to provide direct
access to hardware resources?
VMware Fusion
a management console
a dedicated VLAN
a Type 1 hypervisor
Explanation: Type 1 hypervisors, the hypervisor is installed directly
on the server or networking hardware. Then, instances of an OS
are installed on the hypervisor, as shown in the figure. Type 1
hypervisors have direct access to the hardware resources.
Therefore, they are more efficient than hosted architectures.
Type 1 hypervisors improve scalability, performance, and
robustness.
203. Refer to the exhibit. A network administrator has configured a standard ACL
to permit only the two LAN networks attached to R1 to access the network that
connects to R2 G0/1 interface. When following the best practices, in what location
should the standard ACL be applied?
Enterprise Networking, Security, and Automation ( Version 7.00) – ENSA Final Exam
R2 G0/1 inbound
R2 S0/0/1 outbound
R1 S0/0/0 outbound
R2 G0/1 outbound
R2 G0/0 outbound
204. Which OSPF database is identical on all converged routers within the same
OSPF area?
neighbor
forwarding
link-state
adjacency
Explanation: Regardless of which OSPF area a router resides in,
the adjacency database, routing table, and forwarding database
are unique for each router. The link-state database lists
information about all other routers within an area and is identical
across all OSPF routers participating in that area.
205. What are two features to consider when creating a named ACL? (Choose two.)
Use alphanumeric characters if needed.
Use special characters, such as ! or * to show the
importance of the ACL.
Modify the ACL using a text editor.
Be descriptive when creating the ACL name.
Use a space for ease of reading to separate the name
from the description
Explanation: The following summarizes the rules to follow for
named ACLs:
Assign a name to identify the purpose of the ACL.
Names can contain alphanumeric characters.
Names cannot contain spaces or punctuation.
It is suggested that the name be written in CAPITAL LETTERS.
Entries can be added or deleted within the ACL.
206. Match the RESTful API method to CRUD function.
Match the RESTful API method to CRUD function.
207. What type of traffic is described as requiring at least 384 Kbps of bandwidth?
voice
data
video
208. Which step in the link-state routing process is described by a router inserting
best paths into the routing table?
declaring a neighbor to be inaccessible
executing the SPF algorithm
load balancing equal-cost paths
choosing the best route
209. Anycompany has decided to reduce its environmental footprint by reducing
energy costs, moving to a smaller facility, and promoting telecommuting. What
service or technology would support this requirement?
data center
virtualization
cloud services
dedicated servers
210. Which QoS technique smooths packet output rate?
policing
shaping
weighted random early detection
Integrated Services (IntServ)
marking
211. Refer to the exhibit. The company has provided IP phones to employees on the
192.168.10.0/24 network and the voice traffic will need priority over data traffic.
What is the best ACL type and placement to use in this situation?