Data Communications and Networking 4 (CISCO)

Data Communication & Networking 4 (CISCO)


Question 1

Complete
Mark 1.00 out of 1.00
Flag question

Question text

 This type of SDN uses a centralized controller that has knowledge of all devices in the network.

uestion 1

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.

Select one:

Question 2

Complete
Mark 0.00 out of 1.00
Flag question

Question text

 A newer and faster technology considered to be part of 4G technology.

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Internal BGP is the routing protocol used between routers in the same AS.

Select one:

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What TCP port is used by BGP to exchange messages between routers?

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?

Select one:

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.

Select one:

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which statement describes a characteristic of standard IPv4 ACLs?

Select one:

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

To verify the state of a GRE tunnel, use the show interface tunnel command.

Select one:

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

Select one:

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?

Select one:

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

 A general term for Internet services from a mobile phone or from any device that uses the same technology.

Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.

Select one:

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

Select one:

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

External BGP is the routing protocol used between routers in different autonomous systems.

Select one:

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What equipment at the cable service provider office connects the office to the subscriber locations?


Select one:

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?

Select one:

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is an advantage offered by GRE tunnels?

Select one:

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which statement describes a difference between the operation of inbound and outbound ACLs?

Select one:

Question 19

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.

Select one:

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?

Select one:

Question 19

Answer saved
Marked out of 1.00
Remove flag

Question text

PPP authentication is performed at which OSI layer?

Select one:

Question 14

Answer saved
Marked out of 1.00
Remove flag

Question text

With which layers of the OSI model do the PPP control protocols interface?

Select one:

Question 10

Answer saved
Marked out of 1.00
Remove flag

Question text

Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?

Select one:

Question 7

Answer saved
Marked out of 1.00
Remove flag

Question text

Which statement correctly describes a WAN technology?

Select one:

Question 6

Answer saved
Marked out of 1.00
Remove flag

Question text

A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?

Select one:

Question 4

Answer saved
Marked out of 1.00
Remove flag

Question text

What function does NCP perform in the establishment of a PPP session?

Select one:

Question 1

Answer saved
Marked out of 1.00
Remove flag

Question text

Which protocol is used by PPP to provide authentication and protection from playback attacks?

Select one:

Which term describes the data exchanges between virtual servers in a data center?

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?

Select one:

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is a characteristic of data flow processing in SDN?

Select one:

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.

Select one:

Question 6

Complete
Mark 0.00 out of 1.00
Flag question

Question text

This type of SDN uses a centralized controller that has knowledge of all devices in the network.

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.

Select one:

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?

Select one:

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is integrating many devices from different vendors with custom applications.

Select one:

Question 10

Complete
Mark 0.00 out of 1.00
Flag question

Question text

A  topology shows the physical layout of the devices connected to the network.

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A  is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.


Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which network traffic management technology is a basic element in SDN implementations?

Select one:

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Theis considered to be the brains of the ACI architecture. 

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

This is typically regarded as the brains of a device.

Question 15

Complete
Mark 0.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is  developing better routing protocols for new devices 

Select one:

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Atopology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

SDN is a network architecture that has been developed to virtualize the network. 

Select one:

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?

Select one:

Question 19

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.

Select one:

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?

Select one:

Question 21

Complete
Mark 1.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is securing new devices with varying level of security. 

Select one:

Question 22

Complete
Mark 0.00 out of 1.00
Flag question

Question text

  A network architecture that virtualizes the network.

Question 23

Complete
Mark 1.00 out of 1.00
Flag question

Question text

These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.


Question 24

Complete
Mark 0.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is increasing the CPU power of computers 

Select one:

Question 25

Complete
Mark 1.00 out of 1.00
Flag question

Question text

An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name?

Select one:

Question 26

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

Select one:

Question 27

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?

Select one:

Question 28

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.

Select one:

Question 29

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is an example of an M2M connection?

Select one:

Question 30

Complete
Mark 1.00 out of 1.00
Flag question

Question text

diagrams keep track of the location, function, and status of devices on the network.

Question 31

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When is the most appropriate time to measure network operations to establish a network performance baseline?

Select one:

Question 32

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which feature sends simulated data across the network and measures performance between multiple network locations?

Select one:

Question 33

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A purpose-built hardware solution for integrating cloud computing and data center management.

Question 34

Complete
Mark 1.00 out of 1.00
Flag question

Question text

For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?

Select one:

Question 35

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Thetransmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.

Question 36

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

Select one:

Question 37

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?

Select one:

Question 38

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?

Select one:

Question 39

Complete
Mark 1.00 out of 1.00
Flag question

Question text

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?

Select one:

Question 40

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.

Select one:

Question 41

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How many "things" are predicted to be interconnected on the Internet by 2020?

Select one:

Question 42

Complete
Mark 1.00 out of 1.00
Flag question

Question text

  Anis a collection of end-point groups (EPG), their connections, and the policies that define those connections.

Question 43

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.

Select one:

Question 44

Complete
Mark 1.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is integrating new things into existing networks. 

Select one:

Question 45

Complete
Mark 1.00 out of 1.00
Flag question

Question text

are specialized, handheld devices designed for testing the various types of data communication cabling.

Question 46

Complete
Mark 0.00 out of 1.00
Flag question

Question text

One of the  new challenges associated with the rapid growth of the IoT is improving the Internet connections from homes 

Select one:

Question 47

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.

Question 48

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is Fog computing?

Select one:

Question 49

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which statement describes the physical topology for a LAN?

Select one:

Question 50

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Cloud computing and virtualization are different terms that refer to the same thing.

Select one:

Which statement describes the physical topology for a LAN?

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?

Select one:

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

diagrams keep track of the location, function, and status of devices on the network.

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which feature sends simulated data across the network and measures performance between multiple network locations?

Select one:

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.

Select one:

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.

Select one:

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.

Select one:

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A  topology shows the physical layout of the devices connected to the network.

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?

Select one:

Question 11

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Thetransmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.

Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?

Select one:

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?

Select one:

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Atopology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

are specialized, handheld devices designed for testing the various types of data communication cabling.

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

When is the most appropriate time to measure network operations to establish a network performance baseline?

Select one:

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?

Select one:

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?

Select one:

Question 19

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?

Select one:

Question 20

Complete
Mark 0.00 out of 1.00
Flag question

Question text

The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.

Select one:

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which term describes the data exchanges between virtual servers in a data center?

Select one:

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is an example of an M2M connection?

Select one:

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

This type of SDN uses a centralized controller that has knowledge of all devices in the network.

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

  Anis a collection of end-point groups (EPG), their connections, and the policies that define those connections.

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Theis considered to be the brains of the ACI architecture. 

Question 7

Complete
Mark 0.00 out of 1.00
Flag question

Question text

  A network architecture that virtualizes the network.

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.

Select one:

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How many "things" are predicted to be interconnected on the Internet by 2020?

Select one:

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.


Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is a characteristic of data flow processing in SDN?

Select one:

Question 13

Complete
Mark 0.00 out of 1.00
Flag question

Question text

A purpose-built hardware solution for integrating cloud computing and data center management.

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

SDN is a network architecture that has been developed to virtualize the network. 

Select one:

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is Fog computing?

Select one:

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Cloud computing and virtualization are different terms that refer to the same thing.

Select one:

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

This is typically regarded as the brains of a device.

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.

Select one:

Question 19

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

Select one:

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which network traffic management technology is a basic element in SDN implementations?

Select one:

MAC address table flooding attacks are addressed with port security.

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

TheQoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic.

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. 

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a queuing algorithm  also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question 7

Complete
Mark 0.00 out of 1.00
Flag question

Question text

SNMP is an application layer protocol that provides a message format for communication between managers and agents

Select one:

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Select one:

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.


Select one:

Question 10

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ.

Question 11

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What is an SNMP management agent?

Select one:

Question 12

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which model is the only QoS model with no mechanism to classify packets?

Select one:

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

Select one:

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.

Select one:

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.

Select one:

Question 17

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

Select one:

Question 18

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Network traffic can be marked at both Layer 2 and Layer 3 for QoS..

Select one:

Question 19

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It SPAN Terminology which  refers to the traffic that enters the switch.

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

allows source and destination ports to be in different switches. 

Question 21

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes.

Question 22

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How many levels of priority are possible when using class of service (CoS) marking on frames?

Select one:

Question 23

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

Select one:

Question 24

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are forwarded in the order in which they are received.

Select one:

Question 25

Complete
Mark 1.00 out of 1.00
Flag question

Question text

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

Select one:

Question 26

Complete
Mark 0.00 out of 1.00
Flag question

Question text

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

Select one:

Question 27

Complete
Mark 1.00 out of 1.00
Flag question

Question text

 Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).

Select one:

Question 28

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which mode is used to configure SNMP?

Select one:

Question 29

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which statement describes the QoS classification and marking tools?

Select one:

Question 30

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

Select one:

Question 31

Complete
Mark 1.00 out of 1.00
Flag question

Question text

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

Select one:

Question 32

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are classified into different flows based on header information including the ToS value.


Select one:

Question 33

Complete
Mark 1.00 out of 1.00
Flag question

Question text

DHCP  is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.


Question 34

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is a type of DHCP  attack where the attacker configures a fake DHCP server on the network to issue IP  addresses to clients. 

Question 35

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?

Select one:

Question 36

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What does the WFQ  automated scheduling method stands for?

Question 37

Complete
Mark 1.00 out of 1.00
Flag question

Question text

allows source and destination ports to be in different switches.

Question 38

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What happens when the memory queue of a device fills up and new network traffic is received?

Select one:

Question 39

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How can SNMP access be restricted to a specific SNMP manager?

Select one:

Question 40

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show monitor command is used to verify the SPAN session.

Select one:

Question 41

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is a SPAN Terminology which  refers to the traffic that leaves the switch. 

Question 42

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is an  SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port


Switch Port Analyzer

Question 43

Complete
Mark 0.00 out of 1.00
Flag question

Question text

Thefeature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port, out another port on the same switch. 

Question 44

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

Select one:

Question 45

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is an ever increasing requirement of networks today

Select one:

Question 46

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the default queuing method used on the LAN interfaces of Cisco devices?

Select one:

Question 47

Complete
Mark 0.00 out of 1.00
Flag question

Question text

It is a type of DHCP where the  attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.

Question 48

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question 49

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.

Question 50

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What does the FIFO queuing stands for? first-come, first-served

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.


Select one:

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the default queuing method used on the LAN interfaces of Cisco devices?

Select one:

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

 Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).

Select one:

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

Select one:

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What happens when the memory queue of a device fills up and new network traffic is received?

Select one:

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are classified into different flows based on header information including the ToS value.


Select one:

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which model is the only QoS model with no mechanism to classify packets?

Select one:

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

Select one:

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which statement describes the QoS classification and marking tools?

Select one:

Question 12

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What does the FIFO queuing stands for? 

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Select one:

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are forwarded in the order in which they are received.

Select one:

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What does the WFQ  automated scheduling method stands for?

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Network traffic can be marked at both Layer 2 and Layer 3 for QoS..

Select one:

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. 

Select one:

Question 18

Complete
Mark 1.00 out of 1.00
Flag question

Question text

TheQoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.

Question 19

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How many levels of priority are possible when using class of service (CoS) marking on frames?

Select one:

Question 20

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?

Select one:

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

Select one:

Question 2

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

Select one:

Question 3

Complete
Mark 1.00 out of 1.00
Flag question

Question text

SNMP is an application layer protocol that provides a message format for communication between managers and agents

Select one:

Question 4

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

Select one:

Question 5

Complete
Mark 1.00 out of 1.00
Flag question

Question text

DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.

Select one:

Question 6

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Which mode is used to configure SNMP?

Select one:

Question 7

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.

Question 8

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of DHCP where the  attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.

Question 9

Complete
Mark 1.00 out of 1.00
Flag question

Question text

allows source and destination ports to be in different switches. 

Question 10

Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a type of DHCP  attack where the attacker configures a fake DHCP server on the network to issue IP  addresses to clients. 

Question 11

Complete
Mark 1.00 out of 1.00
Flag question

Question text

MAC address table flooding attacks are addressed with port security.

Select one:

Question 12

Complete
Mark 1.00 out of 1.00
Flag question

Question text

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

Select one:

Question 13

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question 14

Complete
Mark 0.00 out of 1.00
Flag question

Question text

What is an SNMP management agent?

Select one:

Question 15

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The show monitor command is used to verify the SPAN session.

Select one:

Question 16

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question 17

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.

Select one: