Data Communication & Networking 4 (CISCO)
Question 1
Question text
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
uestion 1
Question text
Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.
Question 2
Question text
A newer and faster technology considered to be part of 4G technology.
Question 3
Question text
Internal BGP is the routing protocol used between routers in the same AS.
Question 4
Question text
What TCP port is used by BGP to exchange messages between routers?
Question 5
Question text
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?
Question 6
Question text
A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.
Question 7
Question text
Which statement describes a characteristic of standard IPv4 ACLs?
Question 8
Question text
To verify the state of a GRE tunnel, use the show interface tunnel command.
Question 9
Question text
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
Question 10
Question text
What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?
Question 11
Question text
A general term for Internet services from a mobile phone or from any device that uses the same technology.
Question 12
Question text
Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.
Question 13
Question text
Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.
Question 14
Question text
External BGP is the routing protocol used between routers in different autonomous systems.
Question 15
Question text
What equipment at the cable service provider office connects the office to the subscriber locations?
Question 16
Question text
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?
Question 17
Question text
What is an advantage offered by GRE tunnels?
Question 18
Question text
Which statement describes a difference between the operation of inbound and outbound ACLs?
Question 19
Question text
The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.
Question 20
Question text
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
Question 19
Question text
PPP authentication is performed at which OSI layer?
Question 14
Question text
With which layers of the OSI model do the PPP control protocols interface?
Question 10
Question text
Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?
Question 7
Question text
Which statement correctly describes a WAN technology?
Question 6
Question text
A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?
Question 4
Question text
What function does NCP perform in the establishment of a PPP session?
Question 1
Question text
Which protocol is used by PPP to provide authentication and protection from playback attacks?
Which term describes the data exchanges between virtual servers in a data center?
Question 2
Question text
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?
Question 3
Question text
What is a characteristic of data flow processing in SDN?
Question 4
Question text
The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.
Question 5
Question text
The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.
Question 6
Question text
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
Question 7
Question text
Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.
Question 8
Question text
Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?
Question 9
Question text
One of the new challenges associated with the rapid growth of the IoT is integrating many devices from different vendors with custom applications.
Question 10
Question text
A topology shows the physical layout of the devices connected to the network.
Question 11
Question text
A is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.
Question 12
Question text
Which network traffic management technology is a basic element in SDN implementations?
Question 13
Question text
Theis considered to be the brains of the ACI architecture.
Question 14
Question text
This is typically regarded as the brains of a device.
Question 15
Question text
One of the new challenges associated with the rapid growth of the IoT is developing better routing protocols for new devices
Question 16
Question text
Atopology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.
Question 17
Question text
SDN is a network architecture that has been developed to virtualize the network.
Question 18
Question text
A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?
Question 19
Question text
The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.
Question 20
Question text
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
Question 21
Question text
One of the new challenges associated with the rapid growth of the IoT is securing new devices with varying level of security.
Question 22
Question text
A network architecture that virtualizes the network.
Question 23
Question text
These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.
Question 24
Question text
One of the new challenges associated with the rapid growth of the IoT is increasing the CPU power of computers
Question 25
Question text
An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name?
Question 26
Question text
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Question 27
Question text
A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?
Question 28
Question text
The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.
Question 29
Question text
What is an example of an M2M connection?
Question 30
Question text
diagrams keep track of the location, function, and status of devices on the network.
Question 31
Question text
When is the most appropriate time to measure network operations to establish a network performance baseline?
Question 32
Question text
Which feature sends simulated data across the network and measures performance between multiple network locations?
Question 33
Question text
A purpose-built hardware solution for integrating cloud computing and data center management.
Question 34
Question text
For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?
Question 35
Question text
Thetransmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.
Question 36
Question text
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
Question 37
Question text
A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?
Question 38
Question text
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?
Question 39
Question text
After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?
Question 40
Question text
Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.
Question 41
Question text
How many "things" are predicted to be interconnected on the Internet by 2020?
Question 42
Question text
Anis a collection of end-point groups (EPG), their connections, and the policies that define those connections.
Question 43
Question text
The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.
Question 44
Question text
One of the new challenges associated with the rapid growth of the IoT is integrating new things into existing networks.
Question 45
Question text
are specialized, handheld devices designed for testing the various types of data communication cabling.
Question 46
Question text
One of the new challenges associated with the rapid growth of the IoT is improving the Internet connections from homes
Question 47
Question text
Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.
Question 48
Question text
What is Fog computing?
Question 49
Question text
Which statement describes the physical topology for a LAN?
Question 50
Question text
Cloud computing and virtualization are different terms that refer to the same thing.
Which statement describes the physical topology for a LAN?
Question 2
Question text
After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?
Question 3
Question text
diagrams keep track of the location, function, and status of devices on the network.
Question 4
Question text
The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.
Question 5
Question text
Which feature sends simulated data across the network and measures performance between multiple network locations?
Question 6
Question text
The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.
Question 7
Question text
The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.
Question 8
Question text
Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.
Question 9
Question text
A topology shows the physical layout of the devices connected to the network.
Question 10
Question text
Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?
Question 11
Question text
Thetransmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.
Question 12
Question text
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?
Question 13
Question text
A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?
Question 14
Question text
Atopology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.
Question 15
Question text
are specialized, handheld devices designed for testing the various types of data communication cabling.
Question 16
Question text
When is the most appropriate time to measure network operations to establish a network performance baseline?
Question 17
Question text
A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?
Question 18
Question text
A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?
Question 19
Question text
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
Question 20
Question text
The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
Question 2
Question text
Which term describes the data exchanges between virtual servers in a data center?
Question 3
Question text
What is an example of an M2M connection?
Question 4
Question text
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
Question 5
Question text
Anis a collection of end-point groups (EPG), their connections, and the policies that define those connections.
Question 6
Question text
Theis considered to be the brains of the ACI architecture.
Question 7
Question text
A network architecture that virtualizes the network.
Question 8
Question text
Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.
Question 9
Question text
Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.
Question 10
Question text
How many "things" are predicted to be interconnected on the Internet by 2020?
Question 11
Question text
These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.
Question 12
Question text
What is a characteristic of data flow processing in SDN?
Question 13
Question text
A purpose-built hardware solution for integrating cloud computing and data center management.
Question 14
Question text
SDN is a network architecture that has been developed to virtualize the network.
Question 15
Question text
What is Fog computing?
Question 16
Question text
Cloud computing and virtualization are different terms that refer to the same thing.
Question 17
Question text
This is typically regarded as the brains of a device.
Question 18
Question text
The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.
Question 19
Question text
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Question 20
Question text
Which network traffic management technology is a basic element in SDN implementations?
MAC address table flooding attacks are addressed with port security.
Question 2
Question text
TheQoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.
Question 3
Question text
It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic.
Question 4
Question text
Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces.
Question 5
Question text
It is a queuing algorithm also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.
Question 6
Question text
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.
Question 7
Question text
SNMP is an application layer protocol that provides a message format for communication between managers and agents
Question 8
Question text
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
Question 9
Question text
IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.
Question 10
Question text
It is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ.
Question 11
Question text
What is an SNMP management agent?
Question 12
Question text
It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password
Question 13
Question text
Which model is the only QoS model with no mechanism to classify packets?
Question 14
Question text
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
Question 15
Question text
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.
Question 16
Question text
DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.
Question 17
Question text
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
Question 18
Question text
Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
Question 19
Question text
It SPAN Terminology which refers to the traffic that enters the switch.
Question 20
Question text
allows source and destination ports to be in different switches.
Question 21
Question text
It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes.
Question 22
Question text
How many levels of priority are possible when using class of service (CoS) marking on frames?
Question 23
Question text
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
Question 24
Question text
Packets are forwarded in the order in which they are received.
Question 25
Question text
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
Question 26
Question text
CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.
Question 27
Question text
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).
Question 28
Question text
Which mode is used to configure SNMP?
Question 29
Question text
Which statement describes the QoS classification and marking tools?
Question 30
Question text
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?
Question 31
Question text
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
Question 32
Question text
Packets are classified into different flows based on header information including the ToS value.
Question 33
Question text
DHCP is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.
Question 34
Question text
It is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients.
Question 35
Question text
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
Question 36
Question text
What does the WFQ automated scheduling method stands for?
Question 37
Question text
allows source and destination ports to be in different switches.
Question 38
Question text
What happens when the memory queue of a device fills up and new network traffic is received?
Question 39
Question text
How can SNMP access be restricted to a specific SNMP manager?
Question 40
Question text
The show monitor command is used to verify the SPAN session.
Question 41
Question text
It is a SPAN Terminology which refers to the traffic that leaves the switch.
Question 42
Question text
It is an SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port
Switch Port Analyzer
Question 43
Question text
Thefeature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port, out another port on the same switch.
Question 44
Question text
The LLQ feature brings strict priority queuing (PQ) to CBWFQ.
Question 45
Question text
It is an ever increasing requirement of networks today
Question 46
Question text
What is the default queuing method used on the LAN interfaces of Cisco devices?
Question 47
Question text
It is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.
Question 48
Question text
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.
Question 49
Question text
It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.
Question 50
Question text
What does the FIFO queuing stands for? first-come, first-served
The LLQ feature brings strict priority queuing (PQ) to CBWFQ.
Question 2
Question text
IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.
Question 3
Question text
What is the default queuing method used on the LAN interfaces of Cisco devices?
Question 4
Question text
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
Question 5
Question text
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).
Question 6
Question text
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
Question 7
Question text
What happens when the memory queue of a device fills up and new network traffic is received?
Question 8
Question text
Packets are classified into different flows based on header information including the ToS value.
Question 9
Question text
Which model is the only QoS model with no mechanism to classify packets?
Question 10
Question text
CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.
Question 11
Question text
Which statement describes the QoS classification and marking tools?
Question 12
Question text
What does the FIFO queuing stands for?
Question 13
Question text
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
Question 14
Question text
Packets are forwarded in the order in which they are received.
Question 15
Question text
What does the WFQ automated scheduling method stands for?
Question 16
Question text
Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
Question 17
Question text
Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces.
Question 18
Question text
TheQoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.
Question 19
Question text
How many levels of priority are possible when using class of service (CoS) marking on frames?
Question 20
Question text
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
Question 2
Question text
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?
Question 3
Question text
SNMP is an application layer protocol that provides a message format for communication between managers and agents
Question 4
Question text
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
Question 5
Question text
DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.
Question 6
Question text
Which mode is used to configure SNMP?
Question 7
Question text
It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.
Question 8
Question text
It is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.
Question 9
Question text
allows source and destination ports to be in different switches.
Question 10
Question text
It is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients.
Question 11
Question text
MAC address table flooding attacks are addressed with port security.
Question 12
Question text
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
Question 13
Question text
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.
Question 14
Question text
What is an SNMP management agent?
Question 15
Question text
The show monitor command is used to verify the SPAN session.
Question 16
Question text
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.
Question 17
Question text
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.