front 1
| back 1 ALL THE ABOVE |
front 2 A set of logical rules that devices must follow to communicate is called _________________ | back 2 PROTOCOL |
front 3 To define a protocol, TCP/IP uses documents called _________________ | back 3 REQUESTS FOR COMMENTS |
front 4 T/F: You can find RFC’s using any online search engine, such as rfc-editor.org | back 4 TRUE |
front 5 The TCP/IP application layer protocols provide ____________ to the ______________ running on a computer. | back 5 SERVICES APPLICATION SOFTWARE |
front 6 List two protocols for each layer in the TCP model APPLICATION TRANSPORT INTERNET DATA-LINK + PHYSICAL | back 6 APPLICATION - HTTP, SMTP, POP3 TRANSPORT - TCP, UDP INTERNET - IP, ICMP DATA-LINK + PHYSICAL - Ethernet, 802.11 (wireless) |
front 7 Transport layer protocols provide services to the application layer protocols that reside one layer ____________ in the TCP/IP model.
| back 7 HIGHER |
front 8 TCP/IP needs a mechanism to guarantee delivery of data across a network. To recover from errors, TCP uses the concept of _______________
| back 8 ACKNOWLEDGEMENTS |
front 9 __________, which refers to the concepts of how adjacent layers in a networking model, on the same computer, work together.
| back 9 ADJACENT LAYER |
front 10 Name the four different switchport modes can be configured on a switch: | back 10 1. access 2. trunk 3. dynamic desirable 4. and dynamic auto. |
front 11 TRUE/FALSE: The switchport mode access and switchport mode trunk commands statically configure a switchport as an access or a trunking port, respectively. | back 11 TRUE |
front 12 TRUE/FALSE: The switchport mode dynamic desirable and switchport mode dynamic auto commands ARE NOT used to configure a switchport to dynamically form a trunk. | back 12 FALSE |
front 13 TRUE/FALSE: A switchport in desirable mode will actively attempt to form a trunk, whereas the auto mode will not form a trunk unless connected to another device that is configured as either dynamic desirable or as static trunk . | back 13 TRUE |
front 14 Refer to the exhibit and diagram; to make it possible for all traffic to pass between PC1’s LAN and PC2’s LAN, the link between SW1 and SW2 will be configured as a trunk. Which Cisco IOS command could be used on SW1’s Gi0/1 interface to force it to actively attempt to trunk with SW2?
| back 14 switchport mode dynamic desirable |
front 15 In this network, all switches are powered on, and all relevant VLANs have been configured correctly and are working. Based on the output in the exhibit, which of the following statements is true about switch SW2?
| back 15 Three interfaces are trunking. |
front 16 Which Cisco IOS command can be used to display which VLANs are supported over a specific configured switch trunk? | back 16 show interfaces trunk |
front 17 TRUE/FALSE: Both the show interfaces trunk and the show interfaces interface switchport commands CAN BE USED to display the VLANs that are allowed over a trunk. | back 17 TRUE |
front 18 Refer to the highlighted photo. What does the highlighted text mean? | back 18 That EtherChannel is operational |
front 19 Refer to the highlighted photo. What is a port channel? | back 19 1. A port channel bundles up to eight individual interfaces into a group to provide increased bandwidth and redundancy. 2. Port channeling also load balances traffic across physical interfaces. 3. The port channel stays operational as long as at least one physical interface within the port channel is operational. |
front 20 Refer to the highlighted photo. TRUE/FALSE: Both the passive and active modes allow LACP to negotiate between ports to determine if they can form a port channel, based on criteria such as the port speed and the trunking state. | back 20 TRUE |
front 21 Refer to the highlighted photo: TRUE/FALSE: A port in active mode can form a port channel successfully with another port that is in active mode. | back 21 TRUE |
front 22 Refer to the highlighted photo: TRUE/FALSE: A port in active mode can form a port channel with another port in passive mode. | back 22 TRUE |
front 23 Refer to the highlighted photo: TRUE/FALSE
| back 23 TRUE TRUE |
front 24 Which Cisco IOS command can be used to display which VLANs are supported over a specific configured switch trunk? | back 24 show interfaces trunk |
front 25 Refer to the highlighted photo. What is LACP? | back 25 Link Aggregation Control Protocol IEEE 802.3ad (LACP) is an open standard of Ethernet link aggregation. LACP allows Cisco switches to manage Ethernet channels between switches that conform the 802.3ad protocol. |
front 26 RSTP serves as an improved protocol in comparison to the older STP. Which of the following answers lists a feature of RSTP that does not exist in STP?
| back 26 The criteria used by switches to determine a port to act in the backup port role |
front 27 TRUE/FALSE: RSTP uses the same rules as STP for choosing the root and choosing which ports serve as root port and designated port. | back 27 TRUE |
front 28 What is the default bridge priority on Cisco switches? | back 28 32768 |
front 29 TRUE/FALSE: Both the show interfaces trunk and the show interfaces interface switchport commands can be used to display the VLANs that are allowed over a trunk. | back 29 TRUE |
front 30 For which reasons was the RFC 1918 address space defined?
| back 30
|
front 31 TRUE/FALSE: In the early 1990s, IANA could see issues with the current assignment of IPv4 addresses. 1) Routing information overload. 2) Eventual exhaustion of IP network numbers because of the quick growth of the Internet. | back 31 TRUE |
front 32 An engineer at Acme Corporation was tasked with the subnetting design for a new headquarters location. The only information she was given is shown here: Use the 172.20.0.0/16 address space. Plan for at least 400 different subnets of the same size. Plan for each subnet to have at least 50 hosts per subnet. How many subnet and host bits would be required?
| back 32
|
front 33 To which subnet does host 192.168.148.76/29 belong? | back 33 192.165.148.56 |
front 34 **TROUBLESHOOTING LAYER 3** TRUE OR FALSE:the portchannel interface must be configured with no switchport command, and so must the physical interfaces | back 34 TRUE |
front 35 A ping means that you have what kind of layer connectivity? | back 35 Layer 1, Layer 2, and Layer 3 connectivity |
front 36 TRUE/FALSE: A ping fails does not mean that your devices are not connected | back 36 TRUE |
front 37 The number of routers that a packet has to go to in order to reach a destination is called what? | back 37 HOPS |
front 38 true/false: Access Control Lists filter traffic | back 38 TRUE |
front 39 TRUE/FALSE: A ping will not work on a switch | back 39 TRUE |
front 40 TRUE/FALSE: A ping on a switch will not work, because a switch is a layer 2 device | back 40 TRUE |
front 41 Name the protocol that provides a command line interface for communication with a remote device or server, sometimes employed for remote management but also for initial device setup like network hardware. | back 41 TELNET |
front 42 T/F: a router has the responsibility of finding out the best path for network traffic. | back 42 TRUE |
front 43 This type of protocol:
| back 43 Routing protocol |
front 44 What does the letters in OSPF stand for? | back 44 Open shortest path first (OSPF) |
front 45 What algorithm does OSPF to determin the best path? | back 45 Dijkstra Shortest Path First algorithm (SPF) |
front 46 What algoritm does EIGRP (Enhanced Interior Gateway Routing Protocol) use? | back 46 DUAL (diffusing update algorithm) |
front 47 TRUE/FALSE: Routers discard data link headers and trailers as they forward IP packets. | back 47 TRUE |
front 48 Which two steps must you perform to enable router-on-a-stick on a router subinterface? | back 48
|
front 49 Fill in the blank: A ____________ static route is a method that is used to add a static route to the routing table should an existing better route disappear. This usually happens when the main routing protocol that is used is cut off from a spoke/branch. When the device sees that the routing protocol route has been removed from the routing table, it inserts the static route. | back 49 FLOATING STATIC ROUTE |
front 50 FILL IN THE BLANK: Although modern routers often have CSU/DSUs that are built into the card installed, external CSU/DSUs are still installed; in these circumstances, a ________________ is used to connect a router to the CSU/DSU. | back 50 SERIAL CABLE |
front 51 What 3 troubleshooting tools can you use to help resolve a connectivity problem? | back 51
|
front 52 Which Cisco IOS command can be used on a router to view the different VLANs that have been configured into a ROAS configuration? | back 52 show vlans |
front 53 The __________________ command is very useful because it not only displays the different VLANs that have been configured on a router but also displays the interfaces or subinterfaces that are handling the traffic, which interface or subinterface is handling the native traffic, and some brief packet statistics. | back 53 show vlans |
front 54 The command _________________ will show the LSAs known by that router. | back 54 show ip ospf database |
front 55 The___________, ________________, _______________, and _______________ commands are all valid commands that can assist in the verification and troubleshooting of OSPF, but they do not show the LSAs known to the router in OSPF. | back 55
|
front 56 Which OSPF command will display the OSPF network type that a specific interface uses? | back 56 show ip ospf interface g0/1 |
front 57 Which Cisco IOS command can be used to disable the OSPF process temporarily? | back 57 SHUTDOWN |
front 58 Which Cisco command can be used to list details about the route that a router would match when processing a packet destined for the IPv6 address in the command ? | back 58 show ipv6 route |
front 59 Validation of the right kind of hardware, using an 802.11 capable device is called ________- | back 59 OPEN AUTHENTICATION |
front 60 What does the letters in WEP stand fopr and why is it used | back 60 Wireless Equivalent Privacy
|
front 61 Router R1 has the configuration shown in the exhibit. The only users allowed to telnet into R1 sit in the subnet connected to R1's Fa0/0 interface. Which of the following configuration commands, added to R1's configuration, would allow access to R1 for only those users, while allowing packets to flow through router R1?
| back 61 access-class 1 in, from inside vty configuration mode |
front 62 Well known (system) ports are assigned by the Internet Assigned Numbers Authority (IANA) with a strict review process for new ports.
| back 62
|
front 63 If you wanted to see the configured subnet mask value in prefix notation rather than in dotted decimal on a Linux system, which command(s) would you use? | back 63 ip address |
front 64 The ____ command shows the subnet mask in dotted decimal format, while the ____ command shows the subnet mask in prefix notation, also referred to as “slash notation.” | back 64 The ifconfig command shows the subnet mask in dotted decimal format, while the ip address command shows the subnet mask in prefix notation, also referred to as “slash notation.” |
front 65 The ____ command is used to show the local routing table on a Windows, macOS, and Linux device.The ________________ command is used to show the configured default gateway on a macOS | back 65 The netstat command is used to show the local routing table on a Windows, macOS, and Linux device.The networksetup -getinfo Ethernet command is used to show the configured default gateway on a macOS |
front 66 What VPN feature provides encryption and authentication services, but only for applications accessible from the user’s web browser? | back 66 SSL (Secure Sockets Layer) |
front 67 What is a Secure Sockets Layer? | back 67 a technology that performs data authentication and encryption for the data transmitted through the internet connection. This technology encrypts the data that is transmitted between two systems (usually between a server and a client) over internet in order to ensure that the information remains private and safe. |
front 68 Which of the types of malware in the answers propagates automatically? | back 68 Worm |
front 69 Web browsers connect to web servers by referencing the ____ of the web server. | back 69 Web browsers connect to web servers by referencing the URI (Uniform Resource Identifier) of the web server. |
front 70 Which of the following can be assigned to a host?
| back 70
|
front 71 What type of output is shown in the exhibit? | back 71 JSON (JavaScript Object Notation) This output is directly from a DNA Center RESTful API request called “Get Network Device by IP” and the output is in JSON form. |
front 72 What congestion management solution was designed specifically for voice and video that has specialized low delay, jitter, and loss requirements? | back 72 Low Latency Queuing |
front 73 ____provides preferential treatment for this traffic over other class-based queuing methods so that regardless of the current congestion conditions the traffic is forwarded. | back 73 Low Latency Queuing |
front 74 When comparing next-generation firewalls to traditional firewalls what additional capability can be leveraged to more efficiently block invalid application traffic? | back 74 Filter based on the application data |
front 75 For a particular NAT implementation, a private address 192.168.1.1 should always be translated with a 1:1 mapping to IP address 12.150.146.100. Which command accomplishes this?
| back 75
|
front 76 Which part of the following URI is the hostname? | back 76 DNAC.example.com |
front 77 Refer to the diagram. PC1 sent out a DHCP discover message looking to find a DHCP server to obtain an address. What source IP address would R1 use for this message to R2?
| back 77 192.168.1.1 |
front 78 The figure shows a design planned by a junior engineer. It shows the switches at three buildings in the same campus. The senior network engineer sends the junior engineer an e-mail, without reviewing the design, and asks the junior engineer to make sure to use a collapsed core design. What must the junior engineer do to change the design into a collapsed core design? | back 78 Remove switches 1 and 2, and connect switches 3 through 8 directly to each other. |
front 79 Refer to the diagram; as a network engineer, you are tasked with creating an ACL. The ACL must be configured on R1 and block traffic coming from PC1 on TCP port 1100 to S1, as well as block traffic coming from PC1 going to S1’s TCP port 80. Which configuration commands will successfully fulfill these requirements? | back 79 access-list 150 deny tcp host 192.168.1.1 eq 1100 host 10.150.165.100 access-list 150 deny tcp host 192.168.1.1 host 10.150.165.100 eq 80 |
front 80 There are two Layer 3 switches acting as core routers called SW1 and SW2. SW1 and SW2 have the IP addresses 192.168.1.1 and 192.168.1.2 on VLAN 10, respectively. If host 1 has a configured default gateway of 192.168.1.1 and SW1 were to have a failure that brings the device offline, what protocol should be implemented to mitigate this failure scenario? | back 80 HSRP |
front 81 Where in the SDA fabric is the VXLAN tunneling performed? | back 81 ASIC on each switch |
front 82 In a three-tier design, what are the capabilities for the core devices? | back 82
|
front 83 What commands does TFTP support? | back 83
|
front 84 ______ has very limited functionality compared to FTP because it was meant to be a lightweight protocol. | back 84 TFTP |
front 85 what is the SDA fabric device role to its current function: Tracks all endpoints in the fabric site and associates the endpoints to fabric nodes. Uses LISP to do this | back 85 FABRIC CONTROL NODE |
front 86 what is the SDA fabric device role to its current function: The gateway between SDA and external networks | back 86 FABRIC BORDER NODE |
front 87 what is the SDA fabric device role to its current function: Routes and transports IP traffic inside the fabric. Does not run VXLAN. | back 87 FABRIC INTERMEDIATE NODE |
front 88 what is the SDA fabric device role to its current function: Where endpoints register with the fabric. | back 88 FABRIC EDGE NODE |
front 89 What layer of a three-tier campus LAN topology provides a connection point for end-user devices? | back 89 Access |
front 90 what does a DHCP server do? | back 90 Provides addresses for end devices |
front 91 what is gratuitous arp? | back 91 informs all hosts on a subnet about its current MAC addresses. |
front 92 what is a dynamic arp inspection | back 92 used to validate ARP information as it’s coming into the device. |
front 93 what is dhcp snooping | back 93 can be utilized to mitigate a rouge DHCP server providing address leases to end devices. |
front 94 What is the proper major steps in order for PoE autonegotiation | back 94
|
front 95 What protocols utilizes the well-known port number 53? | back 95 Domain Name System (DNS) |
front 96 What option(s) are required criteria for a service to be a cloud service? | back 96
|
front 97 Which of the following are true about TCP?
| back 97
|
front 98 Which options are true about TACACS+?
| back 98
|
front 99 The SDA underlay uses a well-known design called a routed access layer design. What are the features of a routed access layer design? | back 99
|
front 100 Which public cloud WAN connection options do not offer the ability to have reliable QoS?
Select 2 answers | back 100 Internet + internet VPN |
front 101 What is the field that is used on modern systems that allows an IP packet to be marked with a specific QoS value? | back 101 DSCP On modern networks, the IP Type of Service field is split into two subfields: the Differentiated Services Code Point (DSCP) and the Explicit Congestion Notification (ECN) field; of these, the DSCP is primarily used for marking traffic with a specific QoS value. |
front 102 The configuration of a router uses default settings related to terminal monitor, and none of the users have changed their settings after login. User 1 connects to the console, user 2 connects via Telnet, and user 3 connects via SSH. User 3 issues debug ip ospf hello. Which user(s) sees the debug messages? | back 102 USER 1 |
front 103 What is true in a spine-leaf architecture?
| back 103
|
front 104 What is the name of the Cisco feature that allows for the identification of protocols that are traditionally hard to classify because of their operation? | back 104 NBAR |
front 105 Considering the differences between NAT and PAT, which is the most accurate description?
| back 105 PAT translates many IP addresses into a few or even one IP address. |
front 106 Which of the following are true about VPNs?
| back 106
|
front 107 From the following options, what are the required REST API attributes?
| back 107
|
front 108 Which public cloud WAN connection options do not offer the ability to easily migrate between providers?
| back 108
|
front 109 Port Address Translation (PAT) is also known as what? | back 109 NAT overload |
front 110 AAA refers to Authentication, Authorization and Accounting. What two protocols does it use? | back 110 TACACS (Terminal Access Controller Access Control System) + RADIUS |
front 111 What is Cisco TACACS? | back 111 Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and accounting (AAA) services. |
front 112 Is RADIUS TCP or UDP? | back 112 UDP |
front 113 Port 53 is used by? | back 113 DNS |
front 114 Port 69 is used by? | back 114 TFTP |
front 115 Does DNS use TCP or UDP | back 115 Uses both TCP + UDP |
front 116 List the Cisco Syslog Severity Levels in order. | back 116
|