IT6300 Data Communications and Networking 4
Which WAN technology uses a fixed
payload of 48 bytes and is transported across both switched and permanent
virtual circuits? |
ATM |
Satellite Internet
services are used in locations where land-based Internet access is not
available, or for temporary installations that are mobile. |
True |
With which layers
of the OSI model do the PPP control protocols interface? |
NCP interfaces with Layer 3; LCP
interfaces with Layer 1 |
A general term for
Internet services from a mobile phone or from any device that uses the same
technology |
wireless internet |
A newer and faster
technology considered to be part of 4G technology. |
long-tern evolution |
Which additional
functionality is available on an interface when the encapsulation is changed
from HDLC to PPP? |
authentication |
Which medium do
service providers use to transmit data over WAN connections with SONET, SDH,
and DWDM? |
fiber optic |
What equipment at
the cable service provider office connects the office to the subscriber
locations? |
CMTS |
A general term for
Internet services from a mobile phone or from any device that uses the same
technology |
Wireless internet |
What is an
advantage offered by GRE tunnels? |
support for IP multicast
tunneling |
When a PPPoE
configuration is being verified, which command can be used to verify the MTU
size and encapsulation type configured on a Cisco router? |
show interface dialer 1 |
What is a
disadvantage of leased lines? |
high cost |
Which one of the
WAN technologies is inadequate for video traffic but operates adequately for
voice traffic? |
ISDN BRI |
a type of network
that establishes a dedicated circuit (or channel) between nodes and terminals
before the users may communicate. |
Circuit-switched network |
Dynamic Multipoint
VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an
easy, dynamic, and scalable manner |
True |
What is a
characteristic of a WAN? |
WAN service providers include
carriers such as a telephone network or satellite service. |
When a PPPoE
configuration is being verified, which command can be used to verify the MTU
size and encapsulation type configured on a Cisco router? |
show interface dialer 1 |
Generic Routing
Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN
tunneling protocol. |
True |
Which public WAN
technology provides security by using encrypted tunnels over Internet
connections? |
VPN |
To verify the state
of a GRE tunnel, use the show interface tunnel command. |
True |
A site-to-site VPN
is created when devices on both sides of the VPN connection are aware of the
VPN configuration in advance. |
True |
What function does
NCP perform in the establishment of a PPP session? |
It completes the specific
configuration of the network layer protocol that is being used. |
What range of IP
addresses is represented by the network and wildcard mask 192.168.70.0
0.0.0.127? |
192.168.70.0 to 192.168.70.127 |
What is the
protocol that provides ISPs the ability to send PPP frames over DSL networks? |
PPPoE |
Internal BGP is the
routing protocol used between routers in the same AS. |
True |
The use of BGP is
most appropriate when an AS has connections to multiple autonomous systems. |
True |
A type of digital
modem used with high-speed DSL or cable Internet service. |
broadband modem |
It is a WAN
protocol that provides Provides router-to-router and host-to-network
connections over synchronous and asynchronous circuits |
PPP |
It is the default
encapsulation type on point-to-point connections, dedicated links, and
circuit-switched connections when the link uses two Cisco devices. |
HDLC |
Which IPv4 address
range covers all IP addresses that match the ACL filter specified by
172.16.2.0 with wildcard mask 0.0.1.255? |
172.16.2.0 to 172.16.3.255 |
Which medium do
service providers use to transmit data over WAN connections with SONET, SDH,
and DWDM? |
fiber optic |
Which statement
describes a difference between the operation of inbound and outbound ACLs? |
Inbound ACLs are processed before
the packets are routed while outbound ACLs are processed after the routing is
completed. |
An administrator
has configured an access list on R1 to allow SSH administrative access from
host 172.16.1.100. Which command correctly applies the ACL? |
R1(config-line)# access-class 1
in |
Which statement
correctly describes a WAN technology? |
MPLS can be used to deliver any
type of packet between sites. |
This is a point
established in a building or complex to separate customer equipment from
service provider equipment |
demarcation point |
A network engineer
is troubleshooting an unsuccessful PPP multilink connection between two
routers. The multilink interface has been created and assigned a number, the
interface has been enabled for multilink PPP, and the interface has been
assigned a multilink group number that matches the group assigned to the
member physical serial interfaces. The physical serial interfaces have also
been enabled for PPP multilink. Which additional command should to be issued
on the multilink interface? |
no ip address |
It is a networking
device that provides internetworking and WAN access interface ports that are
used to connect to the service provider network. |
router |
External BGP is the
routing protocol used between routers in different autonomous systems. |
True |
What is an
advantage offered by GRE tunnels? |
support for IP multicast tunneling |
Which statement
describes a characteristic of standard IPv4 ACLs? |
They filter traffic based on
source IP addresses only. |
Which PPP option
enables load balancing on PPP-enabled interfaces that connect to a single
destination? |
Multilink |
A construction firm
is building a power plant at a remote and isolated mine site and needs to
connect the data network of the plant to the corporate network. Which public
technology is the most suitable to meet the connection needs? |
satellite Internet |
Which PPP protocol
allows a device to specify an IP address for routing over the PPP link? |
IPCP |
PPP authentication
is performed at which OSI layer? |
Layer 2 |
What is a
disadvantage of leased lines? |
high cost |
Which public WAN
technology provides security by using encrypted tunnels over Internet
connections? |
VPN |
A construction firm
is building a power plant at a remote and isolated mine site and needs to
connect the data network of the plant to the corporate network. Which public
technology is the most suitable to meet the connection needs? |
satellite Internet |
What TCP port is
used by BGP to exchange messages between routers? |
179 |
Which protocol is
used by PPP to provide authentication and protection from playback attacks? |
CHAP |
MAC address table
flooding attacks are addressed with port security. |
True |
What does the WFQ
automated scheduling method stands for? |
weighted fair queuing |
It is a type of
DHCP where the attacker floods the DHCP server with bogus DHCP requests and
eventually leases all of the available IP addresses in the DHCP server pool. |
DHCP starvation attack |
Packets are
forwarded in the order in which they are received. |
FIFO |
It is an SPAN
Terminology which refers to the port that is monitored with use of the SPAN
feature answer Source (SPAN) port |
Source (SPAN) port (wrong) |
Which model is the
only QoS model with no mechanism to classify packets? |
best-effort |
CBWFQ extends the
standard WFQ functionality to provide support for user-defined traffic
classes. |
True |
What mitigation
plan is best for thwarting a DoS attack that is creating a switch buffer
overflow? |
Enable port security |
The show monitor
command is used to verify the SPAN session. |
True |
Delay-sensitive
data such as voice is added to a priority queue so that it can be sent first
(before packets in other queues). |
LLQ |
What is an SNMP
management agent? |
software that is installed on
devices managed by SNMP |
It is a queuing
algorithm which is an automated scheduling method that provides fair
bandwidth allocation to all network traffic |
w eighted fair queuing |
It is a type of
DHCP attack where the attacker configures a fake DHCP server on the network
to issue IP addresses to clients. |
DHCP spoofing attack |
allows source and
destination ports to be in different switches. |
rspan |
How can SNMP access
be restricted to a specific SNMP manager? |
Define an ACL and reference it by
using the snmp-server community command. |
It is a queuing
algorithm which extends the standard WFQ functionality to provide support for
user-defined traffic classes. |
cbwfq |
It is a queuing
algorithm also known as first-come, first-served (FCFS) queuing, involves
buffering and forwarding of packets in the order of arrival. |
FIFO |
Network traffic can
be marked at both Layer 2 and Layer 3 for QoS.. |
True |
In the 802.1X
standard, the client attempting to access the network is referred to as the
supplicant. |
True |
It is a type of
telnet attack where the attacker continuously requests Telnet connections in
an attempt to render the Telnet service unavailable and preventing an
administrator from remotely accessing a switch. |
telnet dos attack |
What is the default
queuing method used on the LAN interfaces of Cisco devices? |
FIFO |
Under which
condition does congestion occur on a converged network with voice, video, and
data traffic? |
if the request for bandwidth
exceeds the amount of bandwidth available |
Which service is
enabled on a Cisco router by default that can reveal significant information
about the router and potentially make it more vulnerable to attack? |
CDP |
VLAN attacks are
controlled by disabling DTP and following basic guidelines for configuring
trunk ports. |
True |
Simple Network
Management Protocol (SNMP) was developed to allow administrators to manage
nodes such as servers, workstations, routers, switches, and security
appliances, on an IP network. |
True |
What happens when
an edge router using IntServ QoS determines that the data pathway cannot
support the level of QoS requested? |
Data is not forwarded along the
pathway. |
It is a SPAN
Terminology which refers to the traffic that leaves the switch. |
egress traffic |
It SPAN Terminology
which refers to the traffic that enters the switch. |
ingress traffic |
How many levels of
priority are possible when using class of service (CoS) marking on frames? |
8 |
SNMP is an
application layer protocol that provides a message format for communication
between managers and agents |
True |
The _______feature
on Cisco switches is a type of port mirroring that sends copies of the frame
entering a port, out another port on the same switch. |
switched port analyzer |
Simple Network
Management Protocol (SNMP) was developed to allow administrators to manage
nodes such as servers, workstations, routers, switches, and security
appliances, on an IP network |
True |
It is a queuing
algorithm which feature brings strict priority queuing (PQ) to CBWFQ. |
LLQ |
Packets are
assigned to user-defined classes based on matches to criteria such as
protocols, ACLs, and input interfaces. |
CBWFQ |
Which queuing
method provides user-defined traffic classes where each traffic class has a
FIFO queue? |
CBWFQ |
What happens when
the memory queue of a device fills up and new network traffic is received? |
he network device will drop the
arriving packets. |
Which statement
describes the QoS classification and marking tools? |
Marking is the adding of a value
to a packet header. |
DHCP is the
protocol that automatically assigns a host a valid IP address out of a DHCP
pool. |
True |
Packets are
classified into different flows based on header information including the ToS
value. |
WFQ |
The LLQ feature
brings strict priority queuing (PQ) to CBWFQ. |
True |
What does the FIFO
queuing stands for? |
first-in first-out |
DHCP _______ is a
mitigation technique to prevent rogue DHCP servers from providing false IP
configuration parameters. |
snooping |
It is an ever
increasing requirement of networks today |
Quality of Service |
QoS model specifies
a simple and scalable mechanism for classifying and managing network traffic
and providing QoS guarantees on modern IP networks. |
differentiated services |
IntServ provides a
way to deliver the end-to-end QoS that real-time applications require by
explicitly managing network resources to provide QoS to specific user packet
streams, sometimes called microflows. |
True |
Which type of
traffic does Cisco recommend be placed in the strict priority queue (PQ) when
low latency queuing (LLQ) is being used? |
voice |
It is a type of
telnet attack where the attacker may use a list of common passwords,
dictionary words, and variations of words to discover the administrative
password |
telnet dos attack |
The Cisco Discovery
Protocol (CDP) is a proprietary Layer 2 link discovery protocol. |
True |
Which mode is used
to configure SNMP? |
global configuration mode |
allows source and
destination ports to be in different switches. |
rspan |
SDN is a network
architecture that has been developed to virtualize the network. |
True |
What is a
characteristic of data flow processing in SDN? |
Each data flow through the
network must be approved by the SDN controller first. |
The show ip
interface brief and show ipv6 interface brief commands are used to display
the up or down status and IP address of all interfaces on a device. |
True |
This type of SDN
uses a centralized controller that has knowledge of all devices in the network. |
Controller-based SDN |
A network engineer
is investigating an access issue to a web server. The web server can access
the Internet and the local clients can open the web pages. However, outside
clients cannot access the web pages. What is the most likely cause of the
problem? |
An ACL is blocking incoming
connections. |
One of the new
challenges associated with the rapid growth of the IoT is integrating many
devices from different vendors with custom applications. |
True |
Cloud computing and
virtualization are different terms that refer to the same thing. |
False |
This is typically
regarded as the brains of a device. |
control plane |
A purpose-built
hardware solution for integrating cloud computing and data center management. |
Cisco Application Centric
Infrastructure |
Which Cloud
computing service would be best for an organization that needs to
collaboratively create applications and deliver them over the web? |
PaaS |
Which statement
describes the physical topology for a LAN? |
It defines how hosts and network
devices connect to the LAN. |
The OSI reference
model describes how information from a software application in one computer
moves through a network medium to a software application in another computer |
True |
One of the new
challenges associated with the rapid growth of the IoT is integrating new
things into existing networks. |
True |
Today, over __% of
things in the physical world are still not connected to the Internet. Select
the answer that will complete the statement. |
99 |
A client calls the
support desk and says this to a technician: "I have just started my
computer and attempted to check e-mail. The error 0x800ccc0d was displayed.
However, I was able to connect to network drives and access the
Internet." Which statement would describe the status of this issue? |
The helpdesk has enough
information to begin finding a resolution. |
One of the new
challenges associated with the rapid growth of the IoT is developing better
routing protocols for new devices |
False |
A network
architecture that virtualizes the network |
Software Defined Networking |
Use the show ip sla
configuration operation-number command to display configuration values
including all defaults for IP SLA operations or for a specific operation. |
True |
When is the most
appropriate time to measure network operations to establish a network performance
baseline? |
at the same time each day across
a set period of average working days, so that typical traffic patterns can be
established |
An _______ is a
collection of end-point groups (EPG), their connections, and the policies
that define those connections |
Application Network Profile |
Which command runs
several other show commands in order to generate many pages of detailed
troubleshooting information? |
show tech-support |
What is an example
of an M2M connection? |
a sensor in a garbage can
signaling that it is full and delivering the data to a GPS mapping system for
the sanitation truck to adjust its route for pickups |
topology shows the
physical layout of the devices connected to the network. |
Physical network |
These switches
provide an application-aware switching fabric and work with an APIC to manage
the virtual and physical network infrastructure. |
Cisco Nexus 9000 series switch |
A network engineer
is troubleshooting a network that has recently been updated with a new
routing protocol, but the network is not working as expected. The engineer is
comparing the running configuration from before and after the change was
made. Which approach to troubleshooting the problem is the engineer using? |
divide-and-conquer |
Which
troubleshooting tool can be used to pinpoint the distance to a break in a
network cable? |
cable tester |
For a data center,
what is the difference in the server virtualization data traffic compared
with the traditional client-server model? |
There are significant data
exchanges between virtual servers. |
Which network
traffic management technology is a basic element in SDN implementations? |
OpenFlow |
is software that
creates and runs VM instances and can be installed directly on hardware or
run as an application on an OS. |
hypervisor |
One of the new
challenges associated with the rapid growth of the IoT is increasing the CPU
power of computers |
False |
A network
administrator issues the telnet www.cisco.com 25 command on the workstation.
What is the purpose of this command? |
to probe the server that provides
the web service to determine if it is also running an email service |
What is Fog
computing? |
It is a type of computing where
services are hosted where they are used, such as at the network edge or with
end devices. |
One of the new challenges
associated with the rapid growth of the IoT is securing new devices with
varying level of security. |
True |
The IoT refers to
the network of billons of physical objects accessible through the Internet as
we continue to connect the unconnected. |
True |
topology
illustrates how devices are logically connected to the network, meaning how
devices actually transfer data across the network when communicating with
other devices. |
logical network |
The show cdp
neighbors detail command is used to obtain detailed information about
directly connected Cisco neighbor devices. |
True |
diagrams keep track
of the location, function, and status of devices on the network. |
network topology |
are specialized,
handheld devices designed for testing the various types of data communication
cabling |
cable testers |
Also called the
forwarding plane, this plane is typically the switch fabric connecting the
various network ports on a device |
data plane |
Which term
describes the data exchanges between virtual servers in a data center? |
east-west traffic |
An attack has been
launched within a company and a host name has been identified as the source.
What command can a network technician use to determine the IP address
assigned to the host name? |
nslookup |
What is a
characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric
architecture? |
The leaf switches always attach
to the spines, but they never attach to each other. |
One of the new
challenges associated with the rapid growth of the IoT is improving the
Internet connections from homes |
False |
is considered to be
the brains of the ACI architecture |
Application Policy Infrastructure
Controller |
transmits bits from
one computer to another and regulates the transmission of a stream of bits
over the physical medium. |
physical layer |
After gathering
symptoms, if the troubleshooter determines that the problem is located
outside the control of the organization, what is the next step? |
Contact the administrator of the
external system. |
Which component in
a traditional infrastructure device provides Layer 2 and Layer 3 functions to
create data paths within a network? |
control plane |
How many
"things" are predicted to be interconnected on the Internet by
2020? |
50 billion |
The show ip route
and show ipv6 route commands are used to display the routing table in a
router to learn the directly connected neighbors, more remote devices
(through learned routes), and the routing protocols that have been
configured. |
True |
Which feature sends
simulated data across the network and measures performance between multiple
network locations? |
IP SLA |
Thanks for posting such a Useful information .You done a great job.
ReplyDeleteBusiness Transformation Specialist
Expert Consultancy