Data Communications and Networking 4

Data Communications and Networking 4
(PreQ1, Q2)
(PreMP1, MP2)
(PreXam)
(MidQ1, Q2)
(MXam, MLab)
(MLabQ1, Q2)
(FinQ1, Q2)
(FinLQ1, Q2)




Question text

The  is considered to be the brains of the ACI architecture. 

Question text

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

Select one:

Question text

 This is typically regarded as the brains of a device.

Question text

 A purpose-built hardware solution for integrating cloud computing and data center management.

Question text

  An  is a collection of end-point groups (EPG), their connections, and the policies that define those connections.

Question text

Which network traffic management technology is a basic element in SDN implementations?

Select one:

Question text

What is an example of an M2M connection?

Select one:

Question text

 This type of SDN uses a centralized controller that has knowledge of all devices in the network.

Question text

How many "things" are predicted to be interconnected on the Internet by 2020?

Select one:

Question text

Cloud computing and virtualization are different terms that refer to the same thing.

Select one:
 

Question text

Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.

Select one:

Question text

SDN is a network architecture that has been developed to virtualize the network. 

Select one:
 

Question text

What is a characteristic of data flow processing in SDN?

Select one:

Question text

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

Select one:

Question text

Which term describes the data exchanges between virtual servers in a data center?

Select one:

Question text

 These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.

Question text

The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.

Select one:
 

Question text

 Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.

Question text

What is Fog computing?

Select one:

Question text

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

Select one:
 

Question text

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. 

Select one:

Question text

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.


Select one:
 

Question text

Packets are classified into different flows based on header information including the ToS value.


Select one:

Question text

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

Select one:
 

Question text

Network traffic can be marked at both Layer 2 and Layer 3 for QoS..

Select one:
 

Question text

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

Select one:

Question text

What happens when the memory queue of a device fills up and new network traffic is received?

Select one:

Question text

What does the FIFO queuing stands for? 

Question text

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

Select one:
 

Question text

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

Select one:
 

Question text

The  QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.

Question text

Which statement describes the QoS classification and marking tools?

Select one:

Question text

 Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).

Select one:

Question text

Which model is the only QoS model with no mechanism to classify packets?

Select one:

Question text

Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?

Select one:

Question text

What is the default queuing method used on the LAN interfaces of Cisco devices?

Select one:

Question text

How many levels of priority are possible when using class of service (CoS) marking on frames?

Select one:

Question text

What does the WFQ  automated scheduling method stands for? 

Question text

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. 

Select one:

Question text

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Select one:

Question text

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

Select one:

Question text

Packets are classified into different flows based on header information including the ToS value.


Select one:

Question text

Packets are forwarded in the order in which they are received.

Select one:

Question text

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.


Select one:
 

Question text

MAC address table flooding attacks are addressed with port security.

Select one:
 

Question text

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

Select one:
 

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:
 

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:
 

Question text

It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password

Question text

Which mode is used to configure SNMP?

Select one:

Question text

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

Select one:
 

Question text

It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.

Question text

It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password

Question text

What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

Select one:

Question text

The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.

Select one:
 

Question text

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

Select one:
 

Question text

The show monitor command is used to verify the SPAN session.

Select one:
 

Question text

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

Select one:

Question text

DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.

Select one:
 

Question text

SNMP is an application layer protocol that provides a message format for communication between managers and agents

Select one:
 

Question text

 allows source and destination ports to be in different switches. 

Question text

DHCP   is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:
 

Question text

MAC address table flooding attacks are addressed with port security.

Select one:
 

Question text

What is an SNMP management agent?

Select one:

Question text

How can SNMP access be restricted to a specific SNMP manager?

Select one:

Question text

It is a type of DHCP  attack where the attacker configures a fake DHCP server on the network to issue IP  addresses to clients. 

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:
 

Question text

It is a type of DHCP where the  attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.


Question text

Which protocol is used by PPP to provide authentication and protection from playback attacks?

Select one:

Question text

A newer and faster technology considered to be part of 4G technology.

Question text

Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?

Select one:

Question text

A type of digital modem used with high-speed DSL or cable Internet service.

Question text

This is a point established in a building or complex to separate customer equipment from service provider equipment.

Question text

Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?

Select one:

Question text

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

Select one:

Question text

What is a disadvantage of leased lines?

Select one:

Question text

Which PPP protocol allows a device to specify an IP address for routing over the PPP link?

Select one:

Question text

A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.

Select one:
 

Question text

What TCP port is used by BGP to exchange messages between routers?

Select one:

Question text

Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?

Select one:

Question text

With which layers of the OSI model do the PPP control protocols interface?

Select one:

Question text

 It is a WAN protocol that provides  Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits. 

Question text

Which statement correctly describes a WAN technology?

Select one:

Question text

What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?

Select one:

Question text

Which public WAN technology provides security by using encrypted tunnels over Internet connections?

Select one:

Question text

 It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-switched connections when the link uses two Cisco devices.

Question text

What equipment at the cable service provider office connects the office to the subscriber locations?


Select one:

Question text

What is an advantage offered by GRE tunnels?

Select one:

Question text

What equipment at the cable service provider office connects the office to the subscriber locations?


Select one:

Question text

What TCP port is used by BGP to exchange messages between routers?

Select one:

Question text

External BGP is the routing protocol used between routers in different autonomous systems.

Select one:
 

Question text

When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?

Select one:

Question text

What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?

Select one:

Question text

Internal BGP is the routing protocol used between routers in the same AS.

Select one:
 

Question text

Which statement describes a characteristic of standard IPv4 ACLs?

Select one:

Question text

 A general term for Internet services from a mobile phone or from any device that uses the same technology.

Question text

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

Select one:

Question text

Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.

Select one:
 

Question text

Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?

Select one:

Question text

What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?

Select one:

Question text

 A newer and faster technology considered to be part of 4G technology.

Question text

What is an advantage offered by GRE tunnels?

Select one:

Question text

To verify the state of a GRE tunnel, use the show interface tunnel command.

Select one:
 

Question text

Which statement describes a difference between the operation of inbound and outbound ACLs?

Select one:

Question text

Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.

Select one:
 

Question text

Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

Select one:
 

Question text

A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.

Select one:
 

Question text

The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.

Select one:
 

Question text

A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?

Select one:

Question text

What is a disadvantage of leased lines?

Select one:

Question text

Which statement correctly describes a WAN technology?

Select one:

Question text

Which PPP protocol allows a device to specify an IP address for routing over the PPP link?

Select one:

Question text

With which layers of the OSI model do the PPP control protocols interface?

Select one:

Question text

Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?

Select one:

Question text

What is a characteristic of a WAN?

Select one:

Question text

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

Select one:

Question text

A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?

Select one:

Question text

What is a disadvantage of leased lines?

Select one:

Question text

Which public WAN technology provides security by using encrypted tunnels over Internet connections?

Select one:

Question text

Which public WAN technology provides security by using encrypted tunnels over Internet connections?

Select one:

Question text

Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic?

Select one:

Question text

A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?

Select one:

Question text

PPP authentication is performed at which OSI layer?

Select one:

Question text

What function does NCP perform in the establishment of a PPP session?

Select one:

Question text

Which protocol is used by PPP to provide authentication and protection from playback attacks?

Select one:

Question text

Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination?

Select one:

Question text

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

Select one:

Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?

Select one:

Question text

What is an advantage offered by GRE tunnels?

Select one:

Question text

A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?

Select one:

Question text

The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.

Select one:
 

A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?

Select one:

Question text

To verify the state of a GRE tunnel, use the show interface tunnel command.

Select one:
 

Question text

When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?

Select one:

Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.

Select one:
 

Question text

Which statement describes a characteristic of standard IPv4 ACLs?

Select one:

 A general term for Internet services from a mobile phone or from any device that uses the same technology. 

Question text

 It is a networking device that provides internetworking and WAN access interface ports that are used to connect to the service provider network. 

Which statement describes a difference between the operation of inbound and outbound ACLs?

Select one:

External BGP is the routing protocol used between routers in different autonomous systems.

Select one:
 

A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?

Select one:

What is a disadvantage of leased lines?

Select one:

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

Select one:

Question text

A general term for Internet services from a mobile phone or from any device that uses the same technology.

Question text

What function does NCP perform in the establishment of a PPP session?

Select one:

Question text

When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?

Select one:

Question text

Which public WAN technology provides security by using encrypted tunnels over Internet connections?

Select one:

Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.

Select one:
 

Question text

 a type of network that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate.

Question text

PPP authentication is performed at which OSI layer?

Select one:

Question text

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

Select one:

What is a characteristic of a WAN?

Select one:

Question text

Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

Select one:
 

Question text

Internal BGP is the routing protocol used between routers in the same AS.

Select one:
 

Question text

 A newer and faster technology considered to be part of 4G technology.

Question text

Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic?

Select one:

Question text

What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?

Select one:

Question text

Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination?

Select one:

Question text

The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.

Select one:
 

Question text

Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.

Select one:
 

Question text

When is the most appropriate time to measure network operations to establish a network performance baseline?

Select one:

Question text

The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.

Select one:
 

Question text

The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.

Select one:
 

Question text

A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?

Select one:

Question text

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?

Select one:

Question text

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?

Select one:

Question text

 diagrams keep track of the location, function, and status of devices on the network.

Question text

A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?

Select one:

Question text

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?

Select one:

Question text

Which feature sends simulated data across the network and measures performance between multiple network locations?

Select one:

Question text

The  transmits bits from one computer to another and regulates the transmission of a stream of bits over the physical mediu

Question text

Which statement describes the physical topology for a LAN?

Select one:

Question text

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?

Select one:

Question text

 topology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.

Question text

  topology shows the physical layout of the devices connected to the network.

Question text

The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.

Select one:
 

Question text

 are specialized, handheld devices designed for testing the various types of data communication cabling.

Question text

A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?

Select one:

Question text

It is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ.

Question text

It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes.

Question text

Which model is the only QoS model with no mechanism to classify packets?

Select one:

Question text

What is the default queuing method used on the LAN interfaces of Cisco devices?

Select one:

Question text

It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question text

It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password

Question text

It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic.

Question text

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

Select one:

Question text

It is an ever increasing requirement of networks today

Select one:

Question text

MAC address table flooding attacks are addressed with port security.

Select one:

Question text

It is a queuing algorithm  also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.

Question text

What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

Select one:

Question text

It is a type of DHCP  attack where the attacker configures a fake DHCP server on the network to issue IP  addresses to clients. 

Question text

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.


Select one:

Question text

Which mode is used to configure SNMP?

Select one:

Question text

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

Select one:

Question text

 Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).

Select one:

Question text

It SPAN Terminology which  refers to the traffic that enters the switch.

Question text

What happens when the memory queue of a device fills up and new network traffic is received?

Select one:

Question text

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

Select one:

Question text

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

Select one:

Question text

What is an SNMP management agent?

Select one:

Question text

The show monitor command is used to verify the SPAN session.

Select one:

Question text

SNMP is an application layer protocol that provides a message format for communication between managers and agents

Select one:

Question text

It is an  SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port

Question text

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

Select one:

Question text

What does the FIFO queuing stands for?  

Question text

Packets are classified into different flows based on header information including the ToS value.


Select one:

Question text

 allows source and destination ports to be in different switches.

Question text

The  feature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port, out another port on the same switch. 

Question text

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

Select one:

Question text

 allows source and destination ports to be in different switches. 

Question text

It is a type of DHCP where the  attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.

Question text

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

Select one:

Question text

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

Select one:

Question text

Network traffic can be marked at both Layer 2 and Layer 3 for QoS..

Select one:

Question text

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

Select one:

Question text

How can SNMP access be restricted to a specific SNMP manager?

Select one:
Flag question

Question text

DHCP   is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.


Question text

How many levels of priority are possible when using class of service (CoS) marking on frames?

Select one:

Question text

What does the WFQ  automated scheduling method stands for? 

Question text

The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.

Select one:

Question text

Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?

Select one:

Question text

Packets are forwarded in the order in which they are received.

Select one:

Question text

The  QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.

Question text

It is a SPAN Terminology which  refers to the traffic that leaves the switch. 

Question text

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. 

Select one:

Question text

DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.

Select one:

Question text

Which statement describes the QoS classification and marking tools?

Select one: