A Wan Interconnects Lans Over Long Distances.
A Wan Interconnects Lans Over Long Distances.
A Wan Interconnects Lans Over Long Distances.
Which command sequence will place this list to meet these requirements?
Hera(config)# interface fa0/0
Hera(config-if)# ip access-group chemistry_block in
2
3
4*
5
75. Which statement describes a characteristic of standard IPv4 ACLs?
They are configured in the interface configuration mode.
They filter traffic based on source IP addresses only.*
They can be created with a number but not with a name.
They can be configured to filter traffic based on both source IP addresses and source
ports.
76. Which three values or sets of values are included when creating an extended access
control list entry? (Choose three.)
access list number between 1 and 99
access list number between 100 and 199*
default gateway address and wildcard mask
destination address and wildcard mask*
source address and wildcard mask*
source subnet mask and wildcard mask
destination subnet mask and wildcard mask
77. Refer to the exhibit. A router has an existing ACL that permits all traffic from the
172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that
denies packets from host 172.16.0.1 and receives the error message that is shown in the
exhibit. What action can the administrator take to block packets from host 172.16.0.1
while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny ACE with a sequence number of 5.*
Manually add the new deny ACE with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any ACE to access-list 1.
78. Which three implicit access control entries are automatically added to the end of an
IPv6 ACL? (Choose three.)
deny ip any any
deny ipv6 any any*
permit ipv6 any any
deny icmp any any
permit icmp any any nd-ns*
permit icmp any any nd-na*
79. The computers used by the network administrators for a school are on the 10.7.0.0/27
network. Which two commands are needed at a minimum to apply an ACL that will
ensure that only devices that are used by the network administrators will be allowed
Telnet access to the routers? (Choose two.)
access-class 5 in*
access-list 5 deny any
access-list standard VTY
permit 10.7.0.0 0.0.0.127
access-list 5 permit 10.7.0.0 0.0.0.31*
ip access-group 5 out
ip access-group 5 in
80. A network administrator is adding ACLs to a new IPv6 multirouter environment.
Which IPv6 ACE is automatically added implicitly at the end of an ACL so that two
adjacent routers can discover each other?
permit ip any any
permit ip any host ip_address
permit icmp any any nd-na*
deny ip any any
81. What would be the primary reason an attacker would launch a MAC address overflow
attack?
so that the switch stops forwarding traffic
so that legitimate hosts cannot obtain a MAC address
so that the attacker can see frames that are destined for other hosts*
so that the attacker can execute arbitrary code on the switch
82. What are three of the six core components in the Cisco IoT system? (Choose three.)
fog computing*
wearable technologies
data analytics*
robot guides
cyber and physical security*
smart bandages
83. What security countermeasure is effective for preventing CAM table overflow attacks?
port security*
DHCP snooping
IP source guard
Dynamic ARP Inspection
84. Which SNMP feature provides a solution to the main disadvantage of SNMP polling?
SNMP set messages
SNMP trap messages*
SNMP get messages
SNMP community strings
85. When SNMPv1 or SNMPv2 is being used, which feature provides secure access to MIB
objects?
packet encryption
message integrity
community strings*
source validationfeatures
86. What two are added in SNMPv3 to address the weaknesses of previous versions of
SNMP? (Choose two.)
bulk MIB objects retrieval
encryption*
authorization with community string priority
authentication*
ACL management filtering
87. Which queuing mechanism supports user-defined traffic classes?
FIFO
CBWFQ*
WFQ
FCFS
88. Which field is used to mark Layer 2 Ethernet frames for QoS treatment?
Type of Service field
Traffic Class field
Priority field*
Version field
89. What is an example of cloud computing?
a continuous interaction between people, processes, data, and things
a service that offers on-demand access to shared resources*
a network infrastructure that spans a large geographic area
an architectural style of the World Wide Web
90. Which type of resources are required for a Type 1 hypervisor?
a host operating system
a server running VMware Fusion
a management console*
a dedicated VLAN
91. A network technician made a configuration change on the core router in order to solve
a problem. However, the problem is not solved. Which step should the technician take
next?
Gather symptoms.
Isolate the problem.
Restore the previous configuration.*
Implement the next possible corrective action.
92. A user reports that when the corporate web page URL is entered on a web browser, an
error message indicates that the page cannot be displayed. The help-desk technician asks
the user to enter the IP address of the web server to see if the page can be displayed.
Which troubleshooting method is being used by the technician?
top-down
bottom-up
substitution
divide-and-conquer*
93. What is a primary function of the Cisco IOS IP Service Level Agreements feature?
to detect potential network attacks
to provide network connectivity for customers
to adjust network device configurations to avoid congestion
to measure network performance and discover a network failure as early as possible*
94. Which IOS log message level indicates the highest severity level?
level 0*
level 1
level 4
level 7
95. Which symptom is an example of network issues at the network layer?
A misconfigured firewall blocks traffic to a file server.
There are too many invalid frames transmitted in the network.
Neighbor adjacency is formed with some routers, but not all routers.*
A web server cannot be reached by its domain name, but can be reached via its IP
address.
96. Refer to the exhibit. H1 can only ping H2, H3, and the Fa0/0 interface of router R1. H2
and H3 can ping H4 and H5. Why might H1 not be able to successfully ping H4 and H5?
Router R1 does not have a route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.*
Hosts H4 and H5 are members of a different VLAN than host H1.
97. Refer to the exhibit. On the basis of the output, which two statements about network
connectivity are correct? (Choose two.)
interface reset
unplugged cable
improper cable type
PPP issue*
109. Refer to the exhibit. Which type of Layer 2 encapsulation used for connection D
requires Cisco routers?
Ethernet
PPPoE
HDLC*
PPP
110. Which three statements are true about PPP? (Choose three.)
PPP can use synchronous and asynchronous circuits.*
PPP can only be used between two Cisco devices.
PPP carries packets from several network layer protocols in LCPs.
PPP uses LCPs to establish, configure, and test the data-link connection.*
PPP uses LCPs to agree on format options such as authentication, compression, and
error detection.*
111. A network administrator is evaluating authentication protocols for a PPP link. Which
three factors might lead to the selection of CHAP over PAP as the authentication
protocol? (Choose three.)
establishes identities with a two-way handshake
uses a three-way authentication periodically during the session to reconfirm identities*
control by the remote host of the frequency and timing of login events
transmits login information in encrypted format*
uses an unpredictable variable challenge value to prevent playback attacks*
makes authorized network administrator intervention a requirement to establish each
session
112. Which cellular or mobile wireless standard is considered a fourth generation
technology?
LTE*
GSM
CDMA
UMTS
113. A company is looking for the least expensive broadband solution that provides at least
10 Mb/s download speed. The company is located 5 miles from the nearest provider.
Which broadband solution would be appropriate?
satellite
DSL
WiMax
cable*
114. Which technology can ISPs use to periodically challenge broadband customers over
DSL networks with PPPoE?
PAP
CHAP*
HDLC
Frame
Relay
115. What are the three core components of the Cisco ACI architecture? (Choose three.)
Application Network Profile*
Application Policy Infrastructure Controller*
Cisco Nexus Switches*
Microsoft hypervisor
Cisco Information Server
Virtual Security Gateway
116. Which statement describes a feature of site-to-site VPNs?
The VPN connection is not statically defined.
VPN client software is installed on each host.
Internal hosts send normal, unencapsulated packets.*
Individual hosts can enable and disable the VPN connection.
117. What are three features of a GRE tunnel? (Choose three.)
creates nonsecure tunnels between remote sites*
transports multiple Layer 3 protocols*
creates additional packet overhead*
uses RSA signatures to authenticate peeers
provides encryption to keep VPN traffic confidential
supports hosts as GRE tunnel endpoints by installing Cisco VPN client software
118. Refer to the exhibit. What two commands are needed to complete the GRE tunnel
configuration on router R1? (Choose two.)
121. Refer to the exhibit. A router has an existing ACL that permits all traffic from the
172.16.0.0 network. The administrator attempts to add a new statement to the ACL that
denies packets from host 172.16.0.1 and receives the error message that is shown in the
exhibit. What action can the administrator take to block packets from host 172.16.0.1
while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny statement with a sequence number of 5.*
Manually add the new deny statement with a sequence number of 15.
Create a second access list denying the host and apply it to the same interface.
Add a deny any any statement to access-list 1.
122. Refer to the exhibit. What can be determined from this output?
cisco54321
cisco98765
cisco123456*
cisco654321
132. A network administrator has noticed an unusual amount of traffic being received on a
switch port that is connected to a college classroom computer. Which tool would the
administrator use to make the suspicious traffic available for analysis at the college data
center?
RSPAN*
TACACS+
802.1X
DHCP snooping
SNMP
133. What network monitoring tool copies traffic moving through one switch port, and sends
the copied traffic to another switch port for analysis?
802.1
XSNMP
SPAN*
syslog
134. Voice packets are being received in a continuous stream by an IP phone, but because of
network congestion the delay between each packet varies and is causing broken
conversations. What term describes the cause of this condition?
buffering
latency
queuing
jitter*
135. What mechanism compensates for jitter in an audio stream by buffering packets and
then replaying them outbound in a steady stream?
digital
signal
processor
playout delay buffer*
voice codecWFQ
136. Which type of network traffic cannot be managed using congestion avoidance tools?
TCP
UDP*
IP
ICMP
137. A network administrator has moved the company intranet web server from a switch
port to a dedicated router interface. How can the administrator determine how this
change has affected performance and availability on the company intranet?
Conduct a performance test and compare with the baseline that was established
previously.*
Determine performance on the intranet by monitoring load times of company web
pages from remote sites.
Interview departmental administrative assistants to determine if web pages are
loading more quickly.
Compare the hit counts on the company web server for the current week to the values
that were recorded in previous weeks.
138. In which stage of the troubleshooting process would ownership be researched and
documented?
Gather symptoms.*
Implement corrective action.
Isolate the problem.
Update the user and document the problem.
139. Which troubleshooting approach is more appropriate for a seasoned network
administrator rather than a less-experienced network administrator?
a less-structured approach based on an educated guess*
an approach comparing working and nonworking components to spot significant
differences
a structured approach starting with the physical layer and moving up through the
layers of the OSI model until the cause of the problem is identified
an approach that starts with the end-user applications and moves down through the
layers of the OSI model until the cause of the problem has been identified
140. A router has been configured to use simulated network traffic in order to monitor the
network performance between the router and a distant network device. Which command
would display the results of this analysis?
show ip route
showip protocols
show ip sla statistics*
show monitor
141. Which type of tool would an administrator use to capture packets that are going to and
from a particular device?
NMS tool
knowledge base
baselining tool
protocol analyzer*
142. Refer to the exhibit. Which two statements describe the results of entering these
commands? (Choose two.)