CCNP Flashcards

(52 cards)

1
Q

What is the IPv6 address used by OSPFv3 non-DR/BDR routers to send link-state updates and link-state acknowledgments?

A

FF02::6

Non-DR/BDR routers send an update or link-state acknowledgment message to the DR and BDR by using the AllDRouters address FF02::6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two destination addresses will R1 use to establish a full adjacency with R2?

A

ff02::5, 2001:db8:21:20::2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On an OSPF multiaccess network, which multicast address must a non-DR router use to send an LSU packet that contains new link-state information?

A

224.0.0.6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which configuration will prevent two directly connected Cisco routers from forming an OSPFv2 neighbor adjacency?

A

configuring mismatched OSPF process IDs on two adjacent routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of OSPF link-state advertisement is a network LSA?

A

type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What advantage does WPA2 have over WPA?

A

WPA2 uses AES instead of TKIP.

WPA2 uses the encryption algorithm AES (Advanced Encryption Standard) which is a stronger algorithm than WPA is, which uses TKIP (Temporal Key Integrity Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which situation is an example of EAP deployment?

A

when a client communicates with a RADIUS server for authenticated access to the network through the AP

In a 802.1x WLAN environment, WPA2 with EAP (Extensible Authentication Protocol) allows for a back-end authentication server like Radius.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which function is provided by the Cisco SD-Access Architecture controller layer?

A

It provides network automation and operational status information to the management layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Match the Cisco SD-WAN solution component with the description.

A

vManage Network Management System – enables centralized provisioning and simplifies network changes, vSmart controller – authenticates each SD-WAN router that comes online, vBond orchestrator – configured with a public IP address so that all SD-WAN devices in the network can connect to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On which of the devices in a hierarchical network should routing between workstation VLANs take place?

A

the distribution layer devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On which devices should the inter-VLAN routing be configured?

A

Gateway, CS1, DS1, and DS2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which QoS model uses the DSCP bits to mark packets and provides 64 possible classes of service?

A

DiffServ

The DiffServ model uses 6-bits known as the DiffServ Code Point (DSCP) bits to mark traffic and offers a maximum of 64 possible classes of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of QoS marking is applied to Ethernet frames?

A

Cos

The class of service (CoS) marking allows a Layer 2 Ethernet frame to be marked with eight levels of priority (values 0–7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which feature is used by an MST region to send VLAN information to a switch that runs PVST+?

A

PVST translation mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a solution to mitigate the MST misconfiguration with improper VLAN assignment to the IST?

A

Ensure that only VLANs in the same MSTI for a trunk link are pruned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which three statements describe the building blocks that make up the IPsec protocol framework?

A

IPsec uses encryption algorithms and keys to provide secure transfer of data, IPsec uses secret key cryptography to encrypt messages that are sent through a VPN, IPsec uses ESP to provide confidential transfer of data by encrypting IP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What two commands are needed to complete the GRE tunnel configuration on router R1?

A

R1(config-if)# tunnel source 172.16.2.1, R1(config-if)# tunnel destination 209.165.202.130

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are two reasons for creating an OSPF network with multiple areas?

A

to reduce use of memory and processor resources, to reduce SPF calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

On what type of OSPF router is interarea route summarization configured?

A

ABRs

Interarea summarization is manually configured on Area Border Routers (ABRs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the term given to a system that provides tools for organizations to use when advanced malware has slipped past other defenses?

A

Advanced Malware Protection (AMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

A

designated, alternate, root, root

22
Q

Which three ports will be STP designated ports?

A

fa0/10, fa0/21, fa0/13

23
Q

Which two statements describe characteristics of load balancing?

A

Unequal cost load balancing is supported by EIGRP, Load balancing allows a router to forward packets over multiple paths to the same destination network.

24
Q

Which type of IPv6 static route is configured in the exhibit?

A

recursive static route

The route provided points to another address that must be looked up in the routing table.

25
Which tool would the administrator use to make the suspicious traffic available for analysis at the college data center?
RSPAN
26
What are two benefits of using SNMP traps?
They reduce the load on network and agent resources, They eliminate the need for some periodic polling requests.
27
How will user traffic be forwarded between two laptops connected to the same lightweight access point?
The lightweight access point will switch the traffic between both laptops immediately.
28
What must be configured on the access point to enable remote management?
management IP address
29
Which three protocols are components in the operation of 802.1x?
EAPoL, EAP, RADIUS
30
Match the security platform to the description.
a centralized management platform that aggregates and correlates threat events – Cisco Firepower Management Center, a malware analysis and protection solution that goes beyond point-in-time detection – Cisco Stealthwatch, a security policy management platform that provides highly secure network access control – Cisco Identity Services Engine.
31
Which two conclusions can be derived from the output?
There is one feasible successor to network 192.168.1.8/30, The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.
32
Which two EIGRP metrics are measured by using static values on a Cisco device?
delay, bandwidth ## Footnote Bandwidth and delay are static values that are not actually tracked by a device.
33
Which factor can be used by an AP to improve the accuracy of locating a wireless client?
RSS
34
Which two EIGRP metrics are measured by using static values on a Cisco device? (Choose two.)
Bandwidth and delay are static values that are not actually tracked by a device.
35
Which factor can be used by an AP to improve the accuracy of locating a wireless client?
RSS (Received Signal Strength) can be used to measure the distance between the AP and the client.
36
What is required by wireless clients that participate in Cisco centralized key management for intracontroller roaming?
Cisco Compatible Extensions (CCX) support is required.
37
What issue might an AP show if it has no clients attached but shows 30% channel utilization on the 2.4 GHz channel?
The channel is significantly utilized by other nearby APs and clients using the 2.4 GHz frequency range.
38
What significance does an air quality index value of 40 provide for a lightweight AP?
An air quality value of 40 is within acceptable performance range for a lightweight AP, so no action is required.
39
In which type of deployment is the Chef server hosted in the cloud?
Hosted Chef is the deployment where the Chef server is hosted in the cloud.
40
What protocol is used by puppet masters to push configuration code to puppet agents?
HTTPS is used by puppet masters to push configuration code.
41
What does BGP use to exchange routing updates with neighbors?
BGP uses TCP connections to exchange routing updates.
42
What characteristic describes the advertisement of a route when the command 'show bgp ipv4 unicast 172.16.0.0' is issued?
The route is advertised through an IGP.
43
What are three examples of hypervisors? (Choose three.)
VMware vSphere, Microsoft Hyper-V, and Citrix XenServer are examples of hypervisors.
44
Which two methods are used by a single-root I/O virtualization (SR-IOV) enabled switch to switch traffic between VNFs? (Choose two.)
Traffic can be switched through a pNIC or through a vSwitch.
45
What is the effect of the command 'spanning-tree vlan 1 root primary' on S4?
S4 becomes the root bridge, causing S3 Gi0/2 port to transition from designated port to root port.
46
What is the most likely cause of CPU spikes and exhausted memory resources on all network devices?
A Layer 2 forwarding loop condition is present.
47
What type of signal requires little extra bandwidth because data is being sent at a relatively low bit rate?
Narrowband signals require little extra bandwidth.
48
Which wireless technology can combine multiple antennas to reconstruct a usable wireless signal?
Maximal-ratio combining can reconstruct a usable wireless signal.
49
Which command correctly applies the ACL for SSH access from host 172.16.1.100?
R1(config-line)# access-class 1 in
50
What two additional features does a Layer 3 switch offer compared with a Layer 2 switch? (Choose two.)
Routing that is based upon IP addresses and forwarding between different networks.
51
What is true about TCAM lookups associated with CEF switching?
A single TCAM lookup provides Layer 2, Layer 3, and ACL information.
52
What does an HTTP response code 403 indicate in a network management application using REST API?
Access is not granted based on supplied credentials.