ENSA 1 Flashcards

1
Q

Which design feature will limit the size of a failure domain in an enterprise network?

the purchase of enterprise equipment that is designed for large traffic volume

the installation of redundant power supplies

the use of a collapsed core design

the use of the building switch block approach

A

the use of the building switch block approach

Explanation: In order to best limit the of a failure domain, routers or multilayer switches can be deployed in pairs. The failure of a single device should not cause the network to go down. Installing redundant power supplies may protect a single device from a power failure, but if that device suffers from another type of problem, a redundant device would have been a better solution. Purchasing enterprise equipment that handles large flows of traffic will not provide extra reliability in times of an outage. If a collapsed core design is used, the core and distribution are collapsed into a single device, increasing the chance of a devastating outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

the system image file

the NVRAM file system

the configuration register value

the startup configuration file

system ROM

A

the configuration register value

the startup configuration file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of network uses one common infrastructure to carry voice, data, and video signals?

borderless

converged

managed

switched

A

converged

Explanation: A converged network has only one physical network to install and manage. This results in substantial savings over the installation and management of separate voice, video, and data networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three advantages of using private IP addresses and NAT? (Choose three.)

hides private LAN addressing from outside devices that are connected to the Internet

permits LAN expansion without additional public IP addresses

reduces CPU usage on customer routers
creates multiple public IP addresses

improves the performance of the router that is connected to the Internet

conserves registered public IP addresses

A

hides private LAN addressing from outside devices that are connected to the Internet

permits LAN expansion without additional public IP addresses

conserves registered public IP addresses

Explanation: Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two scenarios are examples of remote access VPNs? (Choose two.)

All users at a large branch office can access company resources through a single VPN connection.

A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.

A toy manufacturer has a permanent VPN connection to one of its parts suppliers.

A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

A

A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

Explanation: Remote access VPNs connect individual users to another network via a VPN client that is installed on the user device. Site-to-site VPNs are “always on” connections that use VPN gateways to connect two sites together. Users at each site can access the network on the other site without having to use any special clients or configurations on their individual devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three benefits of cloud computing? (Choose three.)

It utilizes end-user clients to do a substantial amount of data preprocessing and storage.

It uses open-source software for distributed processing of large datasets.

It streamlines the IT operations of an organization by subscribing only to needed services.

It enables access to organizational data anywhere and at any time.

It turns raw data into meaningful information by discovering patterns and relationships.

It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

A

It streamlines the IT operations of an organization by subscribing only to needed services.

It enables access to organizational data anywhere and at any time.

It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a characteristic of a single-area OSPF network?

All routers share a common forwarding database.

All routers have the same neighbor table.

All routers are in the backbone area.

All routers have the same routing table.

A

All routers are in the backbone area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a WAN?

a network infrastructure that spans a limited physical area such as a city

a network infrastructure that provides access to other networks over a large geographic area

a network infrastructure that provides access in a small geographic area

a network infrastructure designed to provide data storage, retrieval, and replication

A

a network infrastructure that provides access to other networks over a large geographic area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?

data center

virtualization

dedicated servers

software defined networking

A

data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

link-state update

hello

database description

link-state request

A

hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements are characteristics of a virus? (Choose two.)

A virus has an enabling vulnerability, a propagation mechanism, and a payload.

A virus can be dormant and then activate at a specific time or date.

A virus provides the attacker with sensitive data, such as passwords.

A virus replicates itself by independently exploiting vulnerabilities in networks.

A virus typically requires end-user activation.

A

A virus can be dormant and then activate at a specific time or date.

A virus typically requires end-user activation.

Explanation: The type of end user interaction required to launch a virus is typically opening an application, opening a web page, or powering on the computer. Once activated, a virus may infect other files located on the computer or other computers on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

ISDN

DSL

cable

dialup

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?

packet-switched network

Ethernet WAN

circuit-switched network

MPLS

A

Ethernet WAN

Explanation: MPLS can use a variety of underlying technologies such as T- and E-Carriers, Carrier Ethernet, ATM, Frame Relay, and DSL, all of which support lower speeds than an Ethernet WAN. Neither a circuit-switched network, such as the public switched telephone network (PSTN) or Integrated Service Digital Network (ISDN), nor a packet-switched network, is considered high speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?

to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network

to reverse engineer binary files when writing exploits and when analyzing malware

to obtain specially designed operating systems preloaded with tools optimized for hacking

to detect any evidence of a hack or malware in a computer or network

A

to reverse engineer binary files when writing exploits and when analyzing malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

R1#
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches) 20 deny any (1 match)

Two devices connected to the router have IP addresses of 192.168.10. x .

Two devices were able to use SSH or Telnet to gain access to the router.

Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.

Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.

A

Two devices were able to use SSH or Telnet to gain access to the router.

Explanation: The access-class command is used only on VTY ports. VTY ports support Telnet and/or SSH traffic. The match permit ACE is how many attempts were allowed using the VTY ports. The match deny ACE shows that a device from a network other than 192.168.10.0 was not allowed to access the router through the VTY ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?

clear ip dhcp

clear ip nat translation

clear access-list counters

clear ip pat statistics

A

clear ip nat translation

17
Q

What are two characteristics of video traffic? (Choose two.)

Video traffic consumes less network resources than voice traffic consumes.

Video traffic latency should not exceed 400 ms.

Video traffic is more resilient to loss than voice traffic is.

Video traffic requires a minimum of 30 kbs of bandwidth.

Video traffic is unpredictable and inconsistent.

A

Video traffic is unpredictable and inconsistent.

Video traffic latency should not exceed 400 ms.

18
Q

Refer to the exhibit. A technician is configuring R2 for static NAT to allow the client to access the web server. What is a possible reason that the client PC cannot access the web server?

The IP NAT statement is incorrect.

Interface Fa0/1 should be identified as the outside NAT interface.

Interface S0/0/0 should be identified as the outside NAT interface.

The configuration is missing a valid access control list.

A

Interface S0/0/0 should be identified as the outside NAT interface.

Explanation: Interface S0/0/0 should be identified as the outside NAT interface. The command to do this would be R2(config-if)# ip nat outside

19
Q

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?

UPnP

MAC filtering

NAT

QoS

A

NAT

Explanation: Network Address Translation (NAT) is the process used to convert private addresses to internet-routable addresses that allow office devices to access the internet

20
Q

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

online collaboration

BYOD

virtualization

maintaining communication integrity

A

virtualization

Explanation: Virtualization technology can run several different operating systems in parallel on a single CPU.