ENSA 10 Flashcards

1
Q

Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?

exchanging link-state advertisements
electing the designated router
injecting the default route
establishing neighbor adjacencies

A

establishing neighbor adjacencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?

to obtain specially designed operating systems preloaded with tools optimized for hacking

to detect any evidence of a hack or malware in a computer or network

to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network

to reverse engineer binary files when writing exploits and when analyzing malware

A

to detect any evidence of a hack or malware in a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem?

Interface Fa0/0 has not been activated for OSPFv2 on router R2.

Interface Fa0/0 is configured as a passive-interface on router R2.

Interface S0/0 is configured as a passive-interface on router R2.

Interface s0/0 has not been activated for OSPFv2 on router R2.

A

Interface Fa0/0 has not been activated for OSPFv2 on router R2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?

dedicated servers

software defined networking

virtualization

Cisco ACI

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)

show ip protocols

show ip ospf neighbor

show running-configuration

show ip ospf interface

show ip route ospf

A

show ip ospf neighbor

show ip ospf interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers?

MPLS VPN

GRE over IPsec

IPsec virtual tunnel interface

dynamic multipoint VPN

A

GRE over IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems?

to detect any evidence of a hack or malware in a computer or network

to obtain specially designed operating systems preloaded with tools optimized for hacking

to encode data, using algorithm schemes, to prevent unauthorized access to the encrypted data

to reverse engineer binary files when writing exploits and when analyzing malware

A

to obtain specially designed operating systems preloaded with tools optimized for hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command would be used as part of configuring NAT or PAT to identify an interface as part of the external global network?

ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside

A

ip nat outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

data center
cloud services
virtualization
dedicated servers

A

virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec

A

IPsec virtual tunnel interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link?

building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route

A

exchanging link-state advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of traffic is described as using either TCP or UDP depending on the need for error recovery?

video
voice
data

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation?
CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security, and Automation 44

extended ACL outbound on R2 WAN interface towards the internet

standard ACL outbound on R2 S0/0/0

extended ACL inbound on R2 S0/0/0

standard ACL inbound on R2 WAN interface connecting to the internet

A

extended ACL outbound on R2 WAN interface towards the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?

ip nat inside source static 172.19.89.13 198.133.219.65

ip nat inside source list 24 interface serial 0/1/0 overload

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

ip nat outside

A

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?

data link
access
core
network
network access

A

core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An ACL is applied inbound on router interface. The ACL consists of a single entry:

access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp
If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted
denied

A

permitted

17
Q

What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?

video
data
voice

A

data

18
Q

Which OSPF table is identical on all converged routers within the same OSPF area?

routing
neighbor
adjacency
topology

A

topology

19
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www .

If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?

permitted
denied

A

permitted

20
Q

What protocol allows the manager to poll agents to access information from the agent MIB?

CBWFQ
SYSLOG
TFTP
SNMP

A

SNMP