ENSA 2 Flashcards

1
Q

A network technician is configuring SNMPv3 and has set a security level of SNMPv3 authPriv. What is a feature of using this level?

authenticates a packet by using the SHA algorithm only

authenticates a packet by a string match of the username or community string

authenticates a packet by using either the HMAC with MD5 method or the SHA method

authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and a username

A

authenticates a packet by using either the HMAC with MD5 method or the SHA method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?

extended ACL inbound on R1 G0/0

extended ACL outbound on R2 WAN interface towards the internet

extended ACL outbound on R2 S0/0/1

extended ACLs inbound on R1 G0/0 and G0/1

A

extended ACL inbound on R1 G0/0

Explanation: Standard ACLs permit or deny packets based only on the source IPv4 address. Because all traffic types are permitted or denied, standard ACLs should be located as close to the destination as possible.

Extended ACLs permit or deny packets based on the source IPv4 address and destination IPv4 address, protocol type, source and destination TCP or UDP ports and more. Because the filtering of extended ACLs is so specific, extended ACLs should be located as close as possible to the source of the traffic to be filtered. Undesirable traffic is denied close to the source network without crossing the network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which QoS technique smooths packet output rate?

policing

shaping

weighted random early detection

Integrated Services (IntServ)
marking

A

shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement?

data center

virtualization

cloud services

dedicated servers

A

cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which step in the link-state routing process is described by a router inserting best paths into the routing table?

declaring a neighbor to be inaccessible

executing the SPF algorithm

load balancing equal-cost paths

choosing the best route

A

choosing the best route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of traffic is described as requiring at least 384 Kbps of bandwidth?

voice
data
video

A

Video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two features to consider when creating a named ACL? (Choose two.)

Use alphanumeric characters if needed.

Use special characters, such as ! or * to show the importance of the ACL.

Modify the ACL using a text editor.

Be descriptive when creating the ACL name.

Use a space for ease of reading to separate the name from the description

A

Use alphanumeric characters if needed.

Be descriptive when creating the ACL name.

Explanation: The following summarizes the rules to follow for named ACLs:

Assign a name to identify the purpose of the ACL.
Names can contain alphanumeric characters.
Names cannot contain spaces or punctuation.
It is suggested that the name be written in CAPITAL LETTERS.
Entries can be added or deleted within the ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which OSPF database is identical on all converged routers within the same OSPF area?

neighbor

forwarding

link-state

adjacency

A

link-state

Explanation: Regardless of which OSPF area a router resides in, the adjacency database, routing table, and forwarding database are unique for each router. The link-state database lists information about all other routers within an area and is identical across all OSPF routers participating in that area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface. When following the best practices, in what location should the standard ACL be applied?

R2 G0/1 inbound

R2 S0/0/1 outbound

R1 S0/0/0 outbound

R2 G0/1 outbound

R2 G0/0 outbound

A

R2 G0/1 outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted

denied

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Refer to the exhibit. Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation?

extended ACL outbound on R2 S0/0/1

standard ACL outbound on R2 S0/0/0

standard ACL inbound on R2 WAN interface connecting to the internet

extended ACL inbound on R2 S0/0/0

A

extended ACL outbound on R2 S0/0/1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process?

show cdp neighbors

show ip interface brief

show interface g0/5

show cdp

A

show interface g0/5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which virtual resource would be installed on a network server to provide direct access to hardware resources?

VMware Fusion

a management console

a dedicated VLAN

a Type 1 hypervisor

Explanation: Type 1 hypervisors, the hypervisor is installed directly on the server or networking hardware. Then, instances of an OS are installed on the hypervisor, as shown in the figure. Type 1 hypervisors have direct access to the hardware resources. Therefore, they are more efficient than hosted architectures. Type 1 hypervisors improve scalability, performance, and robustness.

A

a Type 1 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets?

SNMP

MPLS

LLDP

NTP

A

LLDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?

ip nat inside source list ACCTNG pool POOL-STAT

ip nat translation timeout 36000

ip nat inside source list 14 pool POOL-STAT overload

ip nat inside source static 172.19.89.13 198.133.219.65

A

ip nat inside source list 14 pool POOL-STAT overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly