ENSA 2 Flashcards
(15 cards)
A network technician is configuring SNMPv3 and has set a security level of SNMPv3 authPriv. What is a feature of using this level?
authenticates a packet by using the SHA algorithm only
authenticates a packet by a string match of the username or community string
authenticates a packet by using either the HMAC with MD5 method or the SHA method
authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and a username
authenticates a packet by using either the HMAC with MD5 method or the SHA method
Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?
extended ACL inbound on R1 G0/0
extended ACL outbound on R2 WAN interface towards the internet
extended ACL outbound on R2 S0/0/1
extended ACLs inbound on R1 G0/0 and G0/1
extended ACL inbound on R1 G0/0
Explanation: Standard ACLs permit or deny packets based only on the source IPv4 address. Because all traffic types are permitted or denied, standard ACLs should be located as close to the destination as possible.
Extended ACLs permit or deny packets based on the source IPv4 address and destination IPv4 address, protocol type, source and destination TCP or UDP ports and more. Because the filtering of extended ACLs is so specific, extended ACLs should be located as close as possible to the source of the traffic to be filtered. Undesirable traffic is denied close to the source network without crossing the network infrastructure.
Which QoS technique smooths packet output rate?
policing
shaping
weighted random early detection
Integrated Services (IntServ)
marking
shaping
Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement?
data center
virtualization
cloud services
dedicated servers
cloud services
Which step in the link-state routing process is described by a router inserting best paths into the routing table?
declaring a neighbor to be inaccessible
executing the SPF algorithm
load balancing equal-cost paths
choosing the best route
choosing the best route
What type of traffic is described as requiring at least 384 Kbps of bandwidth?
voice
data
video
Video
What are two features to consider when creating a named ACL? (Choose two.)
Use alphanumeric characters if needed.
Use special characters, such as ! or * to show the importance of the ACL.
Modify the ACL using a text editor.
Be descriptive when creating the ACL name.
Use a space for ease of reading to separate the name from the description
Use alphanumeric characters if needed.
Be descriptive when creating the ACL name.
Explanation: The following summarizes the rules to follow for named ACLs:
Assign a name to identify the purpose of the ACL.
Names can contain alphanumeric characters.
Names cannot contain spaces or punctuation.
It is suggested that the name be written in CAPITAL LETTERS.
Entries can be added or deleted within the ACL.
Which OSPF database is identical on all converged routers within the same OSPF area?
neighbor
forwarding
link-state
adjacency
link-state
Explanation: Regardless of which OSPF area a router resides in, the adjacency database, routing table, and forwarding database are unique for each router. The link-state database lists information about all other routers within an area and is identical across all OSPF routers participating in that area.
Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface. When following the best practices, in what location should the standard ACL be applied?
R2 G0/1 inbound
R2 S0/0/1 outbound
R1 S0/0/0 outbound
R2 G0/1 outbound
R2 G0/0 outbound
R2 G0/1 outbound
If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?
permitted
denied
denied
- Refer to the exhibit. Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation?
extended ACL outbound on R2 S0/0/1
standard ACL outbound on R2 S0/0/0
standard ACL inbound on R2 WAN interface connecting to the internet
extended ACL inbound on R2 S0/0/0
extended ACL outbound on R2 S0/0/1
- A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process?
show cdp neighbors
show ip interface brief
show interface g0/5
show cdp
show interface g0/5
- Which virtual resource would be installed on a network server to provide direct access to hardware resources?
VMware Fusion
a management console
a dedicated VLAN
a Type 1 hypervisor
Explanation: Type 1 hypervisors, the hypervisor is installed directly on the server or networking hardware. Then, instances of an OS are installed on the hypervisor, as shown in the figure. Type 1 hypervisors have direct access to the hardware resources. Therefore, they are more efficient than hosted architectures. Type 1 hypervisors improve scalability, performance, and robustness.
a Type 1 hypervisor
What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets?
SNMP
MPLS
LLDP
NTP
LLDP
What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?
ip nat inside source list ACCTNG pool POOL-STAT
ip nat translation timeout 36000
ip nat inside source list 14 pool POOL-STAT overload
ip nat inside source static 172.19.89.13 198.133.219.65
ip nat inside source list 14 pool POOL-STAT overload