ENSA 8 Flashcards

1
Q

In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

It can be viewed by using the show ip ospf database command.

A neighbor table is created based on the LSDB.

It contains a list of only the best routes to a particular network.

It contains a list of all neighbor routers to which a router has established bidirectional communication.

All routers within an area have an identical link-state database.

A

It can be viewed by using the show ip ospf database command.

All routers within an area have an identical link-state database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In an OSPF network which OSPF structure is used to create the neighbor table on a router?

adjacency database

link-state database

routing table

forwarding database

A

adjacency database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol is used in a system that consists of three elements–a manager, agents, and an information database?

MPLS
SYSLOG
SNMP
TFTP

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of traffic is described as not resilient to loss?

data
video
voice

A

video

Explanation:
Video traffic tends to be unpredictable, inconsistent, and bursty compared to voice traffic. Compared to voice, video is less resilient to loss and has a higher volume of data per packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the Internet. What is a possible reason for this lack of connectivity?

Interface Fa0/0 should be configured with the command ip nat outside.

The inside global address is incorrect.

The router NAT configuration has an incorrect inside local address.

The NAT configuration on interface S0/0/1 is incorrect.

A

The router NAT configuration has an incorrect inside local address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

open

partner

public

private

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

XML
HTML
YAML
JSON

A

XML

Explanation:
Common data formats that are used in many applications including network automation and programmability include these:

JavaScript Object Notation (JSON) – In JSON, the data known as an object is one or more key/value pairs enclosed in braces { }. Keys must be strings within double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a related set of tags data.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is one or more key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet .

If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?

denied
permitted

A

denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?

10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1

A

192.168.1.100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

NTP
LLDP
SNMP
MPLS

A

LLDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?

MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN

A

dynamic multipoint VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a characteristic of the REST API?

evolved into what became SOAP
used for exchanging XML structured information over HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services

A

most widely used API for web services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A student, doing a summer semester of study overseas, has taken hundreds of pictures on a smartphone and wants to back them up in case of loss. What service or technology would support this requirement?

Cisco ACI
cloud services
software defined networking
dedicated servers

A

cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server:

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out
Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?

R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21

R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any

A

R1(config)# interface gi0/0
R1(config-if)# no ip access-group 105 out
R1(config)# no access-list 105
R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20
R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21
R1(config)# access-list 105 deny ip any any
R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-bandwidth link.

Place standard ACLs close to the destination IP address of the traffic.

Place standard ACLs close to the source IP address of the traffic.

Place extended ACLs close to the destination IP address of the traffic.

Place extended ACLs close to the source IP address of the traffic.

For every inbound ACL placed on an interface, there should be a matching outbound ACL.

A

Filter unwanted traffic before it travels onto a low-bandwidth link.

Place standard ACLs close to the destination IP address of the traffic.

Place extended ACLs close to the source IP address of the traffic.

Explanation: Extended ACLs should be placed as close as possible to the source IP address, so that traffic that needs to be filtered does not cross the network and use network resources. Because standard ACLs do not specify a destination address, they should be placed as close to the destination as possible. Placing a standard ACL close to the source may have the effect of filtering all traffic, and limiting services to other hosts. Filtering unwanted traffic before it enters low-bandwidth links preserves bandwidth and supports network functionality. Decisions on placing ACLs inbound or outbound are dependent on the requirements to be met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command would be used as part of configuring NAT or PAT to display all static translations that have been configured?

show ip nat translations
show ip pat translations
show ip cache
show running-config

A

show ip nat translations

17
Q

A network administrator modified an OSPF-enabled router to have a hello timer setting of 20 seconds. What is the new dead interval time setting by default?

40 seconds
60 seconds
80 seconds
100 seconds

A

80 seconds

18
Q

Which type of VPN is the preferred choice for support and ease of deployment for remote access?

SSL VPN
GRE over IPsec
dynamic multipoint VPN
IPsec virtual tunnel interface

A

SSL VPN

19
Q

What type of traffic is described as predictable and smooth?

video
data
voice

A

Voice

20
Q
  1. Which queuing mechanism has no provision for prioritizing or buffering but simply forwards packets in the order they arrive?

FIFO
LLQ
CBWFQ
WFQ

A

FIFO