Practice Tests Flashcards

1
Q

Which of the following entries from the “show ip route” command indicates a host route?
s* c
s d
l o

A

L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

From most preferred to last preferred, what are the route sources and there AD?

A

Directly connected 0
Static route 1
EIGRP Summary route 5
eBGP 20
iEIGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
eEIGRP 170
iBGP 200
unknown 255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is enabled on a Cisco router when you issue the “ntp server” command from the global configuration mode?

A

static client mode

Receives time from a ntp server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What components are used to calculate EIGRP composite metric by default?

A

Delay
Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is FlexConnect ACL’s supported?

A

They are supported by native vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you configure Gateway of last resort?

A

(config-router)default-information originate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a controller-based network, what type of protocols would be moved to a centralized controller?

A

Interior Gateway Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What API (Application Programing Interfaces) are typically used to enable communication between an SDN controller and the application controler?

A

REST
(Representational State Transfer)

OSGi
(Open Service Gateway Initiative)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does overlay do in a SDN?

A

Creates vxlan tunnels between SDA switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does underlay do in a SDA?

A

Is a collection of devices that comprises the IP network that connects to each fabric node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does northbound API do in a SDA?

A

Enables a SDA controller to communicate with applications in the application plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does fabric do in a SDA?

A

Is the entirety of the overlay network and the underlay network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does southbound API do in a SDA?

A

Enables an SDA controller to communicate with devices in the data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the Syslog messaging levels from worst to least?

A

Emergency
Alert
Critical
Error
Warning
Notification
Informational
Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When issuing “show ip nat translations” command, what five fields are given and what are they?

A

Pro- Protocol type
Inside global- displays an IP address that represents an inside host as seen by hosts on the outside network
Inside local- displays the IP address configured on a host on the local network
Outside local- displays the IP address of a host on the outside network as seen from a host on the inside network
Outside global- displays the IP address configured on a host on the outside network

Example:
pro inside global inside local outside local outside global
tcp 203.0.113.62: 10.1.7.7: 192.0.2.28 192.0.2.28

Host A: 10.1.7.7
Host B: 192.0.2.28
Router A inside: 10.1.7.1
Router A outside: 203.0.113.62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does standard 802.1W natively includes?

A

It is a Rapid Spanning Tree Protocol (RSTP) standard that natively includes Portfast, UplinkFast, and BackboneFast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What mode on a Cisco lightweight AP provides Bss’s?

A

Local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What deployment type describes an AP deployment that connects AP’s to a WLC that is housed within a switch stack?

A

embedded AP deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In regards to router setups, of the following protocols, how many of each protocols, have as main and secondary routers?
GLBP
HSRP
VRRP

A

GLBP- one active virtual gateway and multiple active virtual forwarders

HSRP- one active router and one standby router

VRRP- one master router and multiple backup routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You have enabled LAG on a WLC that contains eight distribution system ports. How many ports will be included in the LAG bundle by default?

A

eight

LAG- Link Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is true about dynamic interfaces on WLC’s?

A

typically used for client data

and are user-defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What plane uses northbound API to connect to a centralized controller?

A

Application plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What command will automatically enable SSH on a router?

A

crypto key generate rsa

“transport input ssh” still needs to be ran

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You issue the following commands on a Cisco routers fa0/0 interface:
ipv6 enable
no shutdown
The interface on the other side of the link is not yet configured. In addition, there is no DHCPv6 server on the network.
How many IPv6 addresses are configured on the interface?

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
You are configuring security on a new WLAN by using the WLC GUI. What would you possibly be configuring using Layer 3 Security drop-down list box on the Layer 3 tab?
VPN Pass-Through
26
What is displayed when you run the "show ap config global"?
Syslog server setting for every AP joined to the WLC
27
What is displayed when you run the "show ap config core-dump (hostname)"?
Displays the memory dump for a specific lightweight AP
28
What is displayed when you run "show ap crash-file"?
List of dump files generated by lightweight AP's
29
What is displayed when you run "show ap config general (hostname)"?
Displays IP addressing and other information about the specified AP
30
You are setting up SSH for VTY Lines. Hostname, domain name, and rsa key pair has not been configured. When you issue "crypto key generate rsa", what system message would you most likely receive?
Please define a hostname other than Router
31
On a Cisco WLAN, what are the wireless QoS priority levels and what traffic do they effect?
Platinum- Voice over IP Gold- video traffic and mission controller Silver- default settings, uses best effort Bronze- lowest bandwidth, used for guest services
32
What are some of the descriptors for server mode in VTP configuration?
creates/modifies/deletes vlans synchronizes VTP information originates VTP advertisements forwards VTP advertisements stores VLAN information in NVRAM
33
What are some of the descriptors for client mode in VTP configuration?
synchronizes VTP information originates VTP advertisements forwards VTP advertisements
34
What are some of the descriptors for transparent mode in VTP configuration?
creates/modifies/deletes vlans forwards VTP advertisements stores VLAN information in NVRAM
35
You want to establish an EtherChannel between SwitchA and SwitchB by using a Cisco-proprietary protocol. After you configure the ports on a SwitchA with the correct channel protocol, you issue the "channel-group 1 mode auto" command on the ports. Which commands should you issue on SwitchB to get the channel-groups working?
Channel-group 1 mode desirable channel-protocol pagp
36
What are some of the application layer protocols use TCP, UDP, or both? HTTP, SNMP, FTP, DHCP, SMTP, DNS, TFTP
TCP: HTTP,FTP, SMTP UDP: TFTP, DHCP, SNMP BOTH: DNS
37
What is WRED (Weighted Random Early Detection)?
A congestion avoidance mechanism that address packet loss caused by taildrop, which occurs when new incoming packets are dropped because router queues are to full to accept them.
38
Which command should you run on a switchport so that no more than two devices can send traffic into a port?
switchport port-security maximum 2
39
You are implementing common Layer 2 security measures on a Cisco switch. You create a new vlan with an ID of 4. No devices operate on this VLAN4. Next you issue the following commands: switchport access vlan4 switchport nonegitiate What Layer 2 security measures are you implementing?
disable DTP on a port moving the port to an unused vlan
40
What type of error happens when a packet must be re-sent because of an interruption that occurs before the 64th byte has been transmitted?
collisions
41
What prefix will a IPV6-enabled computer use to automatically configure a IPv6 address for itself?
FE80::/10
42
What prefix would be used for a IPv6 unicast unique-local address?
FC00::/7
43
What prefix would be used for IPv6 multicast address?
FF00::/7
44
You issue the "spanning-tree portfast default" command from global configuration mode, what does this do?
enables PortFast on all ports
45
What is a Ethernet frame that exceeds 1518 bytes and has a bad FCS value?
a giant
46
What is a fully specified static route?
It's a IPv6 route in which the destination network, outbound interface, and next hop IPv6 address are all configured directly
47
What is the range of an IP multicast MAC address look like?
01-00-5e-00-00-00 through 01-00-5e-7f-ff-ff
48
What is the default frequency that a Cisco switch will send LLDP advertisements when LLDP is enabled on an interface?
30 seconds
49
What virtual MAC address is used for HSRP version 2 start with?
0000.0C9F.Fxxx. (xxx is group number)
50
Which interfaces is the OSPF broadcast network type enabled by default?
Ethernet and FDDI (Fiber Distributed Data Interface)
51
In a split-MAC deployment, which device is responsible for prioritizing packets and responding to beacon and probe requests?
a lightweight AP
52
An administrator has generated the following MD5 hash from a plain-text password: $1$cF6N$Ugo The administrator wants to configure the password so that it will be used to access enable mode on a Cisco router. The "no service password-encryption" command has been issued, what other command should be issued?
enable secret 5
53
How do you calculate the cost of a OSPF path?
cost= reference bandwidth/interface bandwidth reference bandwidth= 100,000,000 If below 1 round up.
54
Match the threats with either of the two elements: Elements: User awareness and training or Physical access control Threat: Bruteforce Social Engineering Burglary Pharming Tailgating
Bruteforce - User Social Engineering- User Burglary -Physical Pharming -User Tailgating -Physical
55
You issue the following commands: enable password enable secret line console 0 password line vty 0 15 login password service password-encryption What commands will be required in order to login in using telnet?
enable secret password vty line password
56
Match the following EIGRP terms with the definitions: Terms: Successor Feasible Successor Feasible Distance Advertised Distance Definitions: The best metric along a path The best path to a destination A backup path that is guaranteed to be loop free The metric that the next-hop router has calculated
Feasible Distance- The best metric along a path Successor- The best path to a destination Feasible Successor- A backup path that is guaranteed to be loop free Advertised Distance- The metric that the next-hop router has calculated
57
What describes a lightweight AP in bridge mode?
It acts as a dedicated connection between two networks
58
What are the fields in a 802.11 MAC frame?
FC Dur Add 1 Add 2 Add 3 Seq Add 4 Data FCS
59
What is true regarding floating static routes?
A floating static route is used to provide link redundancy
60
You want to configure a Cisco router to provide IP addresses to computers in your network. The IP address should be assigned from the 192.168.1.0/26 address range. Which commands should be ran to make this happen?
ip dhcp pool 1 network 192.168.1.0 255.255.255.192
61
You want a new switch to automatically obtain its time from a NTP server. You manually configure the system clock and then issue the "ntp server 1.1.1.1" command on the new switch. What else needs to be done to finish the configuration?
Nothing. The basic configuration is complete.
62
What are some of the features provided by IPSec?
data confidentiality data integrity
63
You issue the "show ip ospf neighbor" command on Router1 and see that Router2 is in a "2 way/drother" state. What would be true about this?
Router1 and Router2 are normal neighbor routers that are operating correctly
64
What configuration management tools accepts inbound requests from agents by using HTTPS on TCP port 8140?
Puppet