The Beginning Flashcards
(456 cards)
What must be considered before deploying virtual machines?
A. location of the virtual machines within the data center environment.
B. whether to leverage VSM to map multiple virtual processors to two or more virtual machines.
C. support for physical peripherais, such as monitors, keyboards, and mice.
D. resource limitations, such as the numer of CPU cores and the amount of memory.
D. resource limitations, such as the numer of CPU cores and the amount of memory.
What is a reason why an administrator would choose to implement an automated network management approach?
A. decipher simple password policies.
B. limit recurrent managment costs.
C. reduce inconsistencies in the network configuration.
D. enable “box by box” configuration and deployment.
B. limit recurrent managment costs.
What does a switch use to build its MAC address table?
A. egress traffic
B. DTP
C. VTP
D. ingress traffic
D. ingress traffic
What is a similarity between OM3 and OM4 fiber optic cable?
A. Both have a 9 micron core diameter.
B. Both have a 100 micron core diameter.
C. Both have a 50 micron core diameter.
D. Both have a 62.5 micron core diameter.
C. Both have a 50 micron core diameter.
How will Link Aggregation be implemented on a Cisco Wireless LAN Controller?
A. The EtherChannel must be configured in “mode active.”
B. One functional physical port is needed to pass client traffic.
C. To pass client traffic, two or more ports must be configured.
D. When enabled, the WLC bandwidth drops to 500 Mbps.
B. One functional physical port is needed to pass client traffic.
To improve corporate security, an organization is planning to implement badge authentication to limit access to the data center. Which element of a security program is being deployed?
A. physical access control
B. vulnerability verification
C. user awareness
D. user training
A. physical access control
What must be considered before deploying virtual machines?
A. resource limitations, such as the number of CPU cores and the amount of memory
B. location of the virtual machines within the data center environment
C. whether to leverage VSM to map multiple virtual processors to two or more virtual machines
D. support for physical peripherals, such as monitors, keyboards, and mice.
A. resource limitations, such as the number of CPU cores and the amount of memory
What is a requirement for nonoverlapping Wi-Fi channels?
A. different security settings
B. discontinuous frequency ranges
C. different transmission speeds
D. unique SSIDs
B. discontinuous frequency ranges
Which type of API allows SDN controllers to dynamically make changes to the network?
A. REST API
B. southbound API
C. SOAP API
D. northbound API
B. southbound API
Which global command encrypts all passwords in the running configuration?
A. service password- encryption
B. enable password- encryption
C. enable secret
D. password- encrypt
A. service password- encryption
Which protocol uses the SSL?
A. SSH
B. Telnet
C. HTTPS
D. HTTP
C. HTTPS
In QoS, which prioritization method is appropriate for interactive voice and video?
A. expedited forwarding
B. low- latency queuing
C. traffic policing
D. round- robin scheduling
B. low- latency queuing
What are two descriptions of three- tier network topologies? (choose two)
A. The access layer manages routing between devices in different domains
B. The core layer maintains wired connections for each host.
C. The distribution layer runs Layer 2 and Layer 3 technologies.
D. The network core is designed to maintain continuous connectivity when devices fail
E. The core and distribution layers perform the same functions.
C. The distribution layer runs Layer 2 and Layer 3 technologies.
D. The network core is designed to maintain continuous connectivity when devices fail
What are two functions of DHCP servers? (choose two)
A. issue DHCPDISCOVER messages when added to the network
B. assign dynamic IP configurations to hosts in a network
C. respond to client DHCPOFFER requests by issuing an IP address
D. prevent users from assigning their own IP addresses to hosts
E. support centralized IP management
B. assign dynamic IP configurations to hosts in a network
C. respond to client DHCPOFFER requests by issuing an IP address
Which condition must be met before an NMS handles an SNMP trap from an agent?
A. The NMS software must be loaded with the MIB associated with the trap.
B. The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.
C. The NMS must receive a trap and an inform message from the SNMP agent within a configured interval.
D. The NMS must be configured on the same router as the SNMP agent.
A. The NMS software must be loaded with the MIB associated with the trap.
Which cable type must be used when connecting two like devices together using these criteria?
1. Pins 1 to 3 and 2 to 6 are required
2. Auto detection MDI-X is unavailable
A. console
B. straight-through
C. rollover
D. crossover
D. crossover
What is the difference in data transmission delivery and reliability between TCP and UDP?
A. UDP sets up a connection between both devices before transmitting data. TCP uses the three- way handshake to transmit data with a reliable connection.
B. UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.
C. TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.
D. TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.
D. TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.
Which two conditions must be met before SSH operates normally on a Cisco IOS switch? (choose two)
A. The switch must be running a k9 (crypto) IOS image.
B. IP routing must be enabled on the switch.
C. The ip domain- name command must be configured on the switch.
D. Telnet must be disabled on the switch.
E. A console password must be configured on the switch
A. The switch must be running a k9 (crypto) IOS image.
C. The ip domain- name command must be configured on the switch.
A network engineer is replacing the switches that belong to a managed- services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (choose two)
A. crypto key generate rsa usage- keys
B. transport input all
C. crypto key generate rsa general- keys modulus 1024
D. crypto key generate rsa modulus 2048
E. transport input ssh
D. crypto key generate rsa modulus 2048
E. transport input ssh
An engineer is configuring SW1 to act as an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?
A. SW1# configt
SW1(config)# ntp server 192. 168. 1. 1
SW1(config)# ntp access- group server accesslist1
B. SW1# config t
SW1(config)#ntp backup
SW1(config)# ntp server 192. 168. 1. 1
C. SW1# config t
SW1(config)# ntp peer 192. 168. 1.1
SW1(config)# ntp access- group peer accesslist1
D. SW1# config t
SW1(config)# ntp master
SW1(config)# ntp server 192. 168. 1. 1
D. SW1# config t
SW1(config)# ntp master
SW1(config)# ntp server 192. 168. 1. 1
How does HSRP provide first hop redundancy?
A. It load- balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.
B. It load- balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table.
C. It forwards multiple packets to the same destination over different routed links in the data path.
D. It uses a shared virtual MAC and avirtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
D. It uses a shared virtual MAC and avirtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
Which function generally performed by a traditional network device is replaced by a software-defined controller?
A. encryption and decryption for VPN link processing
B. encapsulations and decapsulation of packets in a data- link frame
C. building route tables and updating the forwarding table
D. changing the source or destination address during NAT operations
C. building route tables and updating the forwarding table
What is a benefit for external users who consume public cloud resources?
A. all hosted on physical servers
B. implemented over a dedicated WAN
C. accessed over the internet
D. located in the same data center as the users
C. accessed over the internet
Refer to the exhibit. Which action must be taken to ensure that router A is elected as the DR to OSPF area 0?
A. Configure the OSPF priority on router A with the lowewst value between the three routers.
B. Configure router B and router C as OSPF neighbors of router A
C. Configure router A with a fixed OSPF router ID.
D. Configure the router A interfaces with the highest OSPF priority value within the area.
D. Configure the router A interfaces with the highest OSPF priority value within the area.