Term
Which statement about DTP is true? |
|
Definition
Sends data on vlan 1. Controls like CDP, DTP, PAgP and VTP uses VLAN 1 even if you change the native vlan. |
|
|
Term
How can you disable DTP on a switch port? |
|
Definition
Configure the switch as a trunk. The only way to disable DTP is "switchport nonegotiage" but that cannot be configured until the port is a trunk. |
|
|
Term
Normal VLAN ID range? Where are they stored? |
|
Definition
1-1005 1002 - 1005 are reserved Stored in flash:/vlan.dat |
|
|
Term
What are three statements about DTP? |
|
Definition
Enabled by default Proprietary Layer-2 based |
|
|
Term
What is DTP's default mode in a switch? |
|
Definition
|
|
Term
Which two circumstances can cause collision domain issues on a VLAN domain? |
|
Definition
duplex mismatches congestion on the switch inbound path |
|
|
Term
Which three statements are typical characteristics of VLAN arrangements? |
|
Definition
Connectivity between VLANs requires a layer 3 device. Each vlan uses separate address space A switch maintains a separate bridging table for each vlan. |
|
|
Term
What are 3 valid reasons to assign ports to VLAN's on a switch? |
|
Definition
To isolate broadcast traffic To logically group hosts according to function. To increase network security |
|
|
Term
Which statement about switch access ports is true? |
|
Definition
They drop packets with 802.1q tags. |
|
|
Term
What are the switchport desired states for Access, Dynamic Auto, Trunk, Dynamic Desireable? |
|
Definition
|
|
Term
Which three options are types of slow Vlan connectivity? |
|
Definition
Slow broadcast domain connectivity. Slow collision domain connectivity. Slow inter Vlan connectivity.
The answers seem to relate to layer two connectivity except inter vlan. |
|
|
Term
Which three statements regarding 802.1q trunking are correct? |
|
Definition
802.1q native vlan frames are untagged by defualt. Can use 10 mb/s interfaces Should have native vlans that are the same at both ends. |
|
|
Term
Which three statements about VTP features are true? |
|
Definition
When properly configured, VTP minimizes VLAN misconfiguration and config inconsistiences. VTP pruning is used to increase bandwidth in trunk links. Client, server, and transparent are valid VTP modes. |
|
|
Term
What is one benefit of PVST+? |
|
Definition
PVST+ allows the root switch location to be optimized per vlan. |
|
|
Term
If primary and secondary root switches with priority 16384 both experience catastrophic losses which tertiary switch can take over? |
|
Definition
A switch with priority 20480. It isnt a switch with a priority lower than 16384 cause it would have already been the primary. |
|
|
Term
Which factors generate bridge ID? |
|
Definition
MAC address and Bridge Priority.
Bridge ID = Bridge priority + MAC Address |
|
|
Term
Which process is associated with Spanning-tree convergance? |
|
Definition
Electing designated ports. |
|
|
Term
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding states? |
|
Definition
|
|
Term
What kind of data message is sent to elect the root bridge? |
|
Definition
|
|
Term
Which type does a port become when it receives the best BPDU on a bridge? |
|
Definition
|
|
Term
Which value can you modify to configure a specific interface as the preferred forwarding interface? |
|
Definition
|
|
Term
Which vlan bridge priority value is assigned by the command "set spantree root"? |
|
Definition
|
|
Term
Which two statements about the spanning-tree bridge ID are true? |
|
Definition
It is composed of a 4bit priority and 12 bit system ID extension. The bridge priority must be incremented in blocks of 4096. |
|
|
Term
At which layer of the OSI model is RSTP used to prevent loops? |
|
Definition
|
|
Term
Which three statements about RSTP are true? |
|
Definition
RSTP significantly reduces topology reconvening time after a link failure. RSTP expands the STP port roles by adding the alternate and backup roles. RSTP provides a faster transition to the forwarding state on point to point links than STP |
|
|
Term
Which three states are valid for 802.1w? |
|
Definition
Learning Discarding Forwarding |
|
|
Term
|
Definition
Rapid Spanning Tree Protocol |
|
|
Term
Which two statements regarding RSTP are correct? |
|
Definition
RSTP defines new port roles. RSTP is compatible with the original IEEE 802.1d STP |
|
|
Term
Which two states are the port states when RSTP has converged? |
|
Definition
|
|
Term
Explain the Spanning Tree election process? |
|
Definition
Step 1. Election of root bridge. Bridge with lowest BID wins. If tie then lowest MAC. Step 2. Each non-root switch chooses its one and only path to the root switch. This is determined by path costs. |
|
|
Term
What are the default IEEE switchport bandwidth cost? |
|
Definition
10Mbps = 100 100Mbps = 19 1 Gbps = 4 10 Gbps = 2 |
|
|
Term
What two modes are available for PAgP etherchannel? |
|
Definition
|
|
Term
What two modes are available for LACP etherchannel? |
|
Definition
|
|
Term
Which statement about slow inter VLAN forwarding is true? |
|
Definition
The VLANs are experiencing slowness due to a duplex mismatch. The causes of slow interVlan are usually duplex mismatch or collision domain issues. |
|
|
Term
|
Definition
High Level Data Link Control is encapsulation applied to an IP packet to send the packet over a WAN link. |
|
|
Term
Which WAN technology uses labels to make decisions about data forwarding? |
|
Definition
|
|
Term
Which WAN solution is secured by default? |
|
Definition
|
|
Term
Which WAN topology provides a direct connection from each site to all other sites on the network? |
|
Definition
|
|
Term
After you configure a GRE tunnel between two networks the tunnel comes up but computers cannot communicate across the tunnel? |
|
Definition
The route between the networks is undefined. |
|
|
Term
What is the default encapsulation type for Cisco WAN serial interfaces? |
|
Definition
|
|
Term
Which feature does PPP use to encapsulate multiple protocols? |
|
Definition
NCP Network Control Protocols. |
|
|
Term
Which two statements about using CHAP authentication in a PPP link are true? |
|
Definition
CHAP uses a three-way handshake. CHAP authentication periodically occurs after link establishment. |
|
|
Term
What is the purpose of LCP? |
|
Definition
To negotiate control options. |
|
|
Term
What command is used to enable CHAP with PAP as the fallback method on a serial interface |
|
Definition
ppp authentication chap fallback ppp |
|
|
Term
What are three reasons an organization with multiple branch offices with roaming users might implement a VPN solution instead of a point to point WAN. |
|
Definition
Reduced Cost Increased Security Scalability |
|
|
Term
Which later 2 protocol encapsulation supports synchronous and asynchronous circuits and has built-in security mechanisms? |
|
Definition
|
|
Term
Which PPP subprotocol negotiates authentication options? |
|
Definition
LCP Link Control Protocol |
|
|
Term
At which layer of the OSI model does PPP perform? |
|
Definition
|
|
Term
Which type of interface can negotiate an IP address for a PPPoE client? |
|
Definition
|
|
Term
Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client? |
|
Definition
virtual-template interface |
|
|
Term
Which command do you enter to enable an interface to support PPPoE on a client? |
|
Definition
|
|
Term
Which type of topology is required by DMVPN? |
|
Definition
|
|
Term
Which statement about MPLS is true? |
|
Definition
It operates between layer 2 and layer 3. MPLS operates at a layer that lies between traditional definitions of Layer 2 and Layer 3 and thus is often referred to as a layer 2.5 protocol. |
|
|
Term
3 true statements about HSRP operation? |
|
Definition
Virtual IP address and virtual MAC are active on the HSRP Master router. HSRP default timers are 3 second hello and 10 second dead interval. HSRP supports up to 255 groups per interface. |
|
|
Term
What is a valid HSRP virtual MAC address? |
|
Definition
0000.0C07.AC15 HSRP v1 = 0000.0c07.ACxx xx is HSRP group HSRP v2 = 0000.0C9F.Fxxx xxx is HSRP group |
|
|
Term
Which three options are the HSRP states for a router? Choose three |
|
Definition
Learn, Listen, Speak HSRP consist of 6 states: Initial, learn, Listen, Speak, Standby, Active |
|
|
Term
What about HSRP Ip address is true? |
|
Definition
Acts as default route for that interface. |
|
|
Term
Which of the following HSRP router states does an active router enter when it is preempted by a higher priority router? |
|
Definition
Speak The router sends periodic HSRP hellos and participates in the election of the active or standby router. |
|
|
Term
Which protocol specfified by RFC 2281 provides network redundancy for IP networks? |
|
Definition
|
|
Term
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution? |
|
Definition
It can redirect user requests to locations that are using fewer network resources. |
|
|
Term
Which statement about QoS default behavior is true? |
|
Definition
Ports are untrusted by default. By default all ports are in the untrusted state when QoS is enabled. |
|
|
Term
Which option describes the purpose of traffic policing? |
|
Definition
It drops traffic that exceeds the CIR |
|
|
Term
Which option is a benefit of switch stacking? |
|
Definition
It provides higher port density with better resource usage. |
|
|
Term
Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used? |
|
Definition
|
|
Term
Which statement is true, as relates to classful or classless routing? |
|
Definition
Automatic summarization at classful boundaries can cause problems on discontigous networks. |
|
|
Term
Which two are advantages of static routing when compared to dynamic routing? |
|
Definition
Security increases because only the network admin may change the table. Routing traffic load is reduced when used in a stub network links. |
|
|
Term
How does a router handle an incoming packet whose destination network is missing from the routing table? |
|
Definition
|
|
Term
What are two drawbacks of implementing a link-state routing protocol? |
|
Definition
Requirement for a hierarchical Ip addressing scheme for optimal function. The high demand on router resources to run the link-state routing algorithm. |
|
|
Term
Which two statements describe the identifier that is used in the command to configure OSPF on a router? |
|
Definition
Different process identifiers can be used to run multiple OSPF processes. The process numbers range from 1 to 65,535 |
|
|
Term
What are three characteristics of OSPF? |
|
Definition
Converges quickly. Uses cost to determine the best route. OSPF routers discover neighbors before exchanging routing information. |
|
|
Term
Which two statements about the OSPR router ID are true? |
|
Definition
Identifies the source of Type 1 LSA. The router automatically chooses the IP addresss of a loopback as the OSPF router ID |
|
|
Term
What are two enhancements that ospfv3 supports over ospfv2 |
|
Definition
Support multiple IPv6 subnets on a single link. It routes over links rather than over networks. |
|
|
Term
What are OSPF default hello and dead timers? |
|
Definition
Hello timer is 10 seconds Dead timer is 40 seconds. |
|
|
Term
In order to become OSPF neighbors the following values must match on both routers. |
|
Definition
Area ID Authentication Hello and Dead Intervals Stub Flag MTU size |
|
|
Term
What OSPF command when configured will include all interfaces into area 0? |
|
Definition
network 0.0.0.0 255.255.255.255 area 0 |
|
|
Term
What are two benefits of using a single OSPF are network design? |
|
Definition
Reduces the types of LSAs that are generated. Removes the need for virtual links. |
|
|
Term
What can cause two OSPF neighbors to be stuck in EXSTART state? |
|
Definition
The neighbors have different MTU settings. |
|
|
Term
Which parameter or parameters are used to calculate OSPF cost in Cisco Routers? |
|
Definition
Bandwidth Formula is Cost=10 to power of 8 / Bandwidth |
|
|
Term
What is the default maximum number of equal-cost paths that can be placed into the routing of a Cisco OSPF router? |
|
Definition
|
|
Term
What information does a router running a link-state protocol use to build and maintain its topological database? |
|
Definition
Hello Packets LSAs from other routers |
|
|
Term
What is the default administrative distance of OSPF? |
|
Definition
|
|
Term
List the default administrative distances of Direct Connect, Static, EIGRP, EIGRP Summary Route, OSPF, RIP. |
|
Definition
Direct = 0 Static = 1 EIGRP = 90 EIGRP Summary = 5 OSPF = 110 RIP = 120 |
|
|
Term
When a router undergoes the exchange protocol within OSPF, in what order does it pass through each state? |
|
Definition
Exstart state > exchange state > loading state > full state |
|
|
Term
Which command is used to display the collection of OSPF link states? |
|
Definition
|
|
Term
Which statement describes the process ID that is used to run OSPF on a router? |
|
Definition
It is locally significant and is used to identify an instance of the OSPF database? |
|
|
Term
What is the default values for hello and dead packets in OSPF? |
|
Definition
|
|
Term
Which purpose of the network command in OSPF configuration mode is true? |
|
Definition
It defines a wildcard mask to identify the size of the network. |
|
|
Term
Which EIGRP for IPv6 command can you enter to view the link-local addresses of the neighbors of a device? |
|
Definition
show ipv6 eigrp neighbors |
|
|
Term
Which option describes a difference between EIGRP for IPv4 and IPv6? |
|
Definition
Only EIGRP for IPv6 requires a router ID to be configured under the routing process |
|
|
Term
Which type of EIGRP route entry describes a feasible successor? |
|
Definition
a BACKUP route, stored in the TOPOLOGY table. |
|
|
Term
What are the two default metrics used by EIGRP for route selection? |
|
Definition
|
|
Term
What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is in an active state? |
|
Definition
It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network. |
|
|
Term
Which statement describes an EIGRP feasible successor route? |
|
Definition
A backup route, added to the topology table. |
|
|
Term
A network administrator is troubleshooting an EIGRP problem on a router to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. |
|
Definition
|
|
Term
Which routing protocols are compatible with stubs? |
|
Definition
|
|
Term
Which three checks must you perform when troubleshooting EIGRPv6 adjacencies? |
|
Definition
Verify that IPv6 is enabled Verify that the interface is up Verify that the router ID has been configured. |
|
|
Term
Which command do you enter to view EIGRPv6 adjacencies |
|
Definition
show ipv6 eigrp neighbors |
|
|
Term
Which two components are used to identify a neighbor in a BGP configuration? |
|
Definition
Autonomous System Number IP Address |
|
|
Term
Which two statements about the IP SLAs ICMP Echo operation is true? |
|
Definition
It is used to determine the frequency of ICMP packets. It is used to determine the one-way delay between devices. |
|
|
Term
|
Definition
|
|
Term
Which protocol authenticates connected devices before allowing them to access the lan? |
|
Definition
|
|
Term
What is the difference between TACACS+ and RADIUS in AAA? |
|
Definition
Only TACACS+ allows for seperate authentication. |
|
|
Term
What can be done to secure the virtual terminal interfaces on a router? |
|
Definition
Configure a vty password and login Enter an access list and apply it to the virtual terminal interfaces using the access-class command. |
|
|
Term
Which protocol is an open standard protocol framework that is commonly used in VPNs to provide secure end to end communication? |
|
Definition
|
|
Term
Which IPsec security protocol should be used when confidentiality is required? |
|
Definition
|
|
Term
Which three options are types of Layer 2 network attack? |
|
Definition
ARP attacks spoofing attacks VLAN hopping |
|
|
Term
Which option describes a drawback of proxy ARP? |
|
Definition
If proxy ARP is configured on multiple devices, the internal L2 network may become vulnerable to DDOS |
|
|
Term
Which type of attack is when trusted source replace MAC tables with untrusted? |
|
Definition
|
|
Term
Which three response does TACAS+ give while querying ... something like that. |
|
Definition
|
|
Term
Which feature can validate address requests and filter out invalid messages? |
|
Definition
|
|
Term
A network admin needs to configure port security on a switch. Which two statements are true? |
|
Definition
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined |
|
|
Term
Which version of SNMP first allowed user-based access? |
|
Definition
|
|
Term
What is the first step you perform to configure an SNMPv3 user? |
|
Definition
Configure the server group. |
|
|
Term
Which feature can you use to restrict SNMP queries to a specific OID tree? |
|
Definition
|
|
Term
What is the minimum command to turn on encryption on SNMP? |
|
Definition
|
|
Term
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch? |
|
Definition
|
|
Term
If you configure syslog messages without specifying the logging trap level, which log messages will the router send? |
|
Definition
All levels except debugging |
|
|
Term
What is the default read-only mode of SNMP community string? |
|
Definition
|
|
Term
What is the output of the command "show snmp engineID" |
|
Definition
Local SNMP engineID and remote engine ID |
|
|
Term
Which protocol HSRP uses to interchange? |
|
Definition
|
|
Term
When does your enterprise require high-speed broadband internet? |
|
Definition
|
|
Term
What protocol CGMP is not compatible with? |
|
Definition
|
|
Term
What about GRE tunnel is true? |
|
Definition
|
|
Term
Which algorithm routing protocols are using? |
|
Definition
Dijkstra -> OSPF Bellman-Ford > RIP Dual > EIGRP |
|
|
Term
Which command is used to remove vlans from the trunk? |
|
Definition
sw trunk allowed vlan remove |
|
|
Term
Which of the following provide the highest availability? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Which feature can prevent switch to become Root Bridge? |
|
Definition
|
|
Term
Which is correct about APIC-EM path trace ACL? |
|
Definition
It checks ingress and egress interfaces |
|
|
Term
If trap in SNMP is not working, where can be issue? |
|
Definition
wasn't put in the command snmp-server enable traps |
|
|
Term
What is the default DTP mode? |
|
Definition
|
|
Term
Which command is used to check to see if trunkport is enabled on an interface? |
|
Definition
|
|
Term
What prevents DDOS attack? |
|
Definition
|
|
Term
Why can the security of RADIUS be comp |
|
Definition
|
|
Term
Which layer is ACL APIC-EM Path running on? |
|
Definition
|
|
Term
What is Application Policy Infrastructure Controller? |
|
Definition
APIC Ciscos centralized Application Policy Infrastructure Controller. |
|
|
Term
|
Definition
Application Policy Infrastructure Controller Enterprise Module |
|
|
Term
Which two options describe benefits of aggregated chassis technology? |
|
Definition
It reduces management overhead. It requires only one IP address per vlan |
|
|
Term
What routing protocol uses first-hand information? |
|
Definition
|
|
Term
Which command can you enter on a switch to determine the current SNMP security model? |
|
Definition
|
|
Term
What two options are causes of network slowness that can result from inter-VLAN routing problem? |
|
Definition
Packet Loss Hardware Forwarding Issues |
|
|
Term
Which two commands debug a PPPoE connection that has failed to establish? |
|
Definition
debug ppp negotiation debug dialer packet |
|
|
Term
Which command do you enter to determing whether LACP is in use on a device? |
|
Definition
show etherchannel summary |
|
|
Term
Which three commands do you use to verify that IPsec over a GRE tunnel is working properly? |
|
Definition
show crypto ipsec sa show crypto isakmp sa debug crypto isakmp |
|
|
Term
Which two types of cloud services may require you to alter the design of your network infrastructure? |
|
Definition
Platform as a service Infrastructure as a Service |
|
|
Term
Which encryption method does CHAP authentication use for the peer response? |
|
Definition
|
|
Term
Which layer 2 attack is specifically mitigated by changing the native VLAN to an unused VLAN? |
|
Definition
|
|
Term
What feature or value must be configured to enable EIGRPv6? |
|
Definition
|
|
Term
Which command do you enter to enable local authentication for MPPP on an interface? |
|
Definition
ppp chap password password1 |
|
|
Term
What options are the two differences between HSRPv1 and V2? |
|
Definition
Only HSRPv2 can be configured with a group number of 4095. Only HSRPv2 send hello to 224.0.0.102 |
|
|
Term
For which reason can a GRE tunnel have an up/down status? |
|
Definition
A tunnel destination in undefined |
|
|
Term
Which utility do you use to view IP traffic that is switched through the router to locate errors in a TCP stream? |
|
Definition
|
|
Term
Which command do you enter so that a port enters an immediate forwarding state? |
|
Definition
spanning-tree portfast default |
|
|
Term
Which term represents the minimum bandwidth provided in a metro ethernet connection? |
|
Definition
CIR Committed Information Rate |
|
|
Term
Which three effects of using local span are true? |
|
Definition
It doubles the load on the forwarding engine. It prevents span destination from using port security. It double internal switch traffic |
|
|
Term
Which tree fields can be marked with QOS? |
|
Definition
Ip precedence DSCP discard class |
|
|
Term
Which two values are needed to run the APIC-EM ACL analysis tool? |
|
Definition
Source Address Destination Address |
|
|
Term
In which two models can control plane functionality be implemented? |
|
Definition
|
|
Term
Which PPPoE authentication method is the lest secure? |
|
Definition
|
|
Term
Which two QoS tools can provide congestion management? |
|
Definition
CBWFQ Class Based Weighted Fair Queueing PQ Priority Queueing |
|
|
Term
|
Definition
|
|
Term
Which LACP mode sends offer to connect device? |
|
Definition
|
|
Term
Which IPv6 ACL rules are applied as first? |
|
Definition
|
|
Term
|
Definition
OpenSent: wait for an OPEN message OpenConfirm: wait for a KEEPALIVE or NOTIFICATION message Established: UPDATE, NOTIFICATION and KEEPALIVE messages are exchanged with peers Idle: refuse connections Active: listen for and accept connection Connect: wait for the connection to be completed |
|
|
Term
Three HSRP multicast messages are sent between the devices? |
|
Definition
|
|
Term
How will HSRP choose the active router? |
|
Definition
Highest IP Configured Priority |
|
|
Term
What is the results or a saturated tunnel? |
|
Definition
|
|
Term
Which utility can you use to identify redundant or shadow rules? |
|
Definition
The ACL analysis tool in Cisco APIC-EM |
|
|
Term
How can QoS be implemented? |
|
Definition
|
|
Term
What do you need to reduce GRE fragmentation? |
|
Definition
|
|
Term
When you use cloud services which service is more "exposed" to the cloud? |
|
Definition
|
|
Term
Question about Dynamic VPN? |
|
Definition
It allows dynamic addressing It does not need additional configuration on the hub for new spokes. It allows partial mesh topology |
|
|
Term
What are the differences between link state vs vector routing protocols? |
|
Definition
Link state protocols are faster than vector routing protocols. Link state protocols take up more memory than vector routing protocols |
|
|
Term
Which two options are well-known southbound APIs? |
|
Definition
|
|
Term
Which two functions of an SDN controller are true? |
|
Definition
Managing the controller Coordinating VTNs |
|
|
Term
Which event triggers a switch stack election? |
|
Definition
Adding a new powered-on standalone switch to the stack. |
|
|
Term
What can be used to modify ToS field in IPv4 and traffic class on IPv6 headers? |
|
Definition
|
|
Term
Which routing protocols are compatible with stubs? |
|
Definition
|
|
Term
DHCP can be prevented by which protocol? |
|
Definition
|
|
Term
Which protocol is incompatible with CGMP leave processing? |
|
Definition
|
|
Term
Which three features are supported when you use TACACS+ for device management? |
|
Definition
It can restrict the commands that individual users are allowed to execute. It can provide additional challenges beyond the username and password. It supports user notifications. |
|
|
Term
Which configuration item is the default username for PPP local authentiation? |
|
Definition
|
|
Term
Which technology can identify and classify mission-critical applications for path selection? |
|
Definition
|
|
Term
Which type of routing protocol is used to exchange routes between different autonomous systems? |
|
Definition
|
|