Data Communications and Networking 4
Data Communications and Networking 4
Data Communications and Networking 4
- True
-
A general term for Internet services from a mobile phone or from any device that uses the same
technology.
-- Wireless Internet
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and
encapsulation type configured on a Cisco router?
--show interface dialer 1
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
--PPPoE
Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling
protocol.
--True
Satellite Internet services are used in locations where land-based Internet access is not available, or for
temporary installations that are mobile.
-- True
Which statement describes a characteristic of standard IPv4 ACLs?
They filter traffic based on source IP addresses
only.
--
What is an advantage offered by GRE tunnels?
-- support for IP multicast tunneling
It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to
render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.
-- Telnet DoS Attack
Which service is enabled on a Cisco router by default that can reveal significant information about the
router and potentially make it more vulnerable to attack?
--CDP
How can SNMP access be restricted to a specific SNMP manager?
--Define an ACL and reference it by using the snmp-server community command.
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
--Enable port security
It is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and
eventually leases all of the available IP addresses in the DHCP server pool.
-- DHCP starvation attack
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
-- True
allows source and destination ports to be in different switches.
-- RSPAN
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes
such as servers, workstations, routers, switches, and security appliances, on an IP network.
-- True
MAC address table flooding attacks are addressed with port security.
-- True
The show monitor command is used to verify the SPAN session.
-- False
SNMP is an application layer protocol that provides a message format for communication between
managers and agents
-- True
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
-- True
DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.
-- True is a mitigation technique to prevent rogue DHCP servers from providing false
configuration parameters.
-- snooping
An attacker repeatedly uses a list of common passwords, dictionary words, and variations of words to
discover the administrative password .
-- brute force attack
Which mode is used to configure SNMP?
global configuration
mode
--
It is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue
IP addresses to clients.
-- Spoofing attacks
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.
-- True
What is an SNMP management agent?
a communication protocol that is used by
SNMP
--
What is the default queuing method used on the LAN interfaces of Cisco devices?
--FIFO
CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.
-- True
What happens when an edge router using IntServ QoS determines that the data pathway cannot
support the level of QoS requested?
Data is not forwarded along the
pathway.
--
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency
queuing (LLQ) is being used?
--voice
Packets are forwarded in the order in which they are received.
-- FIFO
What happens when the memory queue of a device fills up and new network traffic is received?
--the network device will drop the arriving packets.
Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and
input interfaces.
--CBWFQ
What does the WFQ automated scheduling method stands for?
-- Weighted Fair Queuing
What does the FIFO queuing stands for?
-- First in, First out
Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
--True
IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly
managing network resources to provide QoS to specific user packet streams, sometimes called
microflows.
-- True
Which model is the only QoS model with no mechanism to classify packets?
--best-effort
Packets are classified into different flows based on header information including the ToS value.
-- WFQ
The LLQ feature brings strict priority queuing (PQ) to CBWFQ.
-
- False
Which statement describes the QoS classification and marking tools?
--Marking is the adding of a value to a packet header.
How many levels of priority are possible when using class of service (CoS) marking on frames?
Under which condition does congestion occur on a converged network with voice, video, and data
traffic?
--if the request for bandwidth exceeds the amount of bandwidth available
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
-- CBWFQ
QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and
providing QoS guarantees on modern IP networks.
-- Differentiated Services
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before
packets
in other brains of the ACI architecture.
queues).
-- is
LL
Q
considere
d to be the
-- Application Policy Infrastructure Controller
The IoT refers to the network of billons of physical objects accessible through the Internet as we
continue to connect the unconnected.
-- True
This is typically regarded as the brains of a device.
-- CPU
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
-- Controller-based
What is an example of an M2M connection?
--a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system
for the sanitation truck to adjust its route for pickups
is a collection of end-point groups (EPG), their connections, and the policies that define those
connections.
-- Application Network Profile
What is a characteristic of data flow processing in SDN?
--Each data flow through the network must be approved by the SDN controller first.
Also called the forwarding plane, this plane is typically the switch fabric connecting the
various network ports on a device.
-- Data Plane
SDN is a network architecture that has been developed to virtualize the network.
-- True
These switches provide an application-aware switching fabric and work with an APIC to manage
the virtual and physical network infrastructure.
Which term describes the data exchanges between virtual servers in a data center?
--east-west traffic
Cloud computing and virtualization are different terms that refer to the same thing
Which network traffic management technology is a basic element in SDN implementations?
-- Openflow
How many "things" are predicted to be interconnected on the Internet by 2020?
--50 billion
A purpose-built hardware solution for integrating cloud computing and data center management.
-- Hyperconvergence
Which Cloud computing service would be best for an organization that needs to collaboratively
create applications and deliver them over the web?
Today, over __% of things in the physical world are still not connected to the Internet. Select the
answer that will complete the statement.
--99
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
--The leaf switches always attach to the spines, but they never attach to each other.
A network architecture that virtualizes the network.
-- Network virtualization
What is Fog computing?
--It is a type of computing where services are hosted where they are used, such as at the network
edge or with end devices.
topology shows the physical layout of the devices connected to the network.
-- Network topology
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is
the purpose of this command?
--to probe the server that provides the web service to determine if it is also running an email service
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
-- cable testers
A network engineer is troubleshooting a network that has recently been updated with a new
routing protocol, but the network is not working as expected. The engineer is comparing the
running configuration from before and after the change was made. Which approach to
troubleshooting the problem is the engineer using?
A client calls the support desk and says this to a technician: "I have just started my computer and
attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to
network drives and access the Internet." Which statement would describe the status of this issue?
--The helpdesk has enough information to begin finding a resolution.
A network engineer is investigating an access issue to a web server. The web server can access the
Internet and the local clients can open the web pages. However, outside clients cannot access the
web pages. What is the most likely cause of the problem?
--An ACL is blocking incoming connections.
topology illustrates how devices are logically connected to the
network, meaning how devices actually transfer data across the network when communicating
with other devices.
-- logical network
are specialized, handheld devices designed for testing the various types of data communication
cabling.
-- Cable Testers
After gathering symptoms, if the troubleshooter determines that the problem is located outside the
control of the organization, what is the next step?
--Contact the administrator of the external system.
Which command runs several other show commands in order to generate many pages of detailed
troubleshooting information?
The OSI reference model describes how information from a software application in one computer
moves through a network medium to a software application in another computer.
--True
The show ip route and show ipv6 route commands are used to display the routing table in a router
to learn the directly connected neighbors, more remote devices (through learned routes), and the
routing protocols that have been configured.
Which feature sends simulated data across the network and measures performance between
multiple network locations?
-- IP SLA
When is the most appropriate time to measure network operations to establish a network
performance baseline?
--at the same time each day across a set period of average working days, so that typical traffic
patterns can be established
Use the show ip sla configuration operation-number command to display configuration values
including all defaults for IP SLA operations or for a specific operation.
-- True
Which statement describes the physical topology for a LAN?
--It defines how hosts and network devices connect to the LAN.
transmits bits from one computer to another and regulates the transmission of a stream of bits over
the physical medium.
-- Layer 1: Physical
The show ip interface brief and show ipv6 interface brief commands are used to display the up or
down status and IP address of all interfaces on a device.
The show cdp neighbors detail command is used to obtain detailed information about directly
connected Cisco neighbor devices.
-- True
diagrams keep track of the location, function, and status of devices on the network.
-- Network tracking tool
a type of network that establishes a dedicated circuit (or channel) between nodes and
terminals before the users may communicate.
-- Circuit-switched network
The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.
-- True
It is a networking device that provides internetworking and WAN access interface ports that are
used to connect to the service provider network.
-- router
It is a WAN protocol that provides Provides router-to-router and host-to-network connections
over synchronous and asynchronous circuits.
-- PPP
It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-
switched connections when the link uses two Cisco devices.
-- HDLC
This is a point established in a building or complex to separate customer equipment from service
provider equipment.
-- Demarcation point
It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-
defined traffic classes.
-- CBWFQ
It SPAN Terminology which refers to the traffic that enters the switch.
-- Ingress Traffic
It is a SPAN Terminology which refers to the traffic that leaves the switch.
-- Egress Traffic
It is an SPAN Terminology which refers to the port that is monitored with use of the SPAN feature
answer Source (SPAN) port
-- Source VLAN
It is a queuing algorithm which feature brings strict priority queuing (PQ) to
CBWFQ.
-- LLQ
feature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port,
out another port on the same switch.
-- SPAN
It is a type of telnet attack where the attacker may use a list of common passwords, dictionary
words, and variations of words to discover the administrative password
-- Brute Force Attack
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before
packets in other queues).
-- LLQ
It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth
allocation to all network traffic.
-- WFQ
One of the new challenges associated with the rapid growth of the IoT is increasing the
CPU power of computers
-- False
An attack has been launched within a company and a host name has been identified as the source.
What command can a network technician use to determine the IP address assigned to the host
name?
-- nslookup
One of the new challenges associated with the rapid growth of the IoT is improving the
Internet connections from homes
-- False
One of the new challenges associated with the rapid growth of the IoT is securing new
devices with varying level of security.
-- True
One of the new challenges associated with the rapid growth of the IoT is developing
better routing protocols for new devices
-- False
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to
create data paths within a network?
-- control plane
For a data center, what is the difference in the server virtualization data traffic compared with the
traditional client-server model?