[go: up one dir, main page]

100% found this document useful (1 vote)
2K views17 pages

Data Communications and Networking 4

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 17

Data Communications and Networking 4

Which additional functionality is available on an interface when


authentication
the encapsulation is changed from HDLC to PPP?
A construction firm is building a power plant at a remote and
isolated mine site and needs to connect the data network of the satellite
plant to the corporate network. Which public technology is the Internet
most suitable to meet the connection needs?
Which one of the WAN technologies is inadequate for video
ISDN BRI
traffic but operates adequately for voice traffic?
Which medium do service providers use to transmit data over
fiber optic
WAN connections with SONET, SDH, and DWDM?
Which PPP protocol allows a device to specify an IP address
IPCP
for routing over the PPP link?
Which WAN technology uses a fixed payload of 48 bytes and is
transported across both switched and permanent virtual ATM
circuits?
What is a disadvantage of leased lines? high cost
MPLS can be
used to deliver
Which statement correctly describes a WAN technology? any type of
packet
between sites.
It completes
the specific
configuration
What function does NCP perform in the establishment of a PPP
of the network
session?
layer protocol
that is being
used.
Which PPP option enables load balancing on PPP-enabled
Multilink
interfaces that connect to a single destination?
Which public WAN technology provides security by using
VPN
encrypted tunnels over Internet connections?
NCP interfaces
With which layers of the OSI model do the PPP control with Layer 3;
protocols interface? LCP interfaces
with Layer 1
Which public WAN technology provides security by using
VPN
encrypted tunnels over Internet connections?
PPP authentication is performed at which OSI layer? Layer 2
Which protocol is used by PPP to provide authentication and
CHAP
protection from playback attacks?
Which IPv4 address range covers all IP addresses that match
172.16.2.0 to
the ACL filter specified by 172.16.2.0 with wildcard mask
172.16.3.255
0.0.1.255?
A general term
for Internet
services from
a mobile
A general term for Internet services from a mobile phone or
phone or
from any device that uses the same technology.
from any
device that
uses the same
technology.
What TCP port is used by BGP to exchange messages
179
between routers?
A site-to-site VPN is created when devices on both sides of the
VPN connection are aware of the VPN configuration in TRUE
advance.
Internal BGP is
the routing
Internal BGP is the routing protocol used between routers protocol used
in the same AS. between
routers in the
same AS.
What is the protocol that provides ISPs the ability to send PPP
PPPoE
frames over DSL networks?
Satellite Internet services are used in locations where land-
based Internet access is not available, or for temporary TRUE
installations that are mobile.
An administrator has configured an access list on R1 to allow R1(config-
SSH administrative access from host 172.16.1.100. Which line)# access-
command correctly applies the ACL? class 1 in
Which statement describes a characteristic of standard IPv4 They filter
ACLs? traffic based
on source IP
addresses
only.
When a PPPoE configuration is being verified, which command
show interface
can be used to verify the MTU size and encapsulation type
dialer 1
configured on a Cisco router?
What equipment at the cable service provider office connects
CMTS
the office to the subscriber locations?
support for IP
What is an advantage offered by GRE tunnels? multicast
tunneling
External BGP is the routing protocol used between routers
TRUE
in different autonomous systems.
Dynamic Multipoint VPN (DMVPN) is a Cisco software solution
for building multiple VPNs in an easy, dynamic, and scalable TRUE
manner.
The use of BGP is most appropriate when an AS has
TRUE
connections to multiple autonomous systems.
Inbound ACLs
are processed
before the
packets are
routed while
Which statement describes a difference between the operation
outbound
of inbound and outbound ACLs?
ACLs are
processed
after the
routing is
completed.
What range of IP addresses is represented by the network and 192.168.70.0 to
wildcard mask 192.168.70.0 0.0.0.127? 192.168.70.127
Generic Routing Encapsulation (GRE) is one example of a
TRUE
basic, non-secure, site-to-site VPN tunneling protocol.
To verify the state of a GRE tunnel, use the show interface
TRUE
tunnel command.
Which protocol is used by PPP to provide authentication and
CHAP
protection from playback attacks?
The use of BGP is most appropriate when an AS has TRUE
connections to multiple autonomous systems.
Which PPP protocol allows a device to specify an IP address
IPCP
for routing over the PPP link?
What is the protocol that provides ISPs the ability to send PPP
PPPoE
frames over DSL networks?
When a PPPoE configuration is being verified, which command
show interface
can be used to verify the MTU size and encapsulation type
dialer 1
configured on a Cisco router?
MAC address table flooding attacks are addressed with port
TRUE
security.
Simple Network Management Protocol (SNMP) was developed
to allow administrators to manage nodes such as servers,
TRUE
workstations, routers, switches, and security appliances, on an
IP network.
DHCP is the protocol that automatically assigns a host a valid
TRUE
IP address out of a DHCP pool.
Simple Network Management Protocol (SNMP) was developed
to allow administrators to manage nodes such as servers,
TRUE
workstations, routers, switches, and security appliances, on an
IP network
What mitigation plan is best for thwarting a DoS attack that is Enable port
creating a switch buffer overflow? security
VLAN attacks are controlled by disabling DTP and following
TRUE
basic guidelines for configuring trunk ports.
 is a mitigation technique to prevent rogue DHCP servers from
snooping
providing false IP configuration parameters.
t is a type of DHCP where the  attacker floods the DHCP server DHCP
with bogus DHCP requests and eventually leases all of the starvation
available IP addresses in the DHCP server pool. attack
It is a type of telnet attack where the attacker continuously
requests Telnet connections in an attempt to render the Telnet Telnet DoS
service unavailable and preventing an administrator from Attack
remotely accessing a switch.
It is a type of DHCP  attack where the attacker configures a DHCP
fake DHCP server on the network to issue IP  addresses to spoofing
clients.  attack
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 TRUE
link discovery protocol.
It is a type of telnet attack where the attacker may use a list of
brute force
common passwords, dictionary words, and variations of words
attack
to discover the administrative password
allows source and destination ports to be in different switches.  RSPAN
SNMP is an application layer protocol that provides a message
TRUE
format for communication between managers and agents
Which service is enabled on a Cisco router by default that can
reveal significant information about the router and potentially CDP
make it more vulnerable to attack?
Define an ACL
and reference
How can SNMP access be restricted to a specific SNMP it by using the
manager? snmp-server
community
command.
In the 802.1X standard, the client attempting to access the
TRUE
network is referred to as the supplicant.
The show monitor command is used to verify the SPAN
TRUE
session.
global
Which mode is used to configure SNMP? configuration
mode 
software that
is installed on
What is an SNMP management agent? devices
managed by
SNMP 
Which model is the only QoS model with no mechanism to
best-effort
classify packets?
Which type of traffic does Cisco recommend be placed in the
strict priority queue (PQ) when low latency queuing (LLQ) is voice 
being used?
 Delay-sensitive data such as voice is added to a priority
queue so that it can be sent first (before packets in other LLQ
queues).
Packets are assigned to user-defined classes based on CBWFQ
matches to criteria such as protocols, ACLs, and input
interfaces. 
QoS model specifies a simple and scalable mechanism for
Differentiated
classifying and managing network traffic and providing QoS
Services
guarantees on modern IP networks.
What is the default queuing method used on the LAN interfaces
FIFO 
of Cisco devices?
ntServ provides a way to deliver the end-to-end QoS that real-
time applications require by explicitly managing network
TRUE
resources to provide QoS to specific user packet streams,
sometimes called microflows.
Packets are classified into different flows based on
WFQ
header information including the ToS value.
The LLQ feature brings strict priority queuing (PQ) to CBWFQ. TRUE
Marking is the
adding of a
Which statement describes the QoS classification and marking
value to a
tools?
packet
header. 
first in, first
What does the FIFO queuing stands for?
out
Data is not
What happens when an edge router using IntServ QoS
forwarded
determines that the data pathway cannot support the level of
along the
QoS requested?
pathway. 
if the request
for bandwidth
Under which condition does congestion occur on a converged exceeds the
network with voice, video, and data traffic? amount of
bandwidth
available 
he network
device will
What happens when the memory queue of a device fills up and
drop the
new network traffic is received?
arriving
packets. 
Network traffic can be marked at both Layer 2 and Layer 3 for
TRUE
QoS..
How many levels of priority are possible when using class of 8
service (CoS) marking on frames?
Which queuing method provides user-defined traffic classes
CBWFQ 
where each traffic class has a FIFO queue?
CBWFQ extends the standard WFQ functionality to provide
TRUE
support for user-defined traffic classes.
[Q] A construction firm is building a power plant at a remote and isolated mine site and
needs to connect the data network of the plant to the corporate network. Which public
technology is the most suitable to meet the connection needs?
[A] satellite Internet
[Q] Which medium do service providers use to transmit data over WAN connections with
SONET, SDH, and DWDM?
[A] fiber optic
[Q] Which PPP option enables load balancing on PPP-enabled interfaces that connect to a
single destination?
[A] Multilink
[Q] Which WAN technology uses a fixed payload of 48 bytes and is transported across
both switched and permanent virtual circuits?
[A] ATM
[Q] PPP authentication is performed at which OSI layer?
[A] Layer 2
[Q] What is a disadvantage of leased lines?
[A] high cost
[Q] Which protocol is used by PPP to provide authentication and protection from
playback attacks?
[A] CHAP
[Q] What function does NCP perform in the establishment of a PPP session?
[A] It completes the specific configuration of the network layer protocol that is being
used.
[Q] Which additional functionality is available on an interface when the encapsulation is
changed from HDLC to PPP?
[A] authentication
[Q] A network engineer is troubleshooting an unsuccessful PPP multilink connection
between two routers. The multilink interface has been created and assigned a number, the
interface has been enabled for multilink PPP, and the interface has been assigned a
multilink group number that matches the group assigned to the member physical serial
interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which
additional command should to be issued on the multilink interface?
[A] ip address 192.168.10.1 255.255.255.252
[Q] Which PPP protocol allows a device to specify an IP address for routing over the PPP
link?
[A] --IPCP
[Q] Which public WAN technology provides security by using encrypted tunnels over
Internet connections?
[A] --VPN
[Q] Which medium do service providers use to transmit data over WAN connections with
SONET, SDH, and DWDM?
[A] --fiber optic
[Q] What is a characteristic of a WAN?
[A] --WAN service providers include carriers such as a telephone network or satellite
service.
[Q] With which layers of the OSI model do the PPP control protocols interface?
[A] --NCP interfaces with Layer 3; LCP interfaces with Layer 1
[Q] A construction firm is building a power plant at a remote and isolated mine site and
needs to connect the data network of the plant to the corporate network. Which public
technology is the most suitable to meet the connection needs?
[A] --satellite Internet
[Q] Which statement correctly describes a WAN technology?
[A] --MPLS can be used to deliver any type of packet between sites.
[Q] Which one of the WAN technologies is inadequate for video traffic but operates
adequately for voice traffic?
[A] --ISDN BRI
[Q] What equipment at the cable service provider office connects the office to the
subscriber locations?
[A] --CMTS
[Q] What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
[A] --192.168.70.0 to 192.168.70.127
[Q] A site-to-site VPN is created when devices on both sides of the VPN connection are
aware of the VPN configuration in advance.
[A] --True
A construction firm is building a power plant at a remote and isolated mine site and needs to connect
the data network of the plant to the corporate network. Which public technology is the most suitable to
meet the connection needs?
-- satellite Internet
Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and
DWDM?
-- fiber optic
Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single
destination?
-- Multilink
Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and
permanent virtual circuits?
-- ATM
PPP authentication is performed at which OSI layer?
-- Layer  2
What is a disadvantage of leased lines?
-- high cost
Which protocol is used by PPP to provide authentication and protection from playback attacks?
-- CHAP
What function does NCP perform in the establishment of a PPP session?
-- It completes the specific configuration of the network layer protocol that is being used.
Which additional functionality is available on an interface when the encapsulation is changed from HDLC
to PPP?
-- authentication
A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers.
The multilink interface has been created and assigned a number, the interface has been enabled for
multilink PPP, and the interface has been assigned a multilink group number that matches the group
assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled
for PPP multilink. Which additional command should to be issued on the multilink interface?
-- ip address  192.168.10.1 255.255.255.252
Which PPP protocol allows a device to specify an IP address for routing over the PPP link?
-- IPCP
Which public WAN technology provides security by using encrypted tunnels over Internet connections?
-- VPN
Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and
DWDM?
-- fiber optic
What is a characteristic of a WAN?
-- WAN service providers include carriers such as a telephone network or satellite service.
With which layers of the OSI model do the PPP control protocols interface?
-- NCP interfaces with Layer 3; LCP interfaces with Layer  1
A construction firm is building a power plant at a remote and isolated mine site and needs to connect
the data network of the plant to the corporate network. Which public technology is the most suitable to
meet the connection needs?
-- satellite Internet
Which statement correctly describes a WAN technology?
-- MPLS can be used to deliver any type of packet between sites.
Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice
traffic?
-- ISDN BRI
What equipment at the cable service provider office connects the office to the subscriber locations?
-- CMTS
What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?
--192.168.70.0 to 192.168.70.127
A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN
configuration in advance.
-- True
What TCP port is used by BGP to exchange messages between routers?
-- Port  179
Internal BGP is the routing protocol used between routers in the same AS.
-- True
Which statement describes a difference between the operation of inbound and outbound ACLs?
--Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after
the routing is completed.
Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy,
dynamic, and scalable manner.
-- True
An administrator has configured an access list on R1 to allow SSH administrative access from host
172.16.1.100 . Which command correctly applies the ACL?
--R1(config-line)# access-class 1 in
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with
wildcard mask 0.0.1.255?
--172.16.2.0 to 172.16.3.255
A newer and faster technology considered to be part of 4g technology.
--
To verify the state of a GRE tunnel, use the show interface tunnel command.
--False
External BGP is the routing protocol used between routers in different autonomous systems.

- True
-
A general term for Internet services from a mobile phone or from any device that uses the same
technology.
-- Wireless Internet
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and
encapsulation type configured on a Cisco router?
--show interface dialer 1
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
--PPPoE
Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling
protocol.
--True
Satellite Internet services are used in locations where land-based Internet access is not available, or for
temporary installations that are mobile.
-- True
Which statement describes a characteristic of standard IPv4 ACLs?
 They filter traffic based on source IP addresses
only.
--
What is an advantage offered by GRE tunnels?
-- support for IP multicast tunneling
It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to
render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.
-- Telnet DoS Attack
Which service is enabled on a Cisco router by default that can reveal significant information about the
router and potentially make it more vulnerable to attack?
--CDP
How can SNMP access be restricted to a specific SNMP manager?
--Define an ACL and reference it by using the snmp-server community command.
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
--Enable port security
It is a type of DHCP where the  attacker floods the DHCP server with bogus DHCP requests and
eventually leases all of the available IP addresses in the DHCP server pool.
-- DHCP starvation attack
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
-- True
allows source and destination ports to be in different switches.  
-- RSPAN
Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes
such as servers, workstations, routers, switches, and security appliances, on an IP network.
-- True
MAC address table flooding attacks are addressed with port security.
-- True
The show monitor command is used to verify the SPAN session.
-- False
SNMP is an application layer protocol that provides a message format for communication between
managers and agents
-- True
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
-- True
DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.
-- True   is a mitigation technique to prevent rogue DHCP servers from providing false
configuration parameters.
-- snooping
An attacker repeatedly uses a list of common passwords, dictionary words, and variations of words to
discover the administrative password .
-- brute force attack
Which mode is used to configure SNMP?
global configuration
mode
--
It is a type of DHCP  attack where the attacker configures a fake DHCP server on the network to issue
IP  addresses to clients.
-- Spoofing attacks
The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.
-- True
What is an SNMP management agent?
a communication protocol that is used by
SNMP
--
What is the default queuing method used on the LAN interfaces of Cisco devices?
--FIFO 
CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.
-- True
What happens when an edge router using IntServ QoS determines that the data pathway cannot
support the level of QoS requested?
Data is not forwarded along the
pathway.
--
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency
queuing (LLQ) is being used?
--voice 
Packets are forwarded in the order in which they are received.
-- FIFO
What happens when the memory queue of a device fills up and new network traffic is received?
--the network device will drop the arriving packets. 
Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and
input interfaces.
--CBWFQ
What does the WFQ  automated scheduling method stands for?
-- Weighted Fair Queuing
What does the FIFO queuing stands for?
-- First in, First out
Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
--True
IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly
managing network resources to provide QoS to specific user packet streams, sometimes called
microflows.
-- True
Which model is the only QoS model with no mechanism to classify packets?
--best-effort
Packets are classified into different flows based on header information including the ToS value.
-- WFQ
The LLQ feature brings strict priority queuing (PQ) to CBWFQ.
-
- False
Which statement describes the QoS classification and marking tools?
--Marking is the adding of a value to a packet header. 
How many levels of priority are possible when using class of service (CoS) marking on frames?
Under which condition does congestion occur on a converged network with voice, video, and data
traffic?
--if the request for bandwidth exceeds the amount of bandwidth available
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
-- CBWFQ

QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and
providing QoS guarantees on modern IP networks.
-- Differentiated Services
Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before
packets
in other  brains of the ACI architecture.
queues).

-- is
LL
Q
considere
d to be the
-- Application Policy Infrastructure Controller
The IoT refers to the network of billons of physical objects accessible through the Internet as we
continue to connect the unconnected.
-- True
This is typically regarded as the brains of a device.
-- CPU
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
-- Controller-based
What is an example of an M2M connection?
--a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system
for the sanitation truck to adjust its route for pickups
is a collection of end-point groups (EPG), their connections, and the policies that define those
connections.
-- Application Network Profile
What is a characteristic of data flow processing in SDN?
--Each data flow through the network must be approved by the SDN controller first.
Also called the forwarding plane, this plane is typically the switch fabric connecting the
various network ports on a device.
-- Data Plane
SDN is a network architecture that has been developed to virtualize the network.
-- True
These switches provide an application-aware switching fabric and work with an APIC to manage
the virtual and physical network infrastructure.
Which term describes the data exchanges between virtual servers in a data center?
--east-west traffic
Cloud computing and virtualization are different terms that refer to the same thing
Which network traffic management technology is a basic element in SDN implementations?
-- Openflow
How many "things" are predicted to be interconnected on the Internet by 2020?
--50  billion
A purpose-built hardware solution for integrating cloud computing and data center management.
-- Hyperconvergence
Which Cloud computing service would be best for an organization that needs to collaboratively
create applications and deliver them over the web?
Today, over __% of things in the physical world are still not connected to the Internet. Select the
answer that will complete the statement.
--99
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
--The leaf switches always attach to the spines, but they never attach to each other.
  A network architecture that virtualizes the network.
-- Network virtualization
What is Fog computing?
--It is a type of computing where services are hosted where they are used, such as at the network
edge or with end devices.
  topology shows the physical layout of the devices connected to the network.
-- Network topology
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is
the purpose of this command?
--to probe the server that provides the web service to determine if it is also running an email service
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
-- cable testers
A network engineer is troubleshooting a network that has recently been updated with a new
routing protocol, but the network is not working as expected. The engineer is comparing the
running configuration from before and after the change was made. Which approach to
troubleshooting the problem is the engineer using?

A client calls the support desk and says this to a technician: "I have just started my computer and
attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to
network drives and access the Internet." Which statement would describe the status of this issue?
--The helpdesk has enough information to begin finding a resolution.
A network engineer is investigating an access issue to a web server. The web server can access the
Internet and the local clients can open the web pages. However, outside clients cannot access the
web pages. What is the most likely cause of the problem?
--An ACL is blocking incoming connections.
topology illustrates how devices are logically connected to the
network, meaning how devices actually transfer data across the network when communicating
with other devices.
-- logical network
are specialized, handheld devices designed for testing the various types of data communication
cabling.
-- Cable Testers
After gathering symptoms, if the troubleshooter determines that the problem is located outside the
control of the organization, what is the next step?
--Contact the administrator of the external system.
Which command runs several other show commands in order to generate many pages of detailed
troubleshooting information?

The OSI reference model describes how information from a software application in one computer
moves through a network medium to a software application in another computer.
--True
The show ip route and show ipv6 route commands are used to display the routing table in a router
to learn the directly connected neighbors, more remote devices (through learned routes), and the
routing protocols that have been configured.
Which feature sends simulated data across the network and measures performance between
multiple network locations?
-- IP SLA  
When is the most appropriate time to measure network operations to establish a network
performance baseline?
--at the same time each day across a set period of average working days, so that typical traffic
patterns can be established
Use the show ip sla configuration operation-number command to display configuration values
including all defaults for IP SLA operations or for a specific operation.
-- True
Which statement describes the physical topology for a LAN?
--It defines how hosts and network devices connect to the LAN.
transmits bits from one computer to another and regulates the transmission of a stream of bits over
the physical medium.
-- Layer 1: Physical
The show ip interface brief and show ipv6 interface brief commands are used to display the up or
down status and IP address of all interfaces on a device.

The show cdp neighbors detail command is used to obtain detailed information about directly
connected Cisco neighbor devices.
-- True
diagrams keep track of the location, function, and status of devices on the network.
-- Network tracking tool
a type of network that establishes a dedicated circuit (or channel) between nodes and
terminals before the users may communicate.
-- Circuit-switched network
The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.
-- True
It is a networking device that provides internetworking and WAN access interface ports that are
used to connect to the service provider network.
-- router
It is a WAN protocol that provides  Provides router-to-router and host-to-network connections
over synchronous and asynchronous circuits.
-- PPP
It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-
switched connections when the link uses two Cisco devices.
-- HDLC
This is a point established in a building or complex to separate customer equipment from service
provider equipment.
-- Demarcation point
It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-
defined traffic classes.
-- CBWFQ
It SPAN Terminology which  refers to the traffic that enters the switch.
-- Ingress Traffic
It is a SPAN Terminology which  refers to the traffic that leaves the switch.
-- Egress Traffic
It is an  SPAN Terminology which refers to the port that is monitored with use of the SPAN feature
answer Source (SPAN) port
-- Source VLAN
It is a queuing algorithm which feature brings strict priority queuing (PQ) to
CBWFQ.
-- LLQ
feature on Cisco switches is a type of port mirroring that sends copies of the frame entering a port,
out another port on the same switch.
-- SPAN
It is a type of telnet attack where the attacker may use a list of common passwords, dictionary
words, and variations of words to discover the administrative password
-- Brute Force Attack
 Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before
packets in other queues).
-- LLQ
It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth
allocation to all network traffic.
-- WFQ
One of the  new challenges associated with the rapid growth of the IoT is increasing the
CPU power of computers
-- False
An attack has been launched within a company and a host name has been identified as the source.
What command can a network technician use to determine the IP address assigned to the host
name?
-- nslookup
One of the  new challenges associated with the rapid growth of the IoT is improving the
Internet connections from homes
-- False
One of the  new challenges associated with the rapid growth of the IoT is securing new
devices with varying level of security.
-- True
One of the  new challenges associated with the rapid growth of the IoT is  developing
better routing protocols for new devices
-- False
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to
create data paths within a network?
-- control plane
For a data center, what is the difference in the server virtualization data traffic compared with the
traditional client-server model?

-- There are significant data exchanges between virtual servers. 


  is software that creates and runs VM instances and can be installed directly on hardware or
run as an application on an OS.
-- Hypervisors
One of the  new challenges associated with the rapid growth of the IoT is integrating new
things into existing networks.
-
-  True
One of the  new challenges associated with the rapid growth of the IoT is integrating many
devices from different vendors with custom applications.
-- True

You might also like