Time limit: 0
Quiz-summary
0 of 70 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
Information
Good luck
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 70 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Answered
- Review
-
Question 1 of 70
1. Question
Which component of the Cisco SDN solution serves as the centralized management system?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/solutions/data-center-virtualization/application-centric-infrastructure/index.html Cisco Application Policy Infrastructure Controller (APIC) Provides single-click access to all Cisco ACI fabric information, enabling network automation, programmability, and centralized management. http://www.cisco.com/c/en/us/products/cloud-systems-management/application-policy-infrastructure-controller-apic/index.html The Cisco Application Policy Infrastructure Controller (Cisco APIC) is the unifying point of automation and management for the Application Centric Infrastructure (ACI) fabric. The Cisco APIC provides centralized access to all fabric information, optimizes the application lifecycle for scale and performance, and supports flexible application provisioning across physical and virtual resources. The Cisco APIC provides centralized access to all fabric information, optimizes the application lifecycle for scale and performance, and supports flexible application provisioning across physical and virtual resources. Centralized application-level policy engine for physical, virtual, and cloud infrastructures Designed for automation, programmability, and centralized management, the Cisco APIC itself exposes northbound APIs through XML and JSON. It provides both a command-line interface (CLI) and GUI which utilize the APIs to manage the fabric holistically. Cisco APIC provides: A single pane of glass for application-centric network policies Fabric image management and inventory Application, tenant, and topology monitoring Troubleshooting -
Question 2 of 70
2. Question
What command can you enter in config mode to create DHCP pool?Correct
Incorrect
-
Question 3 of 70
3. Question
Which utility can you use to determine whether a switch can send echo requests and replies?Correct
Incorrect
-
Question 4 of 70
4. Question
What is the two benefits of DHCP snooping? (Choose two)Correct
Incorrect
-
Question 5 of 70
5. Question
What are the three major components of cisco network virtualization? (Choose Three)Correct
Incorrect
-
Question 6 of 70
6. Question
Which feature is config by setting a variance that is at least 2 times the metric?Correct
Incorrect
-
Question 7 of 70
7. Question
Standard industrialized protocol of etherchannel?Correct
Incorrect
-
Question 8 of 70
8. Question
Two features of the extended ping command? (Choose two)Correct
Incorrect
-
Question 9 of 70
9. Question
What command is used to configure a switch as authoritative NTP server?Correct
Incorrect
-
Question 10 of 70
10. Question
Which two statements about syslog logging are true?Correct
Incorrect
Hint
tested on real hardware Router2801#sh logging Syslog logging: enabled (11 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator Console logging: level debugging, 348 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level warnings, 56 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled No active filter modules. ESM: 0 messages dropped Trap logging: level informational, 343 message lines logged Log Buffer (51200 bytes): *May 16 08:11:45: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up *May 16 08:11:49: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up May 16 08:22:11: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down May 16 08:22:45: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up May 16 08:35:25: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down May 16 08:36:49: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up May 16 10:25:02: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down May 16 10:25:53: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up May 16 17:49:46: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to down May 16 17:50:22: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up Router2801# ————————————————————————– After reload: Router2801#sh logging Syslog logging: enabled (11 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator. Console logging: level debugging, 26 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled Buffer logging: level warnings, 2 messages logged, xml disabled, filtering disabled Logging Exception size (4096 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled No active filter modules. ESM: 0 messages dropped Trap logging: level informational, 30 message lines logged Log Buffer (51200 bytes): *May 17 11:39:45: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up *May 17 11:39:49: %LINK-3-UPDOWN: Interface Virtual-Access2, changed state to up Router2801# -
Question 11 of 70
11. Question
How to enable vlans automatically across multiple switches?Correct
Incorrect
-
Question 12 of 70
12. Question
Which password types are encrypted?Correct
Incorrect
-
Question 13 of 70
13. Question
What is the binary pattern of unique ipv6 unique local address?Correct
Incorrect
-
Question 14 of 70
14. Question
Which statement about ACLs is true?Correct
Incorrect
-
Question 15 of 70
15. Question
What is the cause of the Syslog output messages?Correct
Incorrect
-
Question 16 of 70
16. Question
What are contained in layer 2 ethernet frame? (Choose Three.)Correct
Incorrect
-
Question 17 of 70
17. Question
Describe the best way to troubleshoot and isolate a network problem?Correct
Incorrect
-
Question 18 of 70
18. Question
Under normal operations, cisco recommends that you configure switch ports on which vlan?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/24330-185.html Note: There is a potential security consideration with dot1q that the implicit tagging of the native VLAN causes. The transmission of frames from one VLAN to another without a router can be possible. Refer to the Intrusion Detection FAQ leavingcisco.com for further details. The workaround is to use a VLAN ID for the native VLAN of the trunk that is not used for end-user access. In order to achieve this, the majority of Cisco customers simply leave VLAN 1 as the native VLAN on a trunk and assign access ports to VLANs other than VLAN 1. -
Question 19 of 70
19. Question
In which byte of an IP packet can traffic be marked?Correct
Incorrect
Hint
-
Question 20 of 70
20. Question
Which command can you enter to route all traffic that is destined to 192.168.0.0/20 to a specific interface?Correct
Incorrect
-
Question 21 of 70
21. Question
Which two protocol can detect native vlan mismatch errors? (Choose two.)Correct
Incorrect
Hint
A Oct 5 23:29:16: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet11/43 (512), with WS-C2950-12 FastEthernet0/6 (1) D http://blog.ine.com/2008/07/17/pvst-explained/ Case 1: Change the native VLAN on SW1 connection to R3: SW1: interface FastEthernet 1/3 switchport trunk native vlan 2 Rack1SW2# %SPANTREE-2-RECV_PVID_ERR: Received BPDU with inconsistent peer vlan id 2 on FastEthernet1/3 VLAN1. %SPANTREE-2-BLOCK_PVID_PEER: Blocking FastEthernet1/3 on VLAN2. Inconsistent peer vlan.PVST+: restarted the forward delay timer for FastEthernet1/3 %SPANTREE-2-BLOCK_PVID_LOCAL: Blocking FastEthernet1/3 on VLAN1. Inconsistent local vlan.PVST+: restarted the forward delay timer for FastEthernet1/3 Note that SW2 detects untagged packet with VLAN ID 2, which does not correspond to the locally configured default native VLAN 1. The corresponding port is put in «inconsistent» state. The reason SW2 detects this condition (and not SW1) is because SW1 sending SSTP BPDUs and SW2 is not (it receives superios BPDUs). As soon as native VLAN is converted back to «1» on SW1, consistency is restored: -
Question 22 of 70
22. Question
Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.)Correct
Incorrect
Hint
http://www.pathsolutions.com/network-enemy-1-duplex-mismatch/ -
Question 23 of 70
23. Question
What are two benefits of Private IPv4 Addresses? (Choose two.)Correct
Incorrect
Hint
http://smallbusiness.chron.com/advantages-disadvantages-using-private-ip-address-space-46424.html -
Question 24 of 70
24. Question
How many bits represent network id in a IPv6 address?Correct
Incorrect
Hint
http://networkengineering.stackexchange.com/questions/30836/calculate-networking-bits-for-ipv6 64 bits for Nwtwork ID and 64 bits for Interface ID 64+64=128 -
Question 25 of 70
25. Question
?????(An image on exhibit) An interface which we have to determine from the routing the route learned by which routing protocol?Correct
Incorrect
-
Question 26 of 70
26. Question
Which WAN topology is most appropriate for a centrally located server farm with several satellite branches?Correct
Incorrect
Hint
In a Hub-and-spoke Site-to-Site Wide Area Network (WAN) network topology, one physical site act as Hub (Example, Main Office), while other physical sites act as spokes. Spoke sites are connected to each other via Hub site. In Hub-and-spoke Wide Area Network (WAN) topology, the network communication between two spokes always travels through the hub. -
Question 27 of 70
27. Question
Which function allows EIGRP peers to receive notice of implementing topology changes?Correct
Incorrect
-
Question 28 of 70
28. Question
If you configure syslog messages without specifying the logging trap level, which log messages will the router send?Correct
Incorrect
-
Question 29 of 70
29. Question
Which three options are benefits of using TACACS+ on a device? (Choose three)Correct
Incorrect
Hint
http://tacacs.net/docs/TACACS_Advantages.pdf -
Question 30 of 70
30. Question
What layer of the OSI Model is included in TCP/IP Model’s INTERNET layer?Correct
Incorrect
-
Question 31 of 70
31. Question
Which two of these are characteristics of the 802.1Q protocol? (Choose two.)Correct
Incorrect
-
Question 32 of 70
32. Question
Which two features can dynamically assign IPv6 addresses? (Choose two.)Correct
Incorrect
Hint
rfc4862 in which wrote: Appendix C. Changes since RFC 2462 Major changes that can affect existing implementations: o Avoided the wording of “stateful configuration”, which is known to be quite confusing, and simply used “DHCPv6” wherever appropriate. In Obsolete RFC 2462: IPv6 defines both a stateful and stateless address autoconfiguration mechanism. … In the stateful autoconfiguration model, hosts obtain interface addresses and/or configuration information and parameters from a server. -
Question 33 of 70
33. Question
A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which 802.1x mode allows these actions?Correct
Incorrect
-
Question 34 of 70
34. Question
How to verify strong and secured SSH connection?Correct
Incorrect
-
Question 35 of 70
35. Question
How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet mask of 255.255.255.240?Correct
Incorrect
-
Question 36 of 70
36. Question
What interconnection cable can you use when you use a MDI connection?Correct
Incorrect
-
Question 37 of 70
37. Question
Which cisco platform can verify ACLs?Correct
Incorrect
-
Question 38 of 70
38. Question
In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?Correct
Incorrect
-
Question 39 of 70
39. Question
When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?Correct
Incorrect
-
Question 40 of 70
40. Question
If you want multiple hosts on a network, where do you configure the setting?Correct
Incorrect
-
Question 41 of 70
41. Question
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?Correct
Incorrect
-
Question 42 of 70
42. Question
Which statement about the IP SLAs ICMP Echo operation is true?Correct
Incorrect
-
Question 43 of 70
43. Question
Which action can change the order of entries in a named access-list?Correct
Incorrect
-
Question 44 of 70
44. Question
How does a router handle an incoming packet whose destination network is missing from the routing table?Correct
Incorrect
Hint
Change from “it discards the packet” to “it routes the packet to the default route” because there is new question Which definition of default route is true? with answer “A route used when a destination route is missing.” -
Question 45 of 70
45. Question
Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)Correct
Incorrect
-
Question 46 of 70
46. Question
Which three statements about HSRP operation are true? (Choose three.)?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/10583-62.html#topic5 “The active router sources hello packets from its configured IP address and the HSRP virtual MAC address. The standby router sources hellos from its configured IP address and the burned-in MAC address (BIA).” http://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/10583-62.html#topic14 “By default, these timers are set to 3 and 10 seconds, respectively…” http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6000-series-switches/29545-168.html#q1 Load Sharing with HSRP http://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/13781-7.html#conf “…has a 256 unique HSRP group ID limit.” “…the allowed group ID range (0-255). … MSFC2A (Supervisor Engine 32) can use any number of group IDs from that range. -
Question 47 of 70
47. Question
Which two options describe benefits of aggregated chassis technology ( choose 2)?Correct
Incorrect
-
Question 48 of 70
48. Question
How to trouble DNS issue ( choose two)?Correct
Incorrect
Hint
http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1907.html#wp1021264 Ping the destination by name perform a DNS lookup on the destination -
Question 49 of 70
49. Question
Which utility can you use to identify redundant or shadow rules?Correct
Incorrect
-
Question 50 of 70
50. Question
What does traffic shaping do to reduce congestion in a network?Correct
Incorrect
-
Question 51 of 70
51. Question
Which 2 statements about extended traceroute command is true?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13730-ext-pingtrace.html#ext_troute “This table lists the traceroute command field descriptions: Source address: The interface or IP address of the router to use as a source address for the probes. The router normally picks the IP address of the outbound interface to use. Minimum Time to Live [1]: The TTL value for the first probes. The default is 1, but it can be set to a higher value to suppress the display of known hops. Maximum Time to Live [30]: The largest TTL value that can be used. The default is 30. The traceroute command terminates when the destination is reached or when this value is reached. -
Question 52 of 70
52. Question
Which command can you enter to determine the addresses that have been assigned on a DHCP Server?Correct
Incorrect
Hint
http://www.aubrett.com/InformationTechnology/RoutingandSwitching/Cisco/CiscoRouters/ DHCPBindings.aspx “Router#show ip dhcp binding Bindings from all pools not associated with VRF: IP address Client-ID/ Lease expiration Type 10.16.173.0 24d9.2141.0ddd Jan 12 2013 03:42 AM Automatic” -
Question 53 of 70
53. Question
Which statement about SNMPv2 is true?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html#wp1010901 “Model___Level_________Authentication_____Encryption__What Happens v2c_____noAuthNoPriv___Community String__No________Uses a community string match for authentication.” So B & D must be wrong, because there is no “password” in SNMPv2. A is wrong because there is no encryption in SNMPv2. -
Question 54 of 70
54. Question
Which symptom most commonly indicates that 2 connecting interface are configured with a duplex mismatch?Correct
Incorrect
-
Question 55 of 70
55. Question
Which VTP mode can not make a change to vlan?Correct
Incorrect
Hint
VTP Client · VTP clients function the same way as VTP servers, but you cannot create, change, or delete VLANs on a VTP client. · A VTP client only stores the VLAN information for the entire domain while the switch is on. · A switch reset deletes the VLAN information. · You must configure VTP client mode on a switch. -
Question 56 of 70
56. Question
Which function does IP SLA ICMP ECHO operation perform to assist with troubleshooting?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/ios xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_icmp_pathjitter.html -
Question 57 of 70
57. Question
Which mode are in PAgP? (choose two)Correct
Incorrect
Hint
http://www.omnisecu.com/cisco-certified-network-associate-ccna/etherchannel-pagp-and-lacp-modes.php -
Question 58 of 70
58. Question
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)Correct
Incorrect
-
Question 59 of 70
59. Question
Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.)Correct
Incorrect
-
Question 60 of 70
60. Question
At which layer of the OSI model does PPP perform?Correct
Incorrect
-
Question 61 of 70
61. Question
What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?(Choose three.)Correct
Incorrect
-
Question 62 of 70
62. Question
Which IPv6 header field is equivalent to the TTL?Correct
Incorrect
Hint
Time To Live (TTL)/Hop Limit (8 bits) http://ipv6.com/articles/general/IPv6-Header.htm -
Question 63 of 70
63. Question
Which port security mode can assist with troubleshooting by keeping count of violations?Correct
Incorrect
-
Question 64 of 70
64. Question
Which 2 optns are requirements for configuring ripv2 for ipv4 (choose 2 )?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfrip.html#wp1000889 “Enabling RIP (Required) Allowing Unicast Updates for RIP (Required)” RIP Version 1 and Version 2 have the same basic requirements! -
Question 65 of 70
65. Question
Which configuration command can u apply to a hsrp router so that its local interface becomes active if all other routers in the group fail?Correct
Incorrect
-
Question 66 of 70
66. Question
Which 2 statement about EIGRP on IPv6 device is true?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/113267-eigrp-ipv6-00.html -
Question 67 of 70
67. Question
Which command can you enter to troubleshoot the failure of address assignment?Correct
Incorrect
-
Question 68 of 70
68. Question
Which three technical services support cloud computing?Correct
Incorrect
-
Question 69 of 70
69. Question
Which two steps must you perform to enbale router- on- stick on a switch?Correct
Incorrect
-
Question 70 of 70
70. Question
Which add prefix does OSPFv3 use when multiple IPv6 address are configured on a single interface?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-routeospfv3.html#GUID-05F3F09C-FE3E-41D6-9845-111FB17AD030 “In IPv6, you can configure many address prefixes on an interface. In OSPFv3, all address prefixes on an interface are included by default. You cannot select some address prefixes to be imported into OSPFv3; either all address prefixes on an interface are imported, or no address prefixes on an interface are imported.”