Modul 1
Modul 1
1.1.7 Check
Your Understanding - OSPF
Features and Characteristics
1. Which of the following OSPF components is associated with the neighbor table?
Adjacency Database
2. Which of the following OSPF components is responsible for computing the cost of each route?
Dijkstra’s algorithm
3. Which of the following OSPF components is associated with the topology table?
Link-state database
4. Which of the following OSPF components is associated with the routing table?
Forwarding database
2. Which of the following OSPF packets is used by routers to announce new information?
Type 4: LSU Packet
3. Which of the following OSPF packets is used by routers to request more information?
4. Which of the following OSPF packets is responsible for establishing and maintaining
adjacency with other OSPF routers?
6. Which of the following is used with the Hello Packet to uniquely identify the originating router?
Router ID
Operation
1. During this OSPF state on multiaccess networks, the routers elect a Designated Router (DR)
and a Backup Designated Router (BDR).
Two-way state
2. During this OSPF state, routers send each other DBD packets
Exchange State
3. An OSPF router enters this state when it has received a Hello packet from a neighbor,
containing the sending Router ID.
Init State
4. During this OSPF state on point-to-point networks, the routers decide which router initiates the
exchange of DBD packets.
ExStart State
Full State
6. During this OSPF state, no Hello packets are received
Down State
7. During this OSPF state, routes are processed using the SPF algorithm
Loading State
Concepts
1. What is a function of OSPF hello packets?
LSU
3. Which three statements describe features of the OSPF topology table? (Choose three.)
- The table can be viewed via the show ip ospf database command
5. A router is participating in an OSPFv2 domain. What will always happen if the dead interval
expires before the router receives a hello packet from an adjacent DROTHER OSPF router?
OSPF will remove that neighbour from the router link-state database
6. What is the order of packet types used by an OSPF router to establish convergence?
adjacency database
link-state database
dissemination of LSAs
11. What are two reasons for creating an OSPF network with multiple areas? (Choose two.)
12. At which OSPF state are neighbor routers converged and able to exchange routing updates?
Full
13. The OSPF hello timer has been set to 15 seconds on a router in a point-to-point network. By
default, what is the dead interval on this router?
60 seconds
14. What happens immediately after two OSPF routers have exchanged hello packets and have
formed a neighbor adjacency?
Arranging routers into areas partitions a large autonomous system in order to lighten the load on
routers
1. True or False? In the router ospf process-id command, the process ID value, which can any
number between 1 and 65,535, is globally significant. It must be the same on all routers in the
OSPF area.
True
2. Which of the following applies to the router ID? (Choose two)
3. Which of the following is the order of precedence for choosing the router ID?
2. Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an
OSPF configuration?
0.0.0.31
3. The following three networks are directly connected to an OSPF router; 192.168.0.0/24,
192.168.1.0/24, and 192.168.2.0/24. Which OSPF network command would advertise only the
192.168.1.0 network to neighbors?
4. Which three parameters should match in order for a pair of routers to form an adjacency when
running OSPFv2? (Choose three.)
- hello timer
- subnet mask
5. What are two features of the OSPF routing protocol? (Choose two.)
7. Which verification command would identify the specific interfaces on a router that were
configured with the passive-interface command?
show ip protocols
8. Which command, if applied on an OSPF router, would give a Gigabit Ethernet interface a
lower cost than a Fast Ethernet interface?
9. A network administrator has just changed the router ID on a router that is working in
an OSPFv2 environment. What should the administrator do to reset the adjacencies and use the
new router ID?
10. Which command can be used to view the OSPF hello and dead time intervals?
11. What does the SPF algorithm consider to be the best path to a network?
13. What is the first criterion used by OPSF routers to elect a DR?
Highest priority
14. Which command could be used on a router to ensure that an OSPF adjacency is formed with
another router?
15. A router in an OSPF enterprise network has a default static route that has been configured
via the interface that connects to the ISP. Which command would the network administrator
apply on this router so that other routers in the OSPF network will use this default route?
default-information originate
1. Which security term is used to describe anything of value to the organization? It includes
people, equipment, resources, and data.
Asset
2. Which security term is used to describe a weakness in a system, or its design, that could be
exploited by a threat?
Vulnerability
3. Which security term is used to describe a potential danger to a company’s assets, data, or
network functionality?
Threat
4. Which security term is used to describe a mechanism that takes advantage of a vulnerability?
Exploit
5. Which security term is used to describe the counter-measure for a potential threat or risk?
Mitigation
6. Which security term is used to describe the likelihood of a threat to exploit the vulnerability of
an asset, with the aim of negatively affecting an organization?
Risk
1. Which type of hacker is described in the scenario: After hacking into ATM machines remotely
using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I
discovered.
Gray Hat
2. Which type of hacker is described in the scenario: From my laptop, I transferred $10 million to
my bank account using victim account numbers and PINs after viewing recordings of victims
entering the numbers.
Black Hat
White Hat
4. Which type of hacker is described in the scenario: I used malware to compromise several
corporate systems to steal credit card information. I then sold that information to the highest
bidder.
Black Hat
5. Which type of hacker is described in the scenario: During my research for security exploits, I
stumbled across a security vulnerability on a corporate network that I am authorized to access.
White Hat
6. Which type of hacker is described in the scenario It is my job to work with technology
companies to fix a flaw with DNS.
White Hat
1. Which penetration testing tool uses algorithm schemes to encode the data, which then
prevents access to the data?
Encryption Tools
2. Which penetration testing tool is used by black hats to reverse engineer binary files when
writing exploits? They are also used by white hats when analyzing malware.
Debuggers
3. Which penetration testing tool is used to probe and test a firewall’s robustness?
Forensic ools
5. Which penetration testing tool identifies whether a remote host is susceptible to a security
attack?
Worm
2. Which malware is non-self-replicating type of malware? It often contains malicious code that is
designed to look like something else, such as a legitimate application or file. It attacks the device
from within.
Trojan Horse
3. Which malware is used to gather information about a user and then, without the user's
consent, sends the information to another entity?
Spyware
4. Which malware typically displays annoying pop-ups to generate revenue for its author?
Adware
Phising
6. Which malware is installed on a compromised system and provides privileged access to the
threat actor?
Rootkit
7. Which malware denies access to the infected computer system and demands payment before
the restriction is removed?
Ransomware
Check Your Understanding - Common Network
3.5.10
Attacks
Social Engineering
Access
Reconnaissance
Access
Access
1. Which attack is being used when threat actors position themselves between a source and
destination to transparently monitor, capture, and control the communication?
MiTM Attack
2. Which attack is being used when threat actors gain access to the physical network, and then
use an MiTM attack to capture and manipulate a legitimate user’s traffic?
Session Hijacking
3. Which attack is being used when threat actors initiate a simultaneous, coordinated attack from
multiple source machines?
ICMP Attack
5. Which attack being used is when a threat actor creates packets with false source IP address
information to either hide the identity of the sender, or to pose as another legitimate user?
2. Which attack uses a four-way exchange to close the connection using a pair of FIN and ACK
segments from each endpoint?
3. Which attack is being used when the threat actor spoofs the IP address of one host, predicts
the next sequence number, and sends an ACK to the other host?
4. A program sweeps through all the known ports on a server and sends ICMP echo requests to
each closed port. This causes the server to reply with numerous ICMP port unreachable
messages. Which attack is this?
ASA Firewall
2. Which network security device contains a secure database of who is authorized to access and
manage network devices?
AAA Server
3. Which network security device filters known and suspicious internet malware sites?
ESA/WSA
4. Which network security device is used to provide secure services with corporate sites and
remote access support for remote users using secure encrypted tunnels?
VPN
5. Which network security device monitors incoming and outgoing traffic looking for malware,
network attack signatures, and if it recognizes a threat, it can immediately stop it?
IPS
2. Which encryption method encrypts plaintext one byte or one bit at a time?
Stream Cipher
3. Which encryption method uses the same key to encrypt and decrypt data?
Symmetric
4. Which encryption method is a stream cipher and is used to secure web traffic in SSL and
TLS?
Rivest Cipher
DDoS
attempting to write more data to a memory location than that location can hold
confidentiality
4. What type of malware has the primary objective of spreading across the network?
worm
AES
6. What three items are components of the CIA triad? (Choose three.)
- integrity
- availability
- confidentiality
7. Which cyber attack involves a coordinated attack from a botnet of zombie computers?
DDoS
8. What specialized network device is responsible for enforcing access control policies between
networks?
Firewall
Access
11. Which type of DNS attack involves the cybercriminal compromising a parent domain and
creating multiple subdomains to be used during the attacks?
shadowing
12. Which two types of hackers are typically classified as grey hat hackers? (Choose two.)
- hacktivists
- vulnerability brokers
14. A cleaner attempts to enter a computer lab but is denied entry by the receptionist because
there is no scheduled cleaning for that day. What type of attack was just prevented?
social engineering
If there are no matching ACEs in the ACL, the packet is forwarded because there is an implicit
permit ACE automatically applied to all ACLs.
0.0.0.0
2. Which wildcard mask would permit only hosts from the 10.10.0.0/16 network?
0.0.255.255
255.255.255.255
4. Which wildcard mask would permit all hosts from the 192.168.10.0/24 network?
0.0.0.255
- No routing table entry exists for the packet destination, but the packet matches a
permitted address in an outbound ACL
- The packet source address does not match the source as permitted in a standard
inbound ACE.
- 172.16.15.36
- 172.16.0.255
3. Which two statements describe appropriate general guidelines for configuring and applying
ACLs? (Choose two.)
- The most specific ACL statements sould be entered first because of the top-down
sequential nature of ACLs
4. What single access list statement matches all of the following networks?
192.168.16.0
192.168.17.0
192.168.18.0
192.168.19.0
- A packet can either be rejected or forwarded as directed by the ACE that is matched
- An implicit deny any rejects any packet that does not match any ACE
- Each statement is checked only until a match is detected or until the end of the ACE list
6. A network administrator is configuring an ACL to restrict access to certain servers in the data
center. The intent is to apply the ACL to the interface connected to the data center LAN. What
happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the
outbound direction?
7. Which scenario would cause an ACL misconfiguration and deny all traffic?
traffic that is leaving the router and going toward the destination host
9. When creating an ACL, which keyword should be used to document and interpret the purpose
of the ACL statement on a Cisco device?
remark
10. Which location is recommended for extended numbered or extended named ACLs?
11. Which range represents all the IP addresses that are affected when network 10.120.160.0
with a wildcard mask of 0.0.7.255 is used in an ACE?
10.120.160.0 to 10.120.167.255
12. A college student is studying for the Cisco CCENT certification and is visualizing extended
access lists. Which three keywords could immediately follow the keywords permit or deny as
part of an extended access list? (Choose three.)
- tcp
- udp
- icmp
13. If the provided ACEs are in the same ACL, which ACE should be listed first in the ACL
according to best practice?
14. Which operator is used in an ACL statement to match packets of a specific application?
eq
- access-class 5 in
R1# show access-lists
extended IP access list 100
deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet
deny tcp host 10.1.2.2 host 10.1.2.1 eq telnet
permit ip any any (15 matches)
- Any device on the 10.1.1.0/24 network (except the 10.1.1.2 device) can telnet to the
router that has the IP address 10.1.1.1 assigned
3. Which command will verify the number of packets that are permitted or denied by an ACL that
restricts SSH access?
show access-lists
4. Which access list statement permits HTTP traffic that is sourced from host 10.1.129.100 port
4300 and destined to host 192.168.30.10?
access-list 101 permit tcp 10.1.128.0 0.0.1.255 eq 4300 192.168.30.0 0.0.0.15 eq www
5. When configuring router security, which statement describes the most effective way to use
ACLs to control Telnet traffic that is destined to the router itself?
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from
connecting to an unsecured port
6. What packets would match the access control list statement that is shown below?
7. Consider the access list command applied outbound on a router serial interface.
access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo reply
8. Consider the following output for an ACL that has been applied to a router via the access-
class in command. What can a network administrator determine from the output that is shown?
R1# <output omitted>
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 match)
Two devices were able to use SSH or Telnet to gain access to the router
10. To facilitate the troubleshooting process, which inbound ICMP message should be permitted
on an outside interface?
echo reply
11. What two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the
192.168.0.0/16 network? (Choose two.)
12. An administrator has configured an access list on R1 to allow SSH administrative access
from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 in
1. Refer to the exhibit. What type of NAT address is the IP address of PC1 (i.e.,
192.168.10.10)?
Inside Local
2. Refer to the exhibit. Into what type of address has the IPv4 address for PC1 been translated
(i.e., 209.165.200.226)?
Inside Global
3. Refer to the exhibit. What type of NAT address is the IP address of the Web Server (i.e.,
209.165.201.10)?
Outside Global
True
2. True or False? With NAT overload, each inside local IP address is translated to a unique
inside global IP address on a one-for-one basis.
False
3. True or False? The use of NAT makes end-to-end traceability between source and destination
easier.
True
4. True or False? Tunneling protocols such as IPsec do not work well through NAT.
True
- NAT introduces problems for some applications that require end-to-end connectivity
2. A network administrator wants to examine the active NAT translations on a border router.
Which command would perform the task?
3. What are two tasks to perform when configuring static NAT? (Choose two.)
- Create a mapping between the inside local and inside global addresses
Changing ISPs is simpler because the devices on the inside network do not have to be
configured with new addresses when the outside address changes
It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4
addresses
7. What address translation is performed by static NAT?
8. Using NAT terminology, what is the address of the source host on a private network as seen
from inside the network?
inside local
Any host or user can get a public IPv6 network address because the number of available IPv6
addresses is extremely large
11. A company designs its network so that the PCs in the internal network are assigned IP
addresses from DHCP servers, and the packets that are sent to the Internet are translated
through a NAT-enabled router. What type of NAT enables the router to populate the translation
table from a pool of unique public addresses, as the PCs send packets through the router to the
Internet?
dynamic NAT
13. When dynamic NAT without overloading is being used, what happens if seven users attempt
to access a public server on the Internet when only six addresses are available in the NAT pool?
14. A company has been assigned the 203.0.113.0/27 block of IP addresses by the ISP. The
company has over 6000 internal devices. What type of NAT would be most appropriate for the
employee workstations of the company?
15. Which version of NAT allows many hosts inside a private network to simultaneously use a
single inside global address for connecting to the Internet?
PAT
7.1.6 Check Your Understanding - Purpose of WANs
1. Which two options describe a WAN? (Choose two.)
- A WAN provides networking services over large geographical areas
2. Which topology type describes the virtual connection between source to destination?
logical topology
2. Which WAN term defines the point where the subscriber connects to the service provides
network
Point-of-Presence (POP)
3. Which two devices operate in a similar manner to the voiceband modem but use higher
broadband frequencies and transmission speeds. (Choose two.)
- cable modem
- DSL modem
Serial
5. Which two WAN connectivity options are circuit-switched technologies? (Choose two.)
- ISDN
- PSTN
6. Which two WAN connectivity options are packet-switched technologies? (Choose two.)
- Ethernet WAN
- Frame Relay
7. Which service provider fiber-optic technology increases the data-carrying capacity using
different wavelengths?
DWDM
Leased Lines
2. Which two traditional WAN connectivity options are circuit-switched? (Choose two.)
- ISDN
- PSTN
3. Which two traditional WAN connectivity options are packet-switched? (Choose two.)
- ATM
- Frame relay
Metro Ethernet
2. Which is a service provider WAN solution that uses labels to direct the flow of packets through
the provider network?
MPLS
WAN
2. What is the recommended technology to use over a public WAN infrastructure when a branch
office is connected to the corporate site?
VPN
3. Which medium do service providers use to transmit data over WAN connections with SONET,
SDH, and DWDM?
fiber optic
5. Which type of network would be used by a company to connect locations across the country?
WAN
6. A small company with 10 employees uses a single LAN to share information between
computers. Which type of connection to the Internet would be appropriate for this company?
7. To which two layers of the OSI model do WAN technologies provide services? (Choose two.)
- physical layer
8. A customer needs a metropolitan area WAN connection that provides high-speed, dedicated
bandwidth between two sites. Which type of WAN connection would best fulfill this need?
Ethernet WAN
9. An intercity bus company wants to offer constant Internet connectivity to the users traveling on
the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.)
- cellular
- public infrastructure
10. An enterprise has four branches. The headquarters needs full connectivity to all branches.
The branches do not need to be connected directly to each other. Which WAN topology is most
suitable?
WAN service providers include carriers such as a telephone network or satellite service
12. What are two common types of circuit-switched WAN technologies? (Choose two.)
- PSTN
- ISDN
13. A new corporation needs a data network that must meet certain requirements. The network
must provide a low cost connection to sales people dispersed over a large geographical area.
Which two types of WAN infrastructure would meet the requirements? (Choose two.)
- internet
- public infrastructure
Scalability
2. Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without
necessarily adding more equipment or WAN links?
Cost Savings
3. Which VPN benefit uses advanced encryption and authentication protocols to protect data
from unauthorized access?
Security
4. Which type of VPN is used to connect a mobile user?
Remote-access
- IPsec
- SSL
- DMVPN
Clientless VPN
Carrier protocol
4. What type of VPN enables an enterprise to rapidly scale secure access across the
organization?
DMVPN
5. What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote
sites?
MPLS VPN
- layer 4
- layer 5
- layer 6
- layer 7
2. Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates?
Authentication
3. True or False: The IPsec framework must be updated each time a new standard is developed.
False
4. Which choices are packet encapslation options suported by IPsec? (Choose two.)
- AH
- ESP
5. Which choices provide for the Confidentiality function in the IPsec framework? (Choose three.)
- 3DES
- AES
- SEAL
6. Which choices provide for the Integrity function in the IPsec framework? (Choose two.)
- MD5
- SHA
7. Which choices are available for the Authentication function in the IPsec framework? (Choose
two.)
- PSK
- RSA
DH groups 1, 2, and 5
- it is used to connect individual hosts securely to a company network over the internet
confidientiality
3. Which type of VPN may require the Cisco VPN Client software?
encryption
5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)
- hub-to-spoke
- spoke-to-spoke
6. What are two reasons a company would use a VPN? (Choose two.)
7. True or False? All VPNs securely transmit clear text across the Internet.
false
remote-access VPN
10. Which IPsec framework protocol provides data integrity and data authentication, but does not
provide data confidentiality?
AH
11. What algorithm is used to provide data integrity of a message through the use of a calculated
hash value?
HMAC
12. Which statement describes the effect of key length in deterring an attacker from hacking
through an encryption key?
13. What is a type of VPN that is generally transparent to the end user?
site-to-site
propagation delay
packet loss
3. What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?
serialization delay
jitter
data
video
video
4. Which type of traffic can be predictable and smooth?
voice
voice
voice
WFQ
CBWFQ
3. Which queuing algorithm is effective for large links that have little delay and minimal
congestion?
FIFO
4. Which queuing algorithm classifies traffic into different flows based on packet header
addressing?
WFQ
5. Which queuing algorithm allows delay-sensitive data such as voice to be sent before packets
in other queues?
LLQ
6. Which queuing algorithm applies priority, or weights, to identify traffic and classify it?
WFQ
integrated services
best effort
differential services
integrated services
differential services
traffic policing
classification
marking
4. Which provides buffer management and allows TCP traffic to throttle back before buffers are
exhausted?
WRED
5. Which retains excess packets in a queue and then schedules the excess for later transmission
over increments of time?
traffic shaping
9.5.2 Module Quiz - QoS Concepts
1. What is the term used to indicate a variation of delay?
jitter
2. A network engineer performs a ping test and receives a value that shows the time it takes for a
packet to travel from a source to a destination device and return. Which term describes the
value?
latency
network devices ensure that resources are available before traffic is allowed to be sent by a host
through the network
IP phone
5. Under which condition does congestion occur on a converged network with voice, video, and
data traffic?
6. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when
low latency queuing (LLQ) is being used?
voice
7. Which model is the only QoS model with no mechanism to classify packets?
best-effort
8. What happens when the memory queue of a device fills up and new network traffic is
received?
10. Which QoS model is very resource intensive and provides the highest guarantee of QoS?
IntServ
11. What happens when an edge router using IntServ QoS determines that the data pathway
cannot support the level of QoS requested?
12. In QoS models, which type of traffic is commonly provided the most preferential treatment
over all other application traffic?
voice traffic
CBWFQ
14. What mechanism compensates for jitter in an audio stream by buffering packets and then
replaying them outbound in a steady stream?
CDP
2. Which protocol works with network devices, such as routers, switches, and wireless LAN
access points across multiple manufacturers’ devices?
LLDP
both
version 2
both
version 2
version 2
7. Which SNMP version is used for interoperability and includes message integrity reporting?
version 3
debugging
2. Refer to the syslog output. What is the mnemonic for this syslog message?
NO_IFINDEX_FILE
IFMGR
10.8.4 Module Quiz - Network Management
1. What are two reasons for an administrator to issue the copy running-config tftp command
on a switch or router? (Choose two.)
2. What information can be gathered about a neighbor device from the show cdp neighbors
detail command that cannot be found with the show cdp neighbors command?
community strings
4. What command must be issued on a Cisco router that will serve as an authoritative NTP
server?
ntp master 1
5. Which protocol or service can be configured to send unsolicited messages to alert the network
administrator about a network event such as an extremely high CPU utilization on a router?
SNMP
- SNMP read-only community strings can be used to get information from an SNMP-
enabled device
copy the configuration file from the TFTP server to the RAM of the router
11. What data would be saved and where would the data be placed if a network administrator
issued the following command? (Choose two.)
12. Which command would a network engineer use to restore the IOS image c1900-universalk9-
mz.SPA.152-4.M3.bin to a router?
13. Why would a network administrator issue the show cdp neigbors command on a router?
to display device ID and other information about directly connected Cisco devices
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the
network
resilient
modularity
3. Which term describes the ability of a network to use all available network resources and to
provide data load sharing?
flexible
4. Which network layer provides fault isolation and high-speed backbone switch connectivity?
core
5. Which network layer provides direct, switched network connectivity to the user?
access
6. Which network layer integrates with the backbone and users to provide intelligent switching,
routing, and security?
distribution
- Choose routers or multilayer switches to limir broadcasts and filter other undesirable
traffic from the network
- User expandable, modular equipment, or clustered devices that can be easily upgraded
to increase capabilities
2. True or false? OSPF is well-suited for larger networks because it can be deployed using a
hierarchical design.
True
3. What are three important features that should be considered for implementation in a well-
designed, scalable network? (Choose three.)
- redundant links
- multiple links
2. Field replaceable line cards are a feature found on which type of switch?
modular
3. This is the term used to describe switches that can be interconnected and managed as one
larger single switch.
stackable
4. This is the term used to describe the number of ports available on a single switch.
density
5. This is the term used to describe how much data a switch can process per second.
forwarding rate
6. Which type of switch supports routing protocols and can forward IP packets at close to Layer 2
forwarding rates?
multilayer
11.4.4 Check Your Understanding - Router Hardware
1. This type of router provides fast performance with high security for data centers, campus, and
branch networks.
3. This type of router provides simple network configuration and management for LANs and
WANs.
branch routers
4. This type of router is designed to provide enterprise-class features in rugged and harsh
environments.
industrial routers
5. This type of router delivers next-generation internet experience across all devices and
locations.
extended star
2. How much traffic is a 48-port gigabit switch capable of switching when operating at full wire
speed?
failure domain
4. Which type of router would an enterprise use to allow customers to access content anytime
and anyplace, regardless of whether they are at home or work?
5. Which design feature will limit the size of a failure domain in an enterprise network?
allow switches, phones, and wireless access points to receive power over existing Ethernet
cables from an upstream switch
network access
9. Which action should be taken when planning for redundancy on a hierarchical network
design?
core
12. Which technology is required when switched networks are designed to include redundant
links?
13. Which feature could be used in a network design to increase the bandwidth by combining
multiple physical links into a single logical link?
etherchannel
15. Which network design solution will best extend access layer connectivity to host devices?
logical topology
end-system documentation
4. True or False? A network baseline never ends and continually gathers information on a yearly
basis.
false
5. Which command could be used to get detailed information about directly connected Cisco
neighbor devices?
2. In which step of the seven-step troubleshooting process, would you create a rollback plan
identifying how to quickly reverse a solution?
test hypothesis
( always be considerate and empathize with users, always listen or carefully read what the user
is saying, speak at a technical level they can understand)
4. During the gathering information step, which command would display the configured protocols
and the global and interface-specific status of any configured Layer 3 protocol?
show protocols
5. What is the highest OSI layer that should be considered when troubleshooting routers and
Layer 3 switches?
layer 4
7. Which structured troubleshooting method should be used when a software orientated problem
occurs?
knowledge base
2. Which tool is useful to investigate packet content while flowing through the network?
protocol analyser
3. Which hardware troubleshooting tool is a multifunctional handheld device used to test and
certify copper and fiber cables for different services and standards?
cable analyser
4. Cisco IOS log messages fall into one of eight levels. Which syslog logging level is used to log
the highest severity level?
0
Check Your Understanding - Symptoms and Causes
12.4.7
of Network Problems
1. Which OSI layer are you troubleshooting when the cause of network transmission errors is due
to late collisions, short frames, and jabber?
physical
2. Which OSI layer are you troubleshooting when investigating a spanning-tree loop?
data link
3. Which OSI layer are you troubleshooting when investigating a routing protocol loop?
network
4. Which OSI layer are you troubleshooting when investigating an extended ACL related
problem?
transport
5. Which OSI layer are you troubleshooting when investigating a DNS related problem?
application
6. Which IOS command can be used to test if other network protocols are working?
telnet
top-down
3. A computer technician performed a number of actions to correct a problem. Some actions did
not solve the problem, but eventually a solution was found. What should be documented?
4. A network engineer is troubleshooting a network problem and can successfully ping between
two devices. However, Telnet between the same two devices does not work. Which OSI layers
should the administrator investigate next?
5. While designing changes to a data center because of a new IoE implementation, a network
administrator has the job of diagramming the new physical topology of the area. What should be
included in the physical topology diagram?
7. Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
cable tester
WhatsUp Gold
10. After which step in the network troubleshooting process would one of the layered
troubleshooting methods be used?
11. A company is setting up a web site with SSL technology to protect the authentication
credentials required to access the web site. A network engineer needs to verify that the setup is
correct and that the authentication is indeed encrypted. Which tool should be used?
protocol analyser
13. A networked PC is having trouble accessing the Internet, but can print to a local printer and
ping other computers in the area. Other computers on the same network are not having any
issues. What is the problem?
14. A technician installed a network adapter in a computer and wants to test network
connectivity. The ping command can receive responses from workstations on the same subnet
but not from remote workstations. What could be causing the problem?
PaaS
2. Which cloud service provides users with access to services such as email, communications,
and Office 365 delivered over the internet?
SaaS
3. Which cloud service provides IT managers with access to network equipment, virtualized
services, and a supporting network infrastructure?
IaaS
4. Which cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture?
hybrid cloud
5. Which cloud model is used to meet the needs of a specific industry, such as healthcare or
media?
community cloud
virtualization
2. What device uses all the RAM, processing power, and hard drive space devoted to one
service?
dedicated server
3. Which technology is a program, firmware, or hardware that adds an abstraction layer on top of
the physical hardware?
hypervisor
- faster provisioning
5. Which technology is installed on top of the existing OS to create and run VM instances?
type 2 hypervisor
false
2. True of False. A Type 1 hypervisor requires a management console to manage the hypervisor.
true
false
4. True of False. East-West traffic is exchanged between virtual servers in the same data center.
true
Check Your Understanding - Software-Defined
13.4.5
Networking
1. Which characteristic best describes the control plane of a networking device? (Choose three.)
2. Which characteristics best describe the data plane of a networking device? (Choose three.)
- this plane is typically made up of a switch fabric connecting the various ports on a
devices
3. True of False. A network administrator accesses the control plane to configure a device.
false
4. This network architecture offers a new approach to network administration and management
that seeks to simplify and streamline the administration process.
SDN
5. This is a logical entity that enables network administrators to manage and dictate how the data
plane of switches and routers should handle network traffic.
SDN controller
6. This is a standardized request from the SDN controller to define the behavior of the data
plane.
southbound APIs
flow table
2. This is a table that triggers a variety of performance-related actions on a flow including the
ability to rate-limit the traffic.
meter table
3. This type of SDN, a centralized location is responsible for managing devices throughout the
network.
controller-based SDN
4. In this type of SDN, the devices are programmable by applications running on the device itself
or on a server in the network.
device-based SDN
5. This type of SDN uses built-in applications that automate advanced configuration tasks via a
guided workflow and user-friendly GUI. No programming skills are required.
policy-based SDN
2. For a data center, what is the difference in the server virtualization data traffic compared with
the traditional client-server model?
3. Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions
to create data paths within a network?
control plane
open flow
5. Which two technologies are core components of Cisco ACI architecture? (Choose two.)
- application network profile (APN)
6. Which Cloud computing service would be best for a new organization that cannot afford
physical servers and networking equipment and must purchase network services on-demand?
IaaS
8. What are two reasons an organization might use cloud computing? (Choose two.)
each data flow through the network must be approved by the SDN controller first
10. What are three abstraction layers of a computer system? (Choose three.)
- hardware
- firmware
- service
11. In software defined network architecture, what function is removed from network devices and
performed by an SDN controller?
control plane
12. Which term describes the data exchanges between virtual servers in a data center?
east-west-traffic
13. How is the control plane modified to operate with network virtualization?
14. Which Cloud computing service would be best for an organization that needs to
collaboratively create applications and deliver them over the web?
PaaS
14.1.4 Check Your Understanding - Benefits of Automation
1. You use online banking to pay a bill.
Not automation
2. Production levels are automatically tied to demand, eliminating unneeded product and
reducing the impact on the environment.
automation
3. Your GPS recalculates the best route to a destination based on current traffic congestion.
automation
4. The temperature and lighting in your home is adjusted based on your daily routine.
automation
5. A refrigerator senses that you are out of milk and places an order for more.
automation
6. You adjust the volume on the television set with a remote control.
not automation
automation
not automation
HTML
A key describes the data and the value is the data itself
3. TRUE or FALSE: White space in JSON format is significant and must be correctly formatted.
false
4. This data format is a minimalist format that is very easy to read and is considered a superset
of another data format.
YAML
XML
true
2. Which of the following APIs would be used exclusively between Google and Cisco?
partner API
3. Which of the following APIs is used by Cisco to provide access to students to complete labs?
4. Which of the following APIs would be used exclusively between computing devices within
Cisco?
5. Which of the following APIs provides flexible formatting and is the most widely used?
REST
- stateless
- cacheable
- client-server
www.cisco,com/c/en/us/solutions/design-zone.html
https://www.cisco.com/c/en/us/soultions/zone.html#~all-guides
5. Which of the following make up the query portion of a RESTful request? (Choose three.)
-key
-format
-parameters
- API
- SNMP
2. Identify the term for the following definition in relationship to configuration management tools:
Programmatically performing a task on a system such as configuring an interface or deploying a
VLAN.
automation
3. Identify the term for the following definition in relationship to configuration management tools:
The process of how all automated activities need to happen, such as the order they must be
done and what must be completed before another task is begun.
orchestration
4. True or False: Agentless means that the controller or master pushes the configuration to the
controlled device.
true
5. Which of the following configuration management tools use Python? (Choose all that apply.)
-ansible
-saltstack
assurance
2. Which IBN feature enables the network administrator to express the expected networking
behavior that will best support the business intent?
translation
3. Which IBN feature installs policies that capture intent into the physical and virtual network
infrastructure using networkwide automation?
activation
4. True or False: The underlay limits the number of devices the network administrator must
program. It also provides services and alternative forwarding methods not controlled by the
underlying physical devices.
true
2. What is an architectural constraint to which a true RESTful API web service must adhere?
resources
it is a set of functions and procedures that allows a client application to access the data of the
service application
5. Which term describes the process of managing configuration changes of network devices in
an orderly fashion?
orchestration
6. Which web service API can use multiple data formats including JSON, XML, and YAML?
REST
7. What are two reasons that most RESTful APIs require a key in the request? (Choose two.)
XML uses a self-descriptive data structure but HTML uses a standard document structure
9. A programmer is using Ansible as the configuration management tool. Which term is used to
describe a set of instructions for execution?
playbook
10. Which term is used to describe a set of instructions for execution by the configuration
management tool Chef?
cookbook
11, Which two configuration management tools are developed using Python? (Choose two.)
-saltstack
-ansible
12. Which function of the Cisco intent-based networking system (IBNS) enables network
operators to express the expected networking behavior that will best support the business intent?
translation
13. Which types of APIs are suitable for the data communication between a travel website and a
hotel chain inquiring about room availability data?
partner APIs
quotation marks
(comma) ,