If one wanted to create an Access List that matched Telnet traffic, which of the following statements would be true?
Correct
Incorrect
Question 2 of 70
2. Question
1 point(s)
You wish to create an Access-List that allows a host at 2.2.2.2 to transmit a TCP SYN packet to the destination of 3.3.3.3 for a Telnet connection but drops the reply packet. Which of the following ACLs could do this?
Correct
Incorrect
Question 3 of 70
3. Question
1 point(s)
Which of the following statement differentiate authentication and authorization?
Correct
Incorrect
Question 4 of 70
4. Question
1 point(s)
When implementing an API server, you should accept requests _____________.
Correct
Incorrect
Question 5 of 70
5. Question
1 point(s)
Name three main TrustSec phases.
Correct
Incorrect
Question 6 of 70
6. Question
1 point(s)
What are the main components of TrustSec?
Correct
Incorrect
Question 7 of 70
7. Question
1 point(s)
What does this mean if an Access List is created that only permits TCP packets and uses the “established” keyword in place of a destination port number?
Correct
Incorrect
Question 8 of 70
8. Question
1 point(s)
Which of the following Access-Lists will prevent any device from having a successful Telnet or FTP connection to any other device but allow other TCP applications?
Correct
Incorrect
Question 9 of 70
9. Question
1 point(s)
Which of the following statements about Reflexive Access-Lists is true?
Correct
Incorrect
Question 10 of 70
10. Question
1 point(s)
Considering that traffic transmitted out FastEthernet0/0 leads to an untrusted network, which of the following answers demonstrates the correct way to configure and apply a Reflexive Access-List?
Correct
Incorrect
Question 11 of 70
11. Question
1 point(s)
Which of the following is an example of a cloud-based VM service offering? (Select two)
Correct
Incorrect
Question 12 of 70
12. Question
1 point(s)
You and another employee are arguing about whether to implement your virtual machines as on-premise or cloud-based. You are in favor of cloud-based virtual machines. Based on this, which of the following is an argument you could use in your favor? (Select the best answer)
Correct
Incorrect
Question 13 of 70
13. Question
1 point(s)
Which statements best describe the scenario where IPv6 is tunneled over IPv4-based infrastructure using LISP? (Choose two)
Correct
Incorrect
Question 14 of 70
14. Question
1 point(s)
Which statements best describe the components of LISP when deploying IPv6 as an endpoint identifier? (Choose all that apply)
Correct
Incorrect
Question 15 of 70
15. Question
1 point(s)
Under which circumstances would an IP address not be necessary for a virtual machine? (Select the best answer)
Correct
Incorrect
Question 16 of 70
16. Question
1 point(s)
Which of the following is true regarding the networking of virtual machines? (Select the best answer)
Correct
Incorrect
Question 17 of 70
17. Question
1 point(s)
Microsoft’s Hyper-V is an example of which type of Hypervisor? (Select the best answer)
Correct
Incorrect
Question 18 of 70
18. Question
1 point(s)
Which type of Hypervisor typically allows your virtual machines to run the fastest and access the host’s hardware efficiently?
Correct
Incorrect
Question 19 of 70
19. Question
1 point(s)
In an environment where Servers are hosted in the Cloud, it is very common to have several virtual servers/virtual machines residing in one physical chassis. A key ingredient that allows all of these VMs to share the physical hardware (CPU, Memory, etc.) of the chassis is called the ________.
Correct
Incorrect
Question 20 of 70
20. Question
1 point(s)
Which of the following is an example of a Type-2 Hypervisor? (Select two answers)
Correct
Incorrect
Question 21 of 70
21. Question
1 point(s)
Which of the following CEF Adjacency types indicate that, when matched by an incoming packet, an ARP Request must be generated?
Correct
Incorrect
Question 22 of 70
22. Question
1 point(s)
Which packet/frame types, when received by a router or switch (configured for OSPF, IP, and CDP), are never allowed to be CEF-switched? (Select the best answer)
Correct
Incorrect
Question 23 of 70
23. Question
1 point(s)
If a great number of packets arrive on a router’s ingress interface(s) in a very short time, and they all need to be inspected by the CPU to make a forwarding decision, which processes within the CPU would you expect to be impacted?
Correct
Incorrect
Question 24 of 70
24. Question
1 point(s)
What data structure is populated by CEF when it extracts a MAC address and egress interface and places that information into a Layer-2 rewrite table?
Correct
Incorrect
Question 25 of 70
25. Question
1 point(s)
Which of the following components typically found in the RIB are NOT copied by CEF for placement in the FIB?
Correct
Incorrect
Question 26 of 70
26. Question
1 point(s)
Which of the following is not usually considered a network monitoring protocol?
Correct
Incorrect
Question 27 of 70
27. Question
1 point(s)
Which of the following is true regarding SNMP?
Correct
Incorrect
Question 28 of 70
28. Question
1 point(s)
Which of the following are valid reasons why the command line of any given platform cannot be considered a Data Model?
Correct
Incorrect
Question 29 of 70
29. Question
1 point(s)
Which of the following are characteristics that any Data Model should have?
Correct
Incorrect
Question 30 of 70
30. Question
1 point(s)
Where are YANG models/modules typically stored?
Correct
Incorrect
Question 31 of 70
31. Question
1 point(s)
What is the purpose behind associating an Access-Control List to your SNMP configuration?
Correct
Incorrect
Question 32 of 70
32. Question
1 point(s)
The below configuration has been applied to a router that only contains IP addresses and IP Routing information. After the application of this config, the SNMP NMS still cannot access information from this Agent. What could be wrong?
! snmp-server community Access1 RO Access2
Correct
Incorrect
Question 33 of 70
33. Question
1 point(s)
Which Cisco IOS command will display the particular OIDs that an NMS has requested?
Correct
Incorrect
Question 34 of 70
34. Question
1 point(s)
Which Cisco IOS command will display the SNMPv3 security model associated with an SNMPv3 Group?
Correct
Incorrect
Question 35 of 70
35. Question
1 point(s)
Which command will activate the RESTCONF Agent functionality on a Cisco router?
Correct
Incorrect
Question 36 of 70
36. Question
1 point(s)
What prerequisite item are RESTCONF Agents need before RESTCONF activation?
Correct
Incorrect
Question 37 of 70
37. Question
1 point(s)
Which of the following answers represents a truth about the similarities between RESTCONF and NETCONF?
Correct
Incorrect
Question 38 of 70
38. Question
1 point(s)
Which of the following answers represents a truth about the differences between RESTCONF and NETCONF?
Correct
Incorrect
Question 39 of 70
39. Question
1 point(s)
What transport protocol is used by RESTCONF?
Correct
Incorrect
Question 40 of 70
40. Question
1 point(s)
Which of the following protocols is most similar to NETCONF in functionality and purpose?
Correct
Incorrect
Question 41 of 70
41. Question
1 point(s)
Which claims regarding NTP servers in an enterprise network are true? (Select two)
Correct
Incorrect
Question 42 of 70
42. Question
1 point(s)
On a router, the command NTP server 10.1.1.1 is entered. How does this command affect things?
Correct
Incorrect
Question 43 of 70
43. Question
1 point(s)
A network engineer must choose a Layer 2 Access Layer (STP-based) or Layer 3 Access Layer (Routed access) campus design. Which statement needs to be taken into account before a decision is made?
Correct
Incorrect
Question 44 of 70
44. Question
1 point(s)
Which three tasks are carried out at the hierarchical network model’s distribution layer? (Select three)
Correct
Incorrect
Question 45 of 70
45. Question
1 point(s)
Which SD-Access function makes proactive predictions of the network- and security-related threats possible through the utilization of telemetry?
Correct
Incorrect
Question 46 of 70
46. Question
1 point(s)
What service is offered by the management layer of the Cisco SD-Access Architecture?
Correct
Incorrect
Question 47 of 70
47. Question
1 point(s)
Which element of the architecture of the SD-WAN solution authenticates the vSmart controllers and SD-WAN routers and makes it possible for them to connect to the network?
Correct
Incorrect
Question 48 of 70
48. Question
1 point(s)
What two aspects of the DiffServ model enable end-to-end QoS? (Select two)
Correct
Incorrect
Question 49 of 70
49. Question
1 point(s)
Is the QoS category level suggested as the ideal configuration for VoIP traffic on a Cisco WLC?
Correct
Incorrect
Question 50 of 70
50. Question
1 point(s)
What are Cisco Express Forwarding’s (CEF) two primary parts? (Select two)
Correct
Incorrect
Question 51 of 70
51. Question
1 point(s)
How is the adjacency table pre-populated in Cisco devices that process packets using CEF?
Correct
Incorrect
Question 52 of 70
52. Question
1 point(s)
Which Cisco ENFV component technology offers a centralized and uniform network policy across company branch offices?
Correct
Incorrect
Question 53 of 70
53. Question
1 point(s)
What I/O technology enables multiple VNFs to share a common pNIC?
Correct
Incorrect
Question 54 of 70
54. Question
1 point(s)
Which two are LISP’s functions? (Select two)
Correct
Incorrect
Question 55 of 70
55. Question
1 point(s)
What management of the VNFs is EMS responsible for?
Correct
Incorrect
Question 56 of 70
56. Question
1 point(s)
Which virtualization feature enables inter-VM communication on a virtual server?
Correct
Incorrect
Question 57 of 70
57. Question
1 point(s)
In a classroom, a teacher introduces students to the idea of a virtual switch (vSwitch). What definition best captures a vSwitch?
Correct
Incorrect
Question 58 of 70
58. Question
1 point(s)
What are the two ways that virtual routing differs from traditional routing? (Select two)
Correct
Incorrect
Question 59 of 70
59. Question
1 point(s)
What distinguishes a virtual machine from a virtualized container in particular?
Correct
Incorrect
Question 60 of 70
60. Question
1 point(s)
A network engineer seeks to maximize the utilization of the available resources using virtualization to boost the server’s overall efficiency and cost-effectiveness. The engineer is considering VMs or containers. What distinguishes these two forms of virtualization from one another?
Correct
Incorrect
Question 61 of 70
61. Question
1 point(s)
Consider the exhibit. A network administrator confirms the switch’s STP election status and bridge ID. Based on the results of the command, which statement is true?
Correct
Incorrect
Question 62 of 70
62. Question
1 point(s)
Which three best characterize a virtual machine’s characteristics? (Select three)
Correct
Incorrect
Question 63 of 70
63. Question
1 point(s)
What qualifies as a feature of PortFast?
Correct
Incorrect
Question 64 of 70
64. Question
1 point(s)
What three spanning tree protocols are recognized in the industry? (Select three)
Correct
Incorrect
Question 65 of 70
65. Question
1 point(s)
Consider the display. A network administrator uses the show spanning-tree mst configuration command to verify the MST configuration. Which VLANs are associated with IST?
Correct
Incorrect
Question 66 of 70
66. Question
1 point(s)
Consider the display. A network administrator is using the following command to check the MST configuration on switch SW2:
Which three conclusions could be drawn in light of the results? (Select three)
Correct
Incorrect
Question 67 of 70
67. Question
1 point(s)
What are the damaging outcomes of disabling a spanning tree and using numerous pathways in a Layer 2 switch network? (Select two)
Correct
Incorrect
Question 68 of 70
68. Question
1 point(s)
Users of the network gripe about how slowly it operates. A network technician investigates and finds that all network devices have 100% link utilization. Additionally, many syslog messages are being produced that mention ongoing MAC address relearning. What is the issue’s most likely root cause?
Correct
Incorrect
Question 69 of 70
69. Question
1 point(s)
Consider the display. The root bridge is SW1, and the backup root bridge is SW2. To prevent SW4 and SW5 from ever becoming root bridges, an administrator must permit SW2 to remain connected to SW1 through SW3 if the link between SW1 and SW2 fails. The administrator should configure the root guard on which two ports are in this topology to do this. (Select two)
Correct
Incorrect
Question 70 of 70
70. Question
1 point(s)
Consider the display. Two switches have been linked by a network administrator using the EtherChannel protocol. What happens in the end if STP is active?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.