0 of 70 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Current
Review
Answered
Correct
Incorrect
Question 1 of 70
1 point(s)
If one wanted to create an Access List that matched Telnet traffic, which of the following statements would be true?
Question 2 of 70
1 point(s)
You wish to create an Access-List that allows a host at 2.2.2.2 to transmit a TCP SYN packet to the destination of 3.3.3.3 for a Telnet connection but drops the reply packet. Which of the following ACLs could do this?
Question 3 of 70
1 point(s)
Which of the following statement differentiate authentication and authorization?
Question 4 of 70
1 point(s)
When implementing an API server, you should accept requests _____________.
Question 5 of 70
1 point(s)
Name three main TrustSec phases.
Question 6 of 70
1 point(s)
What are the main components of TrustSec?
Security Groups, SGT, SGACLs, MACsec
MACsec, SGT, SGACLs
SGT, SGACLs, Inline tagging, MACsec, SXP
NDAC, Security Groups, SGT, SGACLs, RADIUS Server
Question 7 of 70
1 point(s)
What does this mean if an Access List is created that only permits TCP packets and uses the “established” keyword in place of a destination port number?
Question 8 of 70
1 point(s)
Which of the following Access-Lists will prevent any device from having a successful Telnet or FTP connection to any other device but allow other TCP applications?
Question 9 of 70
1 point(s)
Which of the following statements about Reflexive Access-Lists is true?
Question 10 of 70
1 point(s)
Considering that traffic transmitted out FastEthernet0/0 leads to an untrusted network, which of the following answers demonstrates the correct way to configure and apply a Reflexive Access-List?
Question 11 of 70
1 point(s)
Which of the following is an example of a cloud-based VM service offering? (Select two)
Question 12 of 70
1 point(s)
You and another employee are arguing about whether to implement your virtual machines as on-premise or cloud-based. You are in favor of cloud-based virtual machines. Based on this, which of the following is an argument you could use in your favor? (Select the best answer)
Question 13 of 70
1 point(s)
Which statements best describe the scenario where IPv6 is tunneled over IPv4-based infrastructure using LISP? (Choose two)
Question 14 of 70
1 point(s)
Which statements best describe the components of LISP when deploying IPv6 as an endpoint identifier? (Choose all that apply)
Question 15 of 70
1 point(s)
Under which circumstances would an IP address not be necessary for a virtual machine? (Select the best answer)
Question 16 of 70
1 point(s)
Which of the following is true regarding the networking of virtual machines? (Select the best answer)
Question 17 of 70
1 point(s)
Microsoft’s Hyper-V is an example of which type of Hypervisor? (Select the best answer)
Question 18 of 70
1 point(s)
Which type of Hypervisor typically allows your virtual machines to run the fastest and access the host’s hardware efficiently?
Question 19 of 70
1 point(s)
In an environment where Servers are hosted in the Cloud, it is very common to have several virtual servers/virtual machines residing in one physical chassis. A key ingredient that allows all of these VMs to share the physical hardware (CPU, Memory, etc.) of the chassis is called the ________.
Question 20 of 70
1 point(s)
Which of the following is an example of a Type-2 Hypervisor? (Select two answers)
Question 21 of 70
1 point(s)
Which of the following CEF Adjacency types indicate that, when matched by an incoming packet, an ARP Request must be generated?
Question 22 of 70
1 point(s)
Which packet/frame types, when received by a router or switch (configured for OSPF, IP, and CDP), are never allowed to be CEF-switched? (Select the best answer)
Question 23 of 70
1 point(s)
If a great number of packets arrive on a router’s ingress interface(s) in a very short time, and they all need to be inspected by the CPU to make a forwarding decision, which processes within the CPU would you expect to be impacted?
Question 24 of 70
1 point(s)
What data structure is populated by CEF when it extracts a MAC address and egress interface and places that information into a Layer-2 rewrite table?
Question 25 of 70
1 point(s)
Which of the following components typically found in the RIB are NOT copied by CEF for placement in the FIB?
Question 26 of 70
1 point(s)
Which of the following is not usually considered a network monitoring protocol?
Question 27 of 70
1 point(s)
Which of the following is true regarding SNMP?
Question 28 of 70
1 point(s)
Which of the following are valid reasons why the command line of any given platform cannot be considered a Data Model?
Question 29 of 70
1 point(s)
Which of the following are characteristics that any Data Model should have?
Question 30 of 70
1 point(s)
Where are YANG models/modules typically stored?
Question 31 of 70
1 point(s)
What is the purpose behind associating an Access-Control List to your SNMP configuration?
Question 32 of 70
1 point(s)
The below configuration has been applied to a router that only contains IP addresses and IP Routing information. After the application of this config, the SNMP NMS still cannot access information from this Agent. What could be wrong?
! snmp-server community Access1 RO Access2
Question 33 of 70
1 point(s)
Which Cisco IOS command will display the particular OIDs that an NMS has requested?
Question 34 of 70
1 point(s)
Which Cisco IOS command will display the SNMPv3 security model associated with an SNMPv3 Group?
Question 35 of 70
1 point(s)
Which command will activate the RESTCONF Agent functionality on a Cisco router?
Question 36 of 70
1 point(s)
What prerequisite item are RESTCONF Agents need before RESTCONF activation?
Question 37 of 70
1 point(s)
Which of the following answers represents a truth about the similarities between RESTCONF and NETCONF?
Question 38 of 70
1 point(s)
Which of the following answers represents a truth about the differences between RESTCONF and NETCONF?
Question 39 of 70
1 point(s)
What transport protocol is used by RESTCONF?
Question 40 of 70
1 point(s)
Which of the following protocols is most similar to NETCONF in functionality and purpose?
Question 41 of 70
1 point(s)
Which claims regarding NTP servers in an enterprise network are true? (Select two)
Question 42 of 70
1 point(s)
On a router, the command NTP server 10.1.1.1 is entered. How does this command affect things?
Question 43 of 70
1 point(s)
A network engineer must choose a Layer 2 Access Layer (STP-based) or Layer 3 Access Layer (Routed access) campus design. Which statement needs to be taken into account before a decision is made?
Question 44 of 70
1 point(s)
Which three tasks are carried out at the hierarchical network model’s distribution layer? (Select three)
Question 45 of 70
1 point(s)
Which SD-Access function makes proactive predictions of the network- and security-related threats possible through the utilization of telemetry?
Question 46 of 70
1 point(s)
What service is offered by the management layer of the Cisco SD-Access Architecture?
Question 47 of 70
1 point(s)
Which element of the architecture of the SD-WAN solution authenticates the vSmart controllers and SD-WAN routers and makes it possible for them to connect to the network?
Question 48 of 70
1 point(s)
What two aspects of the DiffServ model enable end-to-end QoS? (Select two)
Question 49 of 70
1 point(s)
Is the QoS category level suggested as the ideal configuration for VoIP traffic on a Cisco WLC?
Question 50 of 70
1 point(s)
What are Cisco Express Forwarding’s (CEF) two primary parts? (Select two)
Question 51 of 70
1 point(s)
How is the adjacency table pre-populated in Cisco devices that process packets using CEF?
Question 52 of 70
1 point(s)
Which Cisco ENFV component technology offers a centralized and uniform network policy across company branch offices?
Question 53 of 70
1 point(s)
What I/O technology enables multiple VNFs to share a common pNIC?
Question 54 of 70
1 point(s)
Which two are LISP’s functions? (Select two)
Question 55 of 70
1 point(s)
What management of the VNFs is EMS responsible for?
Question 56 of 70
1 point(s)
Which virtualization feature enables inter-VM communication on a virtual server?
Question 57 of 70
1 point(s)
In a classroom, a teacher introduces students to the idea of a virtual switch (vSwitch). What definition best captures a vSwitch?
Question 58 of 70
1 point(s)
What are the two ways that virtual routing differs from traditional routing? (Select two)
Question 59 of 70
1 point(s)
What distinguishes a virtual machine from a virtualized container in particular?
Question 60 of 70
1 point(s)
A network engineer seeks to maximize the utilization of the available resources using virtualization to boost the server’s overall efficiency and cost-effectiveness. The engineer is considering VMs or containers. What distinguishes these two forms of virtualization from one another?
Question 61 of 70
1 point(s)
Consider the exhibit. A network administrator confirms the switch’s STP election status and bridge ID. Based on the results of the command, which statement is true?
Question 62 of 70
1 point(s)
Which three best characterize a virtual machine’s characteristics? (Select three)
Question 63 of 70
1 point(s)
What qualifies as a feature of PortFast?
Question 64 of 70
1 point(s)
What three spanning tree protocols are recognized in the industry? (Select three)
Question 65 of 70
1 point(s)
Consider the display. A network administrator uses the show spanning-tree mst configuration command to verify the MST configuration. Which VLANs are associated with IST?
Question 66 of 70
1 point(s)
Consider the display. A network administrator is using the following command to check the MST configuration on switch SW2:
Which three conclusions could be drawn in light of the results? (Select three)
Question 67 of 70
1 point(s)
What are the damaging outcomes of disabling a spanning tree and using numerous pathways in a Layer 2 switch network? (Select two)
Question 68 of 70
1 point(s)
Users of the network gripe about how slowly it operates. A network technician investigates and finds that all network devices have 100% link utilization. Additionally, many syslog messages are being produced that mention ongoing MAC address relearning. What is the issue’s most likely root cause?
Question 69 of 70
1 point(s)
Consider the display. The root bridge is SW1, and the backup root bridge is SW2. To prevent SW4 and SW5 from ever becoming root bridges, an administrator must permit SW2 to remain connected to SW1 through SW3 if the link between SW1 and SW2 fails. The administrator should configure the root guard on which two ports are in this topology to do this. (Select two)
Question 70 of 70
1 point(s)
Consider the display. Two switches have been linked by a network administrator using the EtherChannel protocol. What happens in the end if STP is active?