ERASED TEST, YOU MAY BE INTERESTED ON CCNA 200 301_4
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
CCNA 200 301_4 Description: PROVA 4 Author:
Creation Date: 15/12/2024 Category: Computers Number of questions: 61 |
Share the Test:
New Comment
No comments about this test.
Content:
Which technology is appropriate for communication between an SDN controller and applications
running over the network?
OpenFlow REST API
NETCONF Southbound API. What is a characteristic of private IPv4 addressing? traverse the Internet when an outbound ACL is applied issued by IANA in conjunction with an autonomous system number composed of up to 65.536 available addresses used without tracking or registration. Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles? role-based access control biometrics multifactor authentication physical access contro. Which network action occurs within the data plane? compare the destination IP address to the IP routing table. run routing protocols (OSPF, EIGRP, RIP, BGP) make a configuration change from an incoming NETCONF RPC reply to an incoming ICMP echo request . What is a DHCP client? a host that is configured to request an IP address automatically a server that dynamically assigns IP addresses to hosts a workstation that requests a domain name associated with its IP address a rooter that statically assigns IP addresse to hosts. What uses HTTP messages to transfer data to applications residing on different hosts? OpenFlow OpenStack OpFlex REST. What is a role of access points in an enterprise network? connect wireless devices to a wired network support secure user logins to devices or the network integrate with SNMP in preventing DDoS attacks serve as a first line of defense in an enterprise network . Which protocol does an access point use to draw power from a connected switch? Internet Group Management Protocol Adaptive Wireless Path Protocol Cisco Discovery Protocol Neighbor Discovery Protocol. Refer to the exhibit. An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task? Option A Option B Option C . Option D. When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is supported? Unicode base64 decimal ASCII. Which networking function occurs on the data plane? forwarding remote client/server traffic facilitates spanning-tree elections processing inbound SSH management traffic sending and receiving OSPF Hello packets. An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken? Add the switch in the VTP domain with a lower revision number Add the switch with DTP set to dynamic desirable Add the switch in the VTP domain with a higher revision number Add the switch with DTP set to desirable. What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API? OpenFlow Java REST XML. What is a similarity between OM3 and OM4 fiber optic cable? Both have a 50 micron core diameter Both have a 9 mic on core diameter Both have a 62 5 micron core diameter Both have a 100 micron core diameter . Which JSON data type is an unordered set of attribute-value pairs? array string object Boolean. A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface? ipv6 address 2001:0db8::5: a: 4F 583B . ipv6 address 2001:db8::500:a:400F:583B ipv6 address 2001 db8:0::500:a:4F:583B ipv6 address 2001::db8:0000::500:a:400F:583B. What is the benefit of using FHRP? reduced management overhead on network routers balancing traffic across multiple gateways in proportion to their loads higher degree of availability reduced ARP traffic on the network. Which two QoS tools provides congestion management? ( Choose two ) CAR CBWFQ PQ PBR FRTS. Refer to the exhibit. Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode? switchport mode trunk switchport mode dot1-tunnel switchport mode dynamic auto switchport mode dynamic desirable. Refer to the exhibit. Only four switches are participating in the VLAN spanning-tree process. Which switch becomes the permanent root bridge for VLAN 5? Branch-1 Branch-2 Branch-3 Branch-4. A network administrator must to configure SSH for remote access to router R1. The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client. Which configuration, when applied, meets the requirements? Option A Option B Option C Option D. When deploying syslog, which severity level logs informational message? o 2 4 6. An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GH2 access points? . Re-Anchor Roamed Clients 11ac MU-MIMO OEAP Split Tunnel Client Band Select. An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request? Enable Security Association Teardown Protection a d set the SA Query timeout to 10 Enable MAC filtering and set the SA Query timeout to 10 Enable 802.1x Layer 2 security and set me Comeback timer to 10 Enable the Protected Management Frame service and set the Comeback timer to 10. What are two improvements provided by automation for network management in an SDN environment? (Choose two) Data collection and analysis tools establish a baseline for the network Artificial intelligence identifies and prevents potential design failures. Machine learning minimizes the overall error rate when automating troubleshooting processes New devices are onboarded with minimal effort Proprietary Cisco APIs leverage multiple network management tools. Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue? Interface errors are incrementing . An incorrect SFP media type was used at SiteA High usage is causing high latency The sites were connected with the wrong cable type. Which technology allows for multiple operating systems to be run on a single host computer? . virtual routing and forwarding network port ID v sualization virtual device on exts server visualization. What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.) enable the PortFast feature on ports . implement port-based authentication configure static ARP entries configure ports to a fixed speed shut down unused ports. What occurs when overlapping Wi-Fi channels are implemented? The wireless network becomes vulnerable to unauthorized access. Wireless devices are unable to distinguish between different SSIDs Users experience poor wireless network performance. Network communications are open to eavesdropping. Refer to the exhibit. An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement? interface gi0/1 no cdp enable interface gi0/1 clear cdp table interface gi0/0 no cdp advertise-v2 interface gi0/0 no cdp run. Refer to the exhibit. The entire contents of the MAC address table are shown. Sales-4 sends a data frame to Sales-1. What does the switch do as it receives he frame from Sales-4? Perform a lookup in the MAC address table and discard the frame due to a missing entry Insert the source MAC address and port into the forwarding table and forward the frame to Sales- 1. Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame. Flood the fr me out of all ports except on the port where Sales-1 is connected. Which 802.11 management frame type is sent when a client roams between access points on the same SSID? Reassociation Request Probe Request Authentication Request Association Request. An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface? ipv6 address 2001:db8::700:3:400F:572B ipv6 address 2001:db8:0::700:3:4F:572B ipv6 address 2001:Odb8::7:3:4F:572B ipv6 address 2001::db8:0000::700:3:400F:572B. What describes the operation of virtual machines? Virtual machines are responsible for managing and allocating host hardware resources In a virtual machine environment, physical servers must run one operating system at a time. Virtual machines are the physical hardware that support a virtual environment. Virtual machines are operating system instances that are decoupled from server hardware. Which WLC port connects to a switch to pass normal access-point traffic? redundancy console distribution system service. Which IPv6 address type provides communication between subnets and is unable to route on the Internet? global unicast unique local link-local multicast. An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result? logging trap 5 logging trap 2 logging trap 4 logging trap 3. What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.) serves as the network aggregation point provides a boundary between Layer 2 and Layer 3 communications designed to meet continuous, redundant uptime requirements is the backbone for the network topology physical connection point for a LAN printer. What is the purpose of using First Hop Redundancy Protocol in a specific subnet? Filter traffic based on destination IP addressing Sends the default route to the hosts on a network ensures a loop-free physical topology forwards multicast hello messages between routers. Which access layer threat-mitigation technique provides security based on identity? Dynamic ARP Inspection using a non-default native VLAN 802.1x DHCP snooping. What must be considered when using 802:11 ta? It is compatible with 802 lib- and 802 11-compliant wireless devices It is used in place of 802 11b/g when many nonoverlapping channels are required It is susceptible to interference from 2 4 GHz devices such as microwave ovens. It is chosen over 802 11b/g when a lower-cost solution is necessary. When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet? IPsec tunnel mode with AH IPsec transport mode with AH IPsec tunnel mode with ESP . IPsec transport mode with ESP. What does physical access control regulate? access to spec fie networks based on business function access to servers to prevent malicious activity access :o computer networks and file systems access to networking equipment and facilities . On workstations running Microsoft Windows, which protocol provides the default gateway for the device? DHCP STP SNMP DNS. How are VLAN hopping attacks mitigated? enable dynamic ARP inspection manually implement trunk ports and disable DTP activate all ports and place in the default VLAN configure extended VLANs. What is the role of a firewall in an enterprise network? Forwards packets based on stateless packet inspection Processes unauthorized packets and allows passage to less secure segments of the network determines which packets are allowed to cross from unsecured to secured networks explicitly denies all packets from entering an administrative domain. Which two primary drivers support the need for network automation? (Choose two.) Eliminating training needs Increasing reliance on self-diagnostic and self-healing Policy-derived provisioning of resources . Providing a ship entry point for resource provisioning Reducing hardware footprint. What is a function of the Cisco DNA Center Overall Health Dashboard? It provides a summary of the top 10 global issues It provides detailed activity logging for the 10 devices and users on the network It summarizes the operational status of each wireless devise on the network It summarizes daily and weekly CPU usage for servers and workstations in the network. Which protocol requires authentication to transfer a backup configuration file from a router to a remote server? DTP FTP SMTP TFTP. After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials? Enable the allow AAA Override Enable the Even: Driven RRM Disable the LAG Mode or Next Reboot. Enable the Authorized MIC APs against auth-list or AAA. Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic? FIFO WFQ PQ WRED. Where is the interface between the control plane and data plane within the software-defined architecture? control layer and the infrastructure layer application layer and the infrastructure layer application layer and the management layer control layer and the application layer. An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines? hypervisor router straight cable switch. A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used? Clock timezone Clock summer-time-recurring Clock summer-time date Clock set. Refer to the exhibit. If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet? 192.168.12.2 192.168.13.3 192.168.14.4 192.168.15.5. A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports? configure port in the native VLAN configure ports in a black hole VLAN configure in a nondefault native VLAN configure ports as access ports. Refer to the exhibit. Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 via R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4? the path through R1, because the OSPF administrative distance is 110 the path through R2. because the IBGP administrative distance is 200 the path through R2 because the EBGP administrative distance is 20 the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP. Why was the RFC 1918 address space defined? conserve public IPv4 addressing preserve public IPv6 address space reduce instances of overlapping IP addresses support the NAT protocol. Which HTTP status code is returned after a successful REST API request? 200 301 404 500. Refer to the exhibit. R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement? Answer: D. What are network endpoints? act as routers to connect a user to the service prowler network a threat to the network if they are compromised support inter-VLAN connectivity enforce policies for campus-wide traffic going to the internet. |
Report abuse