How many internal hosts can be translated to one external IP address using Port Address Translation?
2. Open Ended
30 seconds
1 pt
Which FHRP available for configuration on Cisco devices is not proprietary?
3. Open Ended
30 seconds
1 pt
Which of the following types does the IOS file system use to represent external file systems for reference in different IOS commands?
4. Open Ended
30 seconds
1 pt
For Telnet and SSH users, which of the following commands will allow the terminal user to receive the log messages?
5. Open Ended
30 seconds
1 pt
You are troubleshooting the NAT/PAT configuration on your new router. Which of the following commands could you use in your troubleshooting efforts to list the static NAT entries created in the configuration?
6. Open Ended
30 seconds
1 pt
Which DiffServ DSCP value is suggested to be used for voice calls?
7. Fill in the Blank
30 seconds
1 pt
________ is an application layer protocol that provides a message format for communication between managers and agents
8. Open Ended
30 seconds
1 pt
Refer to the figure. Does a single point of failure exist in the topology shown? If so, where?
9. Open Ended
30 seconds
1 pt
Which type of memory is used by Cisco IOS to store files?
10. Open Ended
30 seconds
1 pt
How do you display logged activity?
11. Fill in the Blank
30 seconds
1 pt
When CDP is used on Ethernet, it sends traffic using a(n) ________ address
12. Open Ended
30 seconds
1 pt
Which of the following types does the IOS file system use as the default location of the startup-config file?
13. Open Ended
30 seconds
1 pt
Which global configuration command enables logging for console users?
14. Open Ended
30 seconds
1 pt
How does dynamic NAT identify which inside local IP addresses need to have their addresses translated?
15. Open Ended
30 seconds
1 pt
In the following diagram, what is the outside global IP address?
16. Open Ended
30 seconds
1 pt
What is the minimum bandwidth expected on a link to ensure a quality IP video connection?
17. Fill in the Blank
30 seconds
1 pt
The NMS uses ________ messages to ask for information from an agent, and then the NMS sends an SNMP ________ message to write the variables on the SNMP agent in order to change the device's configuration.
18. Fill in the Blank
30 seconds
1 pt
________ are SNMP messages sent from the network device (agent) that also list the state of an MIB variable
19. Open Ended
30 seconds
1 pt
Which of the following steps should be done to upgrade an IOS image into flash memory after the IOS image is obtained from Cisco?
20. Fill in the Blank
30 seconds
1 pt
The ________ is the software that is run on a device that is going to be managed.
21. Open Ended
30 seconds
1 pt
Which Cisco IOS command is used to display whether CDP is enabled globally and what its current timers are?
22. Fill in the Blank
30 seconds
1 pt
________ defines rules that enable an ISP to assign public IP addresses in blocks rather than in whole classes (A, B, or C)
23. Fill in the Blank
30 seconds
1 pt
The ________ feature is used to match packets for classification in a large variety of ways that are useful for QoS
24. Open Ended
30 seconds
1 pt
Which field is used in the 802.11 header to mark a specific QoS value?
25. Open Ended
30 seconds
1 pt
Which DiffServ DSCP assured values were defined to be backward compatible with IPP priority values?
26. Open Ended
30 seconds
1 pt
Refer to the following figure. Based on the command shown in the figure, what are the IP address/NAT label combinations?
27. Fill in the Blank
30 seconds
1 pt
The SNMP database is referred to as the ________
28. Open Ended
30 seconds
1 pt
What is the purpose of CDP?
29. Open Ended
30 seconds
1 pt
Which of the following fields can be toggled on and off in an IOS log message?
30. Open Ended
30 seconds
1 pt
Which FHRP solution provides the ability to implement an active/active redundancy approach?
31. Open Ended
30 seconds
1 pt
How does HSRP support load balancing?
32. Open Ended
30 seconds
1 pt
Which field is used within the IPv6 packet header for QoS markings?
33. Open Ended
30 seconds
1 pt
Which of the following types does the IOS file system use to represent logical internal file systems for the convenience of internal functions and commands?
34. Open Ended
30 seconds
1 pt
suppose you want to set a switch to synchronize time with an external server, and then act as a local NTP server for the clients it serves. Which ntp configuration command would you use?
35. Open Ended
30 seconds
1 pt
Which options are not one of the ranges defined by RFC 1918?
36. Open Ended
30 seconds
1 pt
When talking about NAT/PAT, which of the following statements best describes the term inside local address?
37. Open Ended
30 seconds
1 pt
Which of the following algorithms is used to verify the integrity of an IOS file?
38. Open Ended
30 seconds
1 pt
Which term refers to the process of matching the fields in a message to make a choice to take some QoS action?
39. Open Ended
30 seconds
1 pt
With what type of traffic do jitter and delay not matter much?
40. Open Ended
30 seconds
1 pt
What command is used to debug Network Address Translation by causing the router to issue a message every time a packet has its address translated for NAT?
41. Open Ended
30 seconds
1 pt
Which of the following commands will set the logging monitor to record security events with a priority at or above 3?
42. Open Ended
30 seconds
1 pt
Which field is used in the 802.1Q header to mark a specific QoS value?
43. Open Ended
30 seconds
1 pt
Which versions of SNMP rely on community strings, which are used to authenticate access to MIB objects?
44. Open Ended
30 seconds
1 pt
What different technologies were used to solve the short-term IPv4 address exhaustion problem?
45. Open Ended
30 seconds
1 pt
Which is not one of the security features provided by SNMP version 3?
46. Open Ended
30 seconds
1 pt
Refer to the following figure. Based on the command shown in the figure, what are the IP address/NAT label combinations?
47. Open Ended
30 seconds
1 pt
Which RFC specifies IP address allocation for private internets?
48. Open Ended
30 seconds
1 pt
What is the correct syntax for viewing details about neighboring devices?
49. Open Ended
30 seconds
1 pt
Which DiffServ DSCP assured forwarding value offers the worst queue and drop performance?
50. Open Ended
30 seconds
1 pt
For static NAT, use what command to ensure that the inside local address is listed first and the inside global address second?
51. Open Ended
30 seconds
1 pt
Which of these are properties of site-to-site VPNs?
52. Open Ended
30 seconds
1 pt
in what sense is a private cloud "private"?
53. Fill in the Blank
30 seconds
1 pt
A Metro Ethernet ________ defines which user devices can communicate with each other.
54. Open Ended
30 seconds
1 pt
What is the name of the device that is used with a Digital Subscriber Line (DSL) to split the voice and data signals at the Telco?
55. Fill in the Blank
30 seconds
1 pt
A(n) ________ exists for use as a web application that lists anything that can be required via the company's cloud infrastructure
56. Open Ended
30 seconds
1 pt
Which type of encryption is commonly used to secure VPNs?
57. Open Ended
30 seconds
1 pt
What is the name of the Metro Ethernet providers facility that is located as close to their customers as possible?
58. Open Ended
30 seconds
1 pt
What is another common term that is used to describe what the MEF calls E-Line services?
59. Open Ended
30 seconds
1 pt
Which public cloud WAN options do not allow for an easy migration between different cloud providers?
60. Open Ended
30 seconds
1 pt
Which of the following PoE standards requires four powered wire pairs?
61. Open Ended
30 seconds
1 pt
Refer to the figure. What type of network topology does this configuration represent?
62. Open Ended
30 seconds
1 pt
Which organization has defined the five different criteria for cloud computing services?
63. Open Ended
30 seconds
1 pt
Which of these is the best definition of a hybrid topology?
64. Open Ended
30 seconds
1 pt
Which Metro Ethernet IEEE Ethernet standard provides the greatest speed at a distance of 40 km?
65. Open Ended
30 seconds
1 pt
In a two-tier network, which are most likely to connect directly to one another?
66. Open Ended
30 seconds
1 pt
Which option is not one of the three MEF service types?
67. Open Ended
30 seconds
1 pt
Which of these are characteristics of Internet VPN?
68. Open Ended
30 seconds
1 pt
Which of these is not one of the popular vendors or product family names associated with virtualized data centers?
69. Open Ended
30 seconds
1 pt
Which term is not a synonym for a VPN encryption key?
70. Fill in the Blank
30 seconds
1 pt
A(n) ________ cloud creates a service inside a company to internal customers
71. Open Ended
30 seconds
1 pt
How does a switch know how much power to deliver to a PoE device?
72. Open Ended
30 seconds
1 pt
What is a primary benefit of a three-tier network design over a two-tier design?
73. Open Ended
30 seconds
1 pt
Which MEF service type provides a link similar to a T1 leased line?
74. Open Ended
30 seconds
1 pt
How many tiers does a collapsed-core design have?
75. Open Ended
30 seconds
1 pt
Which of the following topologies is a design in which one central device connects to several others?
76. Open Ended
30 seconds
1 pt
SOHO refers to what type of network?
77. Open Ended
30 seconds
1 pt
Which of these functions does a SOHO router typically include?
78. Fill in the Blank
30 seconds
1 pt
________ provides a VM where the customer receives an offering with working software where the provider has complete control over how the offering is provided but the customer has control over how the offering is used
79. Open Ended
30 seconds
1 pt
When using the Cisco campus design terminology, which layer provides a connection point for end-user devices?
80. Open Ended
30 seconds
1 pt
In server virtualization, a host is defined as what component?
81. Open Ended
30 seconds
1 pt
What is a typical use for PoE?
82. Open Ended
30 seconds
1 pt
In what type of network does the wireless AP act autonomously, rather than with a Cisco Wireless LAN Controller (WLC)?
83. Fill in the Blank
30 seconds
1 pt
Virtual servers use an internal Ethernet switch concept called the ________
84. Open Ended
30 seconds
1 pt
Which of the following topologies is a design that interconnects each node to every other node in the set?
85. Open Ended
30 seconds
1 pt
Which MEF service type acts like a traditional Ethernet network?
86. Open Ended
30 seconds
1 pt
Which of these true of full mesh topology?
87. Open Ended
30 seconds
1 pt
A DSLAM is typically located in which location?
88. Open Ended
30 seconds
1 pt
What is the name given to MPLS devices that sit at the edge of the SP's network?
89. Open Ended
30 seconds
1 pt
What is Cisco's offering that allows customers to deploy their own virtual router inside a cloud provider's network?
90. Fill in the Blank
30 seconds
1 pt
A(n) ________ cloud provider offers services, selling those services to customers in other companies.
91. Open Ended
30 seconds
1 pt
What does PoE do?
92. Open Ended
30 seconds
1 pt
What is another common term that is used to describe what the MEF calls E-LAN services?
93. Open Ended
30 seconds
1 pt
Which MEF service type uses a hub-and-spoke topology?
94. Fill in the Blank
30 seconds
1 pt
A(n) ________ exchange has come to be known as a company that creates a private network as a service.
95. Open Ended
30 seconds
1 pt
Which of these are characteristics of MPLS VPN?
96. Fill in the Blank
30 seconds
1 pt
The ________ manages and allocates the host hardware (CPU, RAM, and so on) to each VM based on the settings configured
97. Fill in the Blank
30 seconds
1 pt
Often virtualization hosts placed into a data center rack will be cabled to two different switches. These switches are referred to as ________
98. Fill in the Blank
30 seconds
1 pt
The term ________ generically refers to any protocol's packet that is sent by encapsulating a packet inside another packet
99. Open Ended
30 seconds
1 pt
what protocol and port number are used for smtp traffic?
100. Open Ended
30 seconds
1 pt
what protocol is used to create the tunnels used by sda?
101. Open Ended
30 seconds
1 pt
which cisco IOS statement would correctly match only the ip range from 172.30.64.0 through 172.30.127.255?
102. Open Ended
30 seconds
1 pt
what is the name of the organization that defines the standards for metro ethernet?
103. Open Ended
30 seconds
1 pt
what is the maximum one-way delay expected on a link to ensure quality ip voice connection?
104. Open Ended
30 seconds
1 pt
if you wanted to classify all frames in your wlan as "widwo" for QoS, which of the following should you select from the QoS drop-down menu?
105. Open Ended
30 seconds
1 pt
when using MD5 hashing with the enable secret command, what process is taken with the user-entered password to verify its correctness?
106. Open Ended
30 seconds
1 pt
what does PoE do?
107. Open Ended
30 seconds
1 pt
in a controller-based network architecture, the controller communicates with networking devices using a(n)
108. Open Ended
30 seconds
1 pt
how does HSRP support load balancing?
109. Open Ended
30 seconds
1 pt
if you wanted to permit the source address 1.2.3.4, how would it be entered into the router's configuration files?
110. Open Ended
30 seconds
1 pt
which WLC port is an asynchronous connection to a terminal emulator that can be used for out-of-band management, system recover, and initial boot functions?
111. Open Ended
30 seconds
1 pt
TCP and UDP port numbers above ___ are not assigned. They are intended to be dynamically allocated and used temporarily for a client application
112. Open Ended
30 seconds
1 pt
which of these is the best definition of a hybrid topology?
113. Open Ended
30 seconds
1 pt
A(n) ___ attack enables an attacker to eavesdrop on data that passes from one machine to another
114. Open Ended
30 seconds
1 pt
what is the purpose of DHCP Snooping?
115. Open Ended
30 seconds
1 pt
what type of device uses the DHCP RELEASE and DHCP DECLINE messages?
116. Open Ended
30 seconds
1 pt
which cisco ios access-list command application keywords would be used to match DNS traffic?
117. Open Ended
30 seconds
1 pt
an engineer needs to add an additional access point to extend the range of their wireless network. however, it's not possible to run a wired network cable to the new access point. What could this engineer do so that the new wireless access point doesn't require a wired connection to the access point?
118. Open Ended
30 seconds
1 pt
before data can be sent using TCP, a connection must be established first. this connection establishment refers to the process of initializing and agreeing on which of the following values?
119. Open Ended
30 seconds
1 pt
which protocol and port number are used for Syslog traffic?
120. Open Ended
30 seconds
1 pt
what does the DHCP server needs to know to support DHCP clients?
121. Open Ended
30 seconds
1 pt
with what type of traffic do jitter and delay not matter much?
122. Open Ended
30 seconds
1 pt
if you have a set password with both enable password and enable secret, which one should you type to reach enable mode?
123. Open Ended
30 seconds
1 pt
which of these are advantages of storing configuration information in a central location?
124. Open Ended
30 seconds
1 pt
when the function of an autonomous AP are divided and the AP performs only real-time 802.11 operation, the AP is known as which of the following?
125. Open Ended
30 seconds
1 pt
what does an API call do?
126. Open Ended
30 seconds
1 pt
which port security violation mode discard the offending traffic and logs the violation, but does not disable the port?
127. Open Ended
30 seconds
1 pt
___ provides for retransmission and helps to avoid congestion, whereas ___ does not.
128. Open Ended
30 seconds
1 pt
___ refers to how to deploy changes to the configuration once made by changing files in the configuration management system
129. Open Ended
30 seconds
1 pt
which of the following commands is used in IOS to set message levels for syslog?
130. Open Ended
30 seconds
1 pt
which of the following return codes for HTTP requests means that the file could not be found?
131. Open Ended
30 seconds
1 pt
which of the following describes an IBSS?
132. Open Ended
30 seconds
1 pt
what subcommand enables port security on the interface?
133. Open Ended
30 seconds
1 pt
which of these protocols uses TCP?
134. Open Ended
30 seconds
1 pt
what is another common term that is used to describe what the MEF calls E-line services?
135. Open Ended
30 seconds
1 pt
when you configure port security, what restriction is imposed?
136. Open Ended
30 seconds
1 pt
in autonomous ap architecture, what should be used on each switch to prevent loops from forming and corrupting your network?
137. Open Ended
30 seconds
1 pt
what is the paid server version of Ansible called?
138. Open Ended
30 seconds
1 pt
what is the purpose of the digital network (dna) center?
139. Open Ended
30 seconds
1 pt
what are the two major roles of the cisco dna center?
140. Open Ended
30 seconds
1 pt
which of these functions does a SOHO router typically include?
141. Open Ended
30 seconds
1 pt
to match a subnet, use the subnet ID as the source, and find the WC mask by subtracting ___ from ___
142. Open Ended
30 seconds
1 pt
which field is used in the 802.11 header to mark a specific QoS value?
143. Open Ended
30 seconds
1 pt
which cisco IOS extended ACL statement would correctly match all IPV4 traffic?
144. Open Ended
30 seconds
1 pt
which actions can be chosen when configuring an ACL?
145. Open Ended
30 seconds
1 pt
which cisco ios command is used to display the automatic sequence numbers that have been assigned to the statements of a numbered IP ACL?
146. Open Ended
30 seconds
1 pt
you are trouble shooting the NAT/PAT configuration on your new router. which of the following commands could you use in your troubleshooting efforts to list the static NAT entries created in the configuration?
147. Open Ended
30 seconds
1 pt
which cisco ios command would be used to apply ACL number 30 inbound on an interface?
148. Open Ended
30 seconds
1 pt
in the following diagram, what is the outside global ip address?
149. Open Ended
30 seconds
1 pt
TCP and UDP port numbers below ___ are reserved for well-known applications
150. Open Ended
30 seconds
1 pt
how does JSON organize data?
151. Open Ended
30 seconds
1 pt
which TCP port number is used for POP3?
152. Open Ended
30 seconds
1 pt
what is the minimum bandwidth expected on a link to ensure a quality IP video connection?
153. Open Ended
30 seconds
1 pt
before a receiving host can examine the TCP or UDP header, which of the following must happen?
154. Open Ended
30 seconds
1 pt
a basic service set (BSS) is bounded by the area in which the access point's legal signal is usable. What is this area known as?
155. Open Ended
30 seconds
1 pt
in the following URL, what is the protocol? HTTPS:dnac.example.com/dna/intent/api/v1/network-device
156. Open Ended
30 seconds
1 pt
a cloud WLC deployment can support how many clients?
157. Open Ended
30 seconds
1 pt
in what type of network does the wireless ap act autonomously, rather than with a cisco wireless lan controller (wlc)?
158. Open Ended
30 seconds
1 pt
a user has a laptop so that she can move freely around the office building and work in different locations. as the user walks through the building, her device immediately connects to the closest access point. What is this known as?
159. Open Ended
30 seconds
1 pt
what is REST and HTTP equivalent of the Read term in CRUD?
160. Open Ended
30 seconds
1 pt
What is REST?
161. Open Ended
30 seconds
1 pt
in an HTTP request/reply action, ___ sends the request and ___ answers back
162. Open Ended
30 seconds
1 pt
which options are not one of the ranges defined by rfc 1928?
163. Open Ended
30 seconds
1 pt
what is one reason why using traditional manual configuration tools can create problems for an enterprise?
164. Open Ended
30 seconds
1 pt
what protocol and port number are used for POP3 traffic?
165. Open Ended
30 seconds
1 pt
access points all have a unique identifier based upon the mac addres of the access point. what is this unique identifier known as?
166. Open Ended
30 seconds
1 pt
which SDA component consists of the mechanisms to create VXLAN tunnels between SDA switches?
167. Open Ended
30 seconds
1 pt
when the no service password-encryption command is issued to stop password encryption, which of the following describes the process for decrypting passwords?
168. Open Ended
30 seconds
1 pt
which cisco ios extended acl port number keyword would be used to match a specific port number range?
169. Open Ended
30 seconds
1 pt
which range of numbers is used to indicate that an extended acl is being configured?
170. Open Ended
30 seconds
1 pt
which linux/mac os cli command is used to verify the ip address, mask, default router and other ip settings?
171. Open Ended
30 seconds
1 pt
the opendaylight project exists as a project of
172. Open Ended
30 seconds
1 pt
when referring to wireless networks, membership in a bss is known as which of the following?
173. Open Ended
30 seconds
1 pt
a version control system cannot help solve what problem?
174. Open Ended
30 seconds
1 pt
in a controller-based network architecture, the controller communicates with applications using a(n)
175. Open Ended
30 seconds
1 pt
what command enables DAI on a switch for specialized VLANS?
176. Open Ended
30 seconds
1 pt
the ___ manages and allocates the host hardware (cpu, ram, and so on) to each vm based on the settings configured
177. Open Ended
30 seconds
1 pt
what keyword would you add to the end of an access-list command to see messages and statistics about matches of that particular line of the acl?
178. Open Ended
30 seconds
1 pt
certain ___ are inevitable because not having them would prohibit legitimate uses
179. Open Ended
30 seconds
1 pt
which ip address range would be matched by the access-list 10 permit 192.168.100.128 0.0.0.15?
180. Open Ended
30 seconds
1 pt
what file type tells ansible what to do, with actions and logic?
181. Open Ended
30 seconds
1 pt
the wired equivalent privacy (wep) uses which encryption algorithm to encrypt data?
182. Open Ended
30 seconds
1 pt
a unified wcl deployment can support how many clients?
183. Open Ended
30 seconds
1 pt
which of these are features of cisco prime infrastructure?
184. Open Ended
30 seconds
1 pt
which of these is one of the primary actions performed by an application?
185. Open Ended
30 seconds
1 pt
what functionality does the command ip helper-address server-ip enable in a network?
186. Open Ended
30 seconds
1 pt
which interface is used for normal management traffic, such as RADIUS user authentication, WLC-to-WLC communication, web-based and ssh sessions, as well as used to terminate CAPWAP tunnels between the controller and its AP?
187. Open Ended
30 seconds
1 pt
the nms uses ___ messages to ask for information from an agent, and then the nms sends an snmp ___ message to write the variables on the snmp agent in order to change the device's configuration
188. Open Ended
30 seconds
1 pt
which ip address range would be matched by the access-list 30 deny 172.30.156.0 0.0.3.255?
189. Open Ended
30 seconds
1 pt
in ___-based networking, an engineer configures the outcome desired and then the devices determine what configuration and behavior are necessary to achieve that outcome
190. Open Ended
30 seconds
1 pt
which dhcp messages do clients typically send?
191. Open Ended
30 seconds
1 pt
for telnet and ssh users, which of the following commands will allow the terminal user to receive the log messages?
192. Open Ended
30 seconds
1 pt
what is the term used to describe when access points are placed at multiple geographical locations and interconnected by a switched infrastructure?
193. Open Ended
30 seconds
1 pt
which of the following types does the ios file system use to represent external file systems for reference in different ios commands?
194. Open Ended
30 seconds
1 pt
what is ansible?
195. Open Ended
30 seconds
1 pt
ansible uses a ___ model, whereas puppet and chef use a __ model
196. Open Ended
30 seconds
1 pt
many rest-based apis use the ___ protocol
197. Open Ended
30 seconds
1 pt
in a scenario using 802.1.x and eap-based authentication, the term supplicant refers to which of the following?
198. Open Ended
30 seconds
1 pt
what is the name of the centralized controlled that is used by cisco's application centric infrastructure?
199. Open Ended
30 seconds
1 pt
which authentication method is considered the most secure wireless authentication method currently available?
200. Open Ended
30 seconds
1 pt
which diffserv dscp value is suggested to be used for voice calls?
201. Open Ended
30 seconds
1 pt
which cisco ios statement would match all traffic?
202. Open Ended
30 seconds
1 pt
virtual servers use an internal ethernet switch concept called the ___
203. Open Ended
30 seconds
1 pt
every image, video, audio, or animation within a web page is stored as a separate file called a(n) ___ on a web server
204. Open Ended
30 seconds
1 pt
in which type of attack is human trust and social behavior used as a point of vulnerability for attack?
205. Open Ended
30 seconds
1 pt
on an ntp server, what does the stratum level indicate?
206. Open Ended
30 seconds
1 pt
which organization has defined the five different criteria for cloud computing services?
207. Open Ended
30 seconds
1 pt
which of these is not an attribute of a gratuitous ARP message?
208. Open Ended
30 seconds
1 pt
what type of attack does dhcp snooping attempt to prevent?
209. Open Ended
30 seconds
1 pt
when using the cisco campus design terminology, which layer provides a connection point for end-user devices?
210. Open Ended
30 seconds
1 pt
which cisco ios command would be used to delete specific line from an extended IP ACL?
211. Open Ended
30 seconds
1 pt
what command will show you the mac table entries associated with ports using port security?
212. Open Ended
30 seconds
1 pt
what type of attack lures victims into visiting malicious websites, such as with fake emails?
213. Open Ended
30 seconds
1 pt
which cisco ios command would configure an extended ip acl statement that denies all http traffic from the 10.10.20.128/25 network to the 172.17.1.0/24 network?
214. Open Ended
30 seconds
1 pt
___ techniques are ways to counteract or prevent attacks
215. Open Ended
30 seconds
1 pt
when a client receives several packets, each for a different application, how does the client os know which application to direct a particular packet to?
216. Open Ended
30 seconds
1 pt
a(n) ___ cloud provide offers services, selling those services to customers in other companies
217. Open Ended
30 seconds
1 pt
which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?
218. Open Ended
30 seconds
1 pt
which of these are attributes of REST?
219. Open Ended
30 seconds
1 pt
a metro ethernet ___ defines which user devices can communicate with each other
220. Open Ended
30 seconds
1 pt
which cisco ios extended acl port number keyword would be used to not match a specific port number
221. Open Ended
30 seconds
1 pt
with dhcp snooping, what happens to dhcp messages recieved on an untrusted port that would normally be sent by a client?
222. Open Ended
30 seconds
1 pt
when should you disable the ACL's on the interfaces?
223. Open Ended
30 seconds
1 pt
refer to the figure. does a single point of failure exist in the topology shown? if so, where?
224. Open Ended
30 seconds
1 pt
what is the address that sends the same message to all hosts on the local subnet?
225. Open Ended
30 seconds
1 pt
which cisco ios command can be used to document the use of a specific acl?
226. Open Ended
30 seconds
1 pt
which cisco ios command(s) can be used to display the configured ip information for a remote neighbor?
227. Open Ended
30 seconds
1 pt
in the southbound APIs for DNA center, which protocols recent networking devices/software versions?
228. Open Ended
30 seconds
1 pt
traditionally, most networks have been designed to utilize a(n) ___ control plane
229. Open Ended
30 seconds
1 pt
the ___ handles any action that controls the data plane
230. Open Ended
30 seconds
1 pt
tcp flow control using windowing is implemented by controlling ___
231. Open Ended
30 seconds
1 pt
the command enable algorithm-type sha256 secret password enables which of the following configurations?
232. Open Ended
30 seconds
1 pt
which cisco ios statement would deny all traffic?
233. Open Ended
30 seconds
1 pt
which field is used within the IPV6 packet header for QoS markings?
234. Open Ended
30 seconds
1 pt
when is a manual per-device configuration plan the best choice?
235. Open Ended
30 seconds
1 pt
ansible's playbooks use a(n) ___ language, whereas puppet uses a(n) ___ language
236. Open Ended
30 seconds
1 pt
applications such as FTP or Telnet open a ___ using a well-known port and listen for connection requests
237. Open Ended
30 seconds
1 pt
which of the following types does the IOS file system use to represent logical internal file systems for the convenience of internal functions and commands?
238. Open Ended
30 seconds
1 pt
with both puppet and chef, in production you would run them as a ____ with multiple ___ workstations used by the engineering staff to build file stored on the ___
239. Open Ended
30 seconds
1 pt
tcp and udp are protocols working at the transport later of the osi model. they perform multiplexing using ___
240. Open Ended
30 seconds
1 pt
an attacker uncovering public details like who owns a domain is an example of what type of attack?
241. Open Ended
30 seconds
1 pt
which of the following steps should be done to upgrade an ios image into flash memory after the ios image is obtained from cisco?
242. Open Ended
30 seconds
1 pt
which wpa version has encryption and mic with aes and gcmp?
243. Open Ended
30 seconds
1 pt
where should standard acls be placed?
244. Open Ended
30 seconds
1 pt
___ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation
245. Open Ended
30 seconds
1 pt
which of the following topologies is a design in which one central device connects to several others?
246. Open Ended
30 seconds
1 pt
the ___ refers to the tasks that a networking device does to forward a message
247. Open Ended
30 seconds
1 pt
which method of wireless authentication leverages a digital certificate on the as as a robust method to authenticate the radius server?
248. Open Ended
30 seconds
1 pt
which wcl port is used for out-of-band management, system recovery, and initial boot functions and always connects to a switch port in access mode?
249. Open Ended
30 seconds
1 pt
the address entered into a web browser (firefox, safari, chrome) is technically called a ___
250. Open Ended
30 seconds
1 pt
the ___ feature is used to match packets for classification in a large variety of ways that are useful for QoS
251. Open Ended
30 seconds
1 pt
what command should you use to save the configuration of the sticky addresses?
252. Open Ended
30 seconds
1 pt
which term refers to the process of matching the fields in a message to make a choice to take some QoS action?
253. Open Ended
30 seconds
1 pt
you are about to save your startup-configuration file to your local file server as a backup. You want to ensure that the passwords in the file cannot be read by anyone opening the file. which of the following commands could you issue on the swtich to make the password not viewable?
254. Open Ended
30 seconds
1 pt
which cisco ios command would configure an extended ip acl statement that permits all tftp traffic from the 192.168.1.0/26 network to the 10.2.3.192/27 network?
255. Open Ended
30 seconds
1 pt
which metro ethernet ieee ethernet standard provides the greatest speed at a distance of 40 km?
256. Open Ended
30 seconds
1 pt
inconsistency in procedure implementation between network engineers in an enterprise can lead to what?
257. Open Ended
30 seconds
1 pt
which type of malware replicates itself and spreads through other systems through their vulnerabilities?
258. Open Ended
30 seconds
1 pt
what does the command ip helper-address server-ip do?
259. Open Ended
30 seconds
1 pt
which cisco ios command woul dbe used to apply acl number 10 outbound on an interface?
260. Open Ended
30 seconds
1 pt
which term is not a synonym for a vpn encryption key?
261. Open Ended
30 seconds
1 pt
from the following list, identify the port number(s) used by the ftp protocol?
262. Open Ended
30 seconds
1 pt
the term ___ generically refers to any protocol's packets that is sent by encapsulating a packet inside another packet
263. Open Ended
30 seconds
1 pt
what does REST use to identify what source the request acts on?
264. Open Ended
30 seconds
1 pt
dhcp snooping verifies the mac address by doing what?
265. Open Ended
30 seconds
1 pt
what command enables dhcp snooping?
266. Open Ended
30 seconds
1 pt
which of these are characeristics of internet vpn?
267. Open Ended
30 seconds
1 pt
for static nat, use what command to ensure that the inside local address is listed first and the inside global address second?
268. Open Ended
30 seconds
1 pt
the ___ protocol is most often used to transfer web pages
269. Open Ended
30 seconds
1 pt
in the ip header, if you want to set the protocol type to "all ipv4 packets," what keyword do you use?
270. Open Ended
30 seconds
1 pt
which of these are properties of site-to-site vpns?
271. Open Ended
30 seconds
1 pt
which cisco ios access-list command application keywords would be used to match http traffic?
272. Open Ended
30 seconds
1 pt
which one of the following is the data encryption and integrity method used by wpa2?
273. Open Ended
30 seconds
1 pt
when a port security violation occurs, what happens next by default?
274. Open Ended
30 seconds
1 pt
which public cloud wan options do not allow for an easy migration between different cloud providers?
275. Open Ended
30 seconds
1 pt
what is the default action taken on all unmatched traffic through an ACL?
276. Open Ended
30 seconds
1 pt
the wlc port that is used for all normal ap and management traffic, and usually connects to a swtich port in 802.1q trunk mode is known as what?
277. Open Ended
30 seconds
1 pt
when cdp is used on ethernet, it sends traffic using a(n) ___ address
278. Open Ended
30 seconds
1 pt
where should extended acls be placed?
279. Open Ended
30 seconds
1 pt
cisco's ___ acts as its commercial version of opendaylight
280. Open Ended
30 seconds
1 pt
what two commands can you use to verify the relay agent?
281. Open Ended
30 seconds
1 pt
which cisco ios command is used to list whether an ip acl is configured on an interface?
282. Open Ended
30 seconds
1 pt
a configuration template is combined with ___ to fill in the parts of the template that change from instance to instance
283. Open Ended
30 seconds
1 pt
which type of encryption is commonly used to secure vpns?
284. Open Ended
30 seconds
1 pt
what is the nsame of the field that is used for QoS markings in the ip header?
285. Open Ended
30 seconds
1 pt
a cisco embedded wcl deployment can typically support up to how many aps?
286. Open Ended
30 seconds
1 pt
which of the following types of access points are equipped with both wired and wireless hardware so that the wireless client associations can be terminated on wired connection locally at the AP?
287. Open Ended
30 seconds
1 pt
which RFC specifies ip address allocation for private internets?
288. Open Ended
30 seconds
1 pt
which of the following is a wireless authentication method, developed by cisco, in which authentication credentials are protected by passing a protected access credential (pac) between the AS and the supplicant?
289. Open Ended
30 seconds
1 pt
___ can monitor device configurations to discover when the differ from the intended ideal, and then either reconfigure the device or notify someone to make the change
290. Open Ended
30 seconds
1 pt
what does the crud acronym stand for?
291. Open Ended
30 seconds
1 pt
what is rest's relationship to caching?
292. Open Ended
30 seconds
1 pt
spoofing is the technique of doing what?
293. Open Ended
30 seconds
1 pt
which sda component is the network of decies and connections that provide ip connectivit to all nodes?
294. Open Ended
30 seconds
1 pt
which tcp port number is used for HTTP (non-secure web traffic)?
295. Open Ended
30 seconds
1 pt
on what configuration page of the cisco wlc would you be able to configure a wi-fi multimedia (wmm) policy?
296. Open Ended
30 seconds
1 pt
which versions of snmp rely on community strings, which are used to authenticate access to MIB objects?
297. Open Ended
30 seconds
1 pt
___ is an application layer protocol that provides a message format for communication between managers and agents
298. Open Ended
30 seconds
1 pt
what is the max data rate for the 802.1n standard?
299. Open Ended
30 seconds
1 pt
a(n) ___ exists for use as a web application that lists anything that can be required via the company's cloud infrastructure
300. Open Ended
30 seconds
1 pt
which MEF service type acts like a traditional ethernet network?
301. Open Ended
30 seconds
1 pt
in a two-tier network, which are most likely to connect directly to one another?
302. Open Ended
30 seconds
1 pt
where should more specific statements be placed in the acl?
303. Open Ended
30 seconds
1 pt
when connecting a vlan to a wlan, which interface is used?
304. Open Ended
30 seconds
1 pt
what is the purpose of the LISP map server?
305. Open Ended
30 seconds
1 pt
what is the purpose of a data serialization language?
306. Open Ended
30 seconds
1 pt
the ieee 802.11 standard refrs to the upstream wired ethernet as the ___ for the wireless BSS
307. Open Ended
30 seconds
1 pt
for an interface that allows any three mac addresses, when does a violation occur?
308. Open Ended
30 seconds
1 pt
which of these is not a feature of configuration provisioning?
309. Open Ended
30 seconds
1 pt
the snmp database is referred to as the ___
310. Open Ended
30 seconds
1 pt
for telnet and ssh users, which of the following command will enable the ios to send log messages to all users?
311. Open Ended
30 seconds
1 pt
the ___ command is the most frequently used within HTTP
312. Open Ended
30 seconds
1 pt
which of these is the correct syntax for setting password encryption?
313. Open Ended
30 seconds
1 pt
which is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?
314. Open Ended
30 seconds
1 pt
what command lists the configuration settings for port security on an interface?
315. Open Ended
30 seconds
1 pt
how does a switch know how much power to deliver to a PoE device?
316. Open Ended
30 seconds
1 pt
which of these text files in chef contains the logic applied to resources to determine when, how, and whether to act against the resources?
317. Open Ended
30 seconds
1 pt
which components operate on the southbound side of sda model?
318. Open Ended
30 seconds
1 pt
which range of numebers is used to indicate that a standard acl is being configured?
319. Open Ended
30 seconds
1 pt
cisco controllres suppor a maximum of ___ wlans, but only ___ of them can be actively configured on an ap
320. Open Ended
30 seconds
1 pt
which of the following usually performs the management functions of many lightweight aps?
321. Open Ended
30 seconds
1 pt
in password hashing, it is essential that ___
322. Open Ended
30 seconds
1 pt
a ddos attack occurs when ___
323. Open Ended
30 seconds
1 pt
in the ip header, which field identifies the header that followed the ip header?
324. Open Ended
30 seconds
1 pt
___ defines rules that enable an isp to assign public ip addresses in block rather than in while classes (a, b, or c)
325. Open Ended
30 seconds
1 pt
in a formal uri, which component corresponds to a server's name in a web address?
326. Open Ended
30 seconds
1 pt
which OSes support the use of netstat -rn command?
327. Open Ended
30 seconds
1 pt
where can cisco routers apply acl logic to packets?
328. Open Ended
30 seconds
1 pt
the ___ is the controller that creates application policies for the data center infrastructure
329. Open Ended
30 seconds
1 pt
what does the acrynum REST stand for?
330. Open Ended
30 seconds
1 pt
which option is not one of the required parameters that are matched with an extened ip acl?
331. Open Ended
30 seconds
1 pt
which global configuration command enables logging for console users?
332. Open Ended
30 seconds
1 pt
how many internal hosts can be translated to one external ip address using port address translation?
333. Open Ended
30 seconds
1 pt
which standard must wireless devices adhere to?
334. Open Ended
30 seconds
1 pt
which of the following is a windows command for discovering a host's ip address?
335. Open Ended
30 seconds
1 pt
in server virtulization, a host is defined as what component?
336. Open Ended
30 seconds
1 pt
which cisco ios statement would correctly match only the ip range from 10.10.10.0 through 10.10.10.127?
337. Open Ended
30 seconds
1 pt
a greenfield sda fabric uses what type of design?
338. Open Ended
30 seconds
1 pt
which ip address range would be matched by te access-list 20 permit 10.20.192.0 0.0.63.255?
339. Open Ended
30 seconds
1 pt
which management system can perform a discovery process to find all devices and then build a topology map?
340. Open Ended
30 seconds
1 pt
which cisco IOS command is used to display whether cdp is enabled globally and what its current timers are?
341. Open Ended
30 seconds
1 pt
which of these sdn types does not directly program the data or control plane, but can indirectly affect them via telnet, ssh, and/or snmp?