Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Data Communications and Networking 4

Learn the selection criteria of network devices and WAN technologies to meet network requirements. Troubleshoot end-to-end connectivity in a small business.

point-to-point connections

access control

network security

network monitoring

quality of service

network evolution

network troubleshooting

information technology

What is an SNMP management agent?

  • a communication protocol that is used by SNMP
  • software that is installed on devices managed by SNMP
  • a database that a device keeps about network performance
  • a computer loaded with management software and used by an administrator to monitor a network

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

  • PaaS
  • IaaS
  • SaaS
  • ITaaS

Which feature sends simulated data across the network and measures performance between multiple network locations?

  • syslog
  • SPAN
  • IP SLA
  • LLDP

These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.

  • CISCO Nexus 9000 Series
  • CISCO Nexus 8000 Series

What is Fog computing?

  • It is a type of computing that disperses servers and services globally in distributed data centers.
  • It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.
  • It is a type of computing that sends controller data to a sensor.
  • It is a type of computing that enhances P2P applications.

Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.

  • False
  • True

When is the most appropriate time to measure network operations to establish a network performance baseline?

  • during quiet vacation periods, so that the level of non-data traffic can be determined
  • at random times during a 10 week period, so that abnormal traffic levels can be detected
  • at the same time each day across a set period of average working days, so that typical traffic patterns can be established 9. A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?
  • whenever high network use is detected, so that how the network performs under stress can be monitored

Packets are forwarded in the order in which they are received.

  • WFQ
  • FIFO
  • CBWFQ
  • LLQ

DHCP is the protocol that automatically assigns a host a valid IP address out of a DHCP pool.

  • False
  • True

Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination?

  • Compression
  • PPP Callback
  • Multilink
  • Authentication
  • Error detection

An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name?

  • net computer
  • nslookup
  • ipconfig /all
  • tracert

Which model is the only QoS model with no mechanism to classify packets?

  • IntServ
  • best-effort
  • DiffServ
  • hard QoS

What is an advantage offered by GRE tunnels?

  • support for connecting individual hosts across the Internet
  • encryption of encapsulated traffic
  • built in security mechanisms
  • support for IP multicast tunneling

The _____ transmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.

  • Physical layer
  • Mental layer

After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step?

  • Contact the administrator of the external system.
  • Narrow the scope of the problem.

What TCP port is used by BGP to exchange messages between routers?

  • 22
  • 443
  • 58
  • 179

Which statement describes the QoS classification and marking tools?

  • Marking is the identification of which QoS policy should be applied to specific packets.
  • Classification is performed after traffic is marked.
  • Classification should be done as close to the destination device as possible.
  • Marking is the adding of a value to a packet header.

What is a characteristic of data flow processing in SDN?

  • The SDN controller attaches an entry to each packet to identify the flow.
  • c. OpenStack is used to construct the entry in switches to facilitate data forwarding.
  • The SDN controller routes a data flow first and the data plane will use policies to permit or deny the flow.
  • Each data flow through the network must be approved by the SDN controller first.

What function does NCP perform in the establishment of a PPP session?

  • It provides automatic configuration of the interfaces at each end including detecting common configuration errors.
  • It completes the specific configuration of the network layer protocol that is being used.
  • It tests the link to determine whether the link quality is sufficient to bring up network layer protocols.
  • It opens the connections and negotiates configuration options.

_____ A newer and faster technology considered to be part of 4G technology.

  • LTE
  • 4G
  • 5G
  • LTO

Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?

  • show tech-support
  • show protocols
  • show running-config
  • show ip cache

The IoT refers to the network of billons of physical objects accessible through the Internet as we continue to connect the unconnected.

  • False
  • True

The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.

  • False
  • True

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

  • satellite
  • Wi-Fi
  • copper
  • fiber optic

A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs?

  • DSL
  • Municipal Wi-Fi
  • satellite Internet
  • WiMax

The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.

  • True
  • False

Simple Network Management Protocol (SNMP) was developed to allow administrators to manage nodes such as servers, workstations, routers, switches, and security appliances, on an IP network.

  • False
  • True

Delay-sensitive data such as voice is added to a priority queue so that it can be sent first (before packets in other queues).

  • CBWFQ
  • WFQ
  • LLQ
  • FIFO

_____ A type of digital modem used with high-speed DSL or cable Internet service.

  • Cable Provider
  • Network Provider
  • Service Provider
  • Digital Subscriber Line

a type of network that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate.

  • circuit-switched network
  • module
  • md5
  • hash_password

Cloud computing and virtualization are different terms that refer to the same thing.

  • False
  • True

A _____ is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.

  • advisor
  • hypervisor

_____ diagrams keep track of the location, function, and status of devices on the network.

  • Internet topology
  • Network topology

What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?

  • 192.168.70.0 to 192.168.70.255
  • 92.168.70.0 to 192.168.70.63
  • 192.168.70.0 to 192.168.71.255
  • 192.168.70.0 to 192.168.70.127

Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

  • True
  • False

Which statement describes a difference between the operation of inbound and outbound ACLs?

  • Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
  • On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
  • In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.
  • Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers.

What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

  • Data is not forwarded along the pathway.
  • Data is forwarded along the pathway using IntServ but not provided preferential treatment.
  • Data is forwarded along the pathway using a best-effort approach.
  • Data is forwarded along the pathway using DiffServ.

A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface?

  • encapsulation ppp
  • ip address 192.168.10.1 255.255.255.252
  • clock rate 4000000
  • no ip address

SNMP is an application layer protocol that provides a message format for communication between managers and agents

  • False
  • True

What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?

  • Place unused ports in an unused VLAN
  • Disable STP
  • Disable DTP
  • Enable port security

Which statement correctly describes a WAN technology?

  • MPLS can be used to deliver any type of packet between sites.
  • VSATs create a public WAN while providing connectivity to remote locations.
  • The 53-byte ATM cell operates more efficiently for big frames.
  • ISDN PRI is intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel.

______ are specialized, handheld devices designed for testing the various types of data communication cabling.

  • Cable testers
  • TV testers

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

  • The spine and leaf switches are always linked through core switches.
  • The spine switches attach to the leaf switches and attach to each other for redundancy.
  • The leaf switches always attach to the spines, but they never attach to each other.
  • The leaf switches always attach to the spines and they are interlinked through a trunk line.

IntServ provides a way to deliver the end-to-end QoS that real-time applications require by explicitly managing network resources to provide QoS to specific user packet streams, sometimes called microflows.

  • False
  • True

_____ It is a WAN protocol that provides Provides router-to-router and host-to-network connections over synchronous and asynchronous circuits.

  • PPP
  • AAA
  • CCC
  • ZZZ

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

  • R1(config-if)# ip access-group 1 out
  • R1(config-if)# ip access-group 1 in
  • R1(config-line)# access-class 1 in
  • R1(config-line)# access-class 1 out

How can SNMP access be restricted to a specific SNMP manager?

  • Use the snmp-server community command to configure the community string with no access level.
  • Define an ACL and reference it by using the snmp-server community command.
  • Specify the IP address of the SNMP manager by using the snmp-server host command.
  • Use the snmp-server traps command to enable traps on an SNMP manager.

The OSI reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer.

  • False
  • True

_____ It is the default encapsulation type on point-to-point connections, dedicated links, and circuit-switched connections when the link uses two Cisco devices.

  • HDLC
  • ACLC
  • ABCD
  • HDMI

A site-to-site VPN is created when devices on both sides of the VPN connection are aware of the VPN configuration in advance.

  • False
  • True

PPP authentication is performed at which OSI layer?

  • Layer 4
  • Layer 2
  • Layer 1
  • Layer 3

Satellite Internet services are used in locations where land-based Internet access is not available, or for temporary installations that are mobile.

  • True
  • False

Under which condition does congestion occur on a converged network with voice, video, and data traffic?

  • if voice traffic latency begins to decrease across the network
  • if the request for bandwidth exceeds the amount of bandwidth available
  • if a user downloads a file that exceeds the file limitation that is set on the server
  • if video traffic requests more bandwidth than voice traffic requests

It is a queuing algorithm which feature brings strict priority queuing (PQ) to CBWFQ.

  • High Latency Queuing
  • Low Latency Queuing

Which public WAN technology provides security by using encrypted tunnels over Internet connections?

  • VPN
  • 3G/4G
  • DSL
  • Cable

MAC address table flooding attacks are addressed with port security.

  • False
  • True

With which layers of the OSI model do the PPP control protocols interface?

  • NCP interfaces with Layer 1; LCP interfaces with Layer 2
  • NCP interfaces with Layer 3; LCP interfaces with Layer 1
  • NCP interfaces with Layer 2; LCP interfaces with Layer 3
  • NCP interfaces with Layer 1; LCP interfaces with Layer 3

Also called the forwarding plane, this plane is typically the switch fabric connecting the various network ports on a device.

  • Data Train
  • Data Jet
  • Data Truck
  • Data Plane

Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?

  • authentication
  • synchronous communication
  • flow control
  • error control

External BGP is the routing protocol used between routers in different autonomous systems.

  • True
  • False

This is typically regarded as the brains of a device.

  • Control Jet
  • Control Plane

It SPAN Terminology which refers to the traffic that enters the switch.

  • Engress traffic
  • Ingress traffic

The show monitor command is used to verify the SPAN session.

  • False
  • True

What is the default queuing method used on the LAN interfaces of Cisco devices?

  • CBWFQ
  • WFQ
  • LLQ
  • FIFO

CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

  • True
  • False

Which mode is used to configure SNMP?

  • interface configuration mode
  • privileged mode
  • router configuration mode
  • global configuration mode

For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?

  • There are significant data exchanges between virtual servers.
  • More network control traffic is generated between virtual servers and clients.
  • Data traffic from clients will be routed to multiple virtual servers.
  • There is more data traffic flowing from virtual servers to clients.

The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.

  • False
  • True

Generic Routing Encapsulation (GRE) is one example of a basic, non-secure, site-to-site VPN tunneling protocol.

  • False
  • True

A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue?

  • The helpdesk has enough information to begin finding a resolution.
  • The client needs to reboot the PC and report back to the helpdesk.
  • The client needs to plug into a different port on the switch and try the steps again before contacting the helpdesk.
  • The client needs to switch cables before the helpdesk can begin to resolve the issue.
  • More detail is required before a complete problem description can be completed.

Which term describes the data exchanges between virtual servers in a data center?

  • east-west traffic
  • backbone traffic
  • vertical traffic
  • north-south traffic

Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?

  • forwarding information base
  • data plane
  • control plane
  • adjacency table

The LLQ feature brings strict priority queuing (PQ) to CBWFQ.

  • True
  • False

This type of SDN uses a centralized controller that has knowledge of all devices in the network.

  • Controller-based STP
  • Controller-based SDN

A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command?

  • to probe the server that provides the web service to determine if it is also running an email service
  • to establish a management session to the web server
  • to identify the path of network traffic toward the web server
  • to verify that the website is operational

Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces.

  • CBWFQ
  • LLQ
  • WFQ
  • FIFO

A newer and faster technology considered to be part of 4G technology.

  • [No Answer]

It is a type of telnet attack where the attacker may use a list of common passwords, dictionary words, and variations of words to discover the administrative password

  • Flooding Attack
  • Phising Password Attack
  • SQL Injection Attack
  • Brute Force Password Attack

One of the new challenges associated with the rapid growth of the IoT is increasing the CPU power of computers

  • False
  • True

What equipment at the cable service provider office connects the office to the subscriber locations?

  • DSLAM
  • CSU/DSU
  • CMTS
  • access server

An _____ is a collection of end-point groups (EPG), their connections, and the policies that define those connections.

  • Application Network Profile
  • Mobile Network Profile

The _____ QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.

  • Differentiated Services
  • Same Services

It is a queuing algorithm which extends the standard WFQ functionality to provide support for user-defined traffic classes.

  • CBWFO
  • CBWFJ
  • CBWFK
  • CBWFQ

It is a queuing algorithm which is an automated scheduling method that provides fair bandwidth allocation to all network traffic.

  • Heighted Fair Queuing
  • Weighted Fair Queuing

Which PPP protocol allows a device to specify an IP address for routing over the PPP link?

  • LCP
  • CHAP
  • PAP
  • IPCP

How many "things" are predicted to be interconnected on the Internet by 2020?

  • 5 million
  • 1 billion
  • 1 million
  • 50 billion

It is an SPAN Terminology which refers to the port that is monitored with use of the SPAN feature answer Source (SPAN) port

  • [No Answer]

Which network traffic management technology is a basic element in SDN implementations?

  • OpenStack
  • IEEE 802.1aq
  • Interface to the Routing System
  • OpenFlow

What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?

  • CHAP
  • ADSL
  • PPPoE
  • LTE

When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?

  • show ip route​
  • show pppoe session​
  • show ip interface brief​
  • show interface dialer 1

A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using?

  • comparing IP settings on network devices
  • divide-and-conquer
  • bottom-up
  • top-down

The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.

  • True
  • False

What does the FIFO queuing stands for?

  • [No Answer]

It is a type of DHCP where the attacker floods the DHCP server with bogus DHCP requests and eventually leases all of the available IP addresses in the DHCP server pool.

  • DHCT starvation attack
  • DHCP starvation attack

One of the new challenges associated with the rapid growth of the IoT is integrating many devices from different vendors with custom applications.

  • False
  • True

It is an ever increasing requirement of networks today

  • Quality of Service
  • QoS

What is an example of an M2M connection?

  • a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups
  • a person getting information from a database, or conducting a complex analysis
  • a domestic refrigerator sending an email to homeowners to inform them that milk must be purchased
  • two people communicating with each other through an instant messaging application

_____ It is a networking device that provides internetworking and WAN access interface ports that are used to connect to the service provider network.

  • Router
  • Route
  • Ruta
  • Rat

Which protocol is used by PPP to provide authentication and protection from playback attacks?

  • CHAP
  • PAP
  • LCP
  • NCP

How many levels of priority are possible when using class of service (CoS) marking on frames?

  • 3
  • 8
  • 24
  • 64

Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?

  • ISDN
  • Frame Relay
  • ATM
  • Metro Ethernet

Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?

  • management
  • video
  • voice
  • data

What is a characteristic of a WAN?

  • WAN service providers include carriers such as a telephone network or satellite service.
  • A WAN operates inside the geographic scope of a LAN.
  • WANs always use physical cables to connect LANs.
  • A WAN is typically owned by an enterprise which wants to interconnect its LANs.

Packets are classified into different flows based on header information including the ToS value.

  • LLQ
  • WFQ
  • CBWFQ
  • FIFO

Which statement describes the physical topology for a LAN?

  • It depicts the addressing scheme that is employed in the LAN.
  • It defines how hosts and network devices connect to the LAN.
  • It describes whether the LAN is a broadcast or token-passing network.
  • It shows the order in which hosts access the network.

What is a disadvantage of leased lines?

  • high cost
  • inconsistent availability
  • low quality
  • complexity

_____ allows source and destination ports to be in different switches.

  • RSPAT
  • RSPAN

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

  • CDP
  • FTP
  • LLDP
  • HTTP

A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem?

  • There is a cable fault.
  • An ACL is blocking incoming connections.
  • There are excessive broadcasts in the network.
  • The web server does not have a default gateway configured.

The Cisco Discovery Protocol (CDP) is a proprietary Layer 2 link discovery protocol.

  • False
  • True

_____ This is a point established in a building or complex to separate customer equipment from service provider equipment.

  • builder
  • decrement
  • Demarcation point
  • Increment

A _____ topology shows the physical layout of the devices connected to the network.

  • Mental network
  • Physical network

SDN is a network architecture that has been developed to virtualize the network.

  • False
  • True

A general term for Internet services from a mobile phone or from any device that uses the same technology.

  • wired internet
  • wireless internet

Which statement describes a characteristic of standard IPv4 ACLs?

  • They can be created with a number but not with a name.
  • They can be configured to filter traffic based on both source IP addresses and source ports.
  • They filter traffic based on source IP addresses only.
  • They are configured in the interface configuration mode.

A _____ topology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.

  • logical network
  • syntax network
  • hard network
  • easy network

It is a type of telnet attack where the attacker continuously requests Telnet connections in an attempt to render the Telnet service unavailable and preventing an administrator from remotely accessing a switch.

  • Telnet UnO Attack
  • Telnet DoS Attack

One of the new challenges associated with the rapid growth of the IoT is developing better routing protocols for new devices

  • False
  • True

The _____ is considered to be the brains of the ACI architecture.

  • Application Terms Infrastructure Controller
  • Application Policy Infrastructure Controller

_____ A general term for Internet services from a mobile phone or from any device that uses the same technology.

  • wireless internet
  • wired internet
  • wireless mouse
  • wired mouse

It is a type of DHCP attack where the attacker configures a fake DHCP server on the network to issue IP addresses to clients.

  • DHCT spoofing attack
  • DHCP spoofing attack

Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?

  • digital multimeter
  • cable tester
  • network analysis module
  • network analyzer

To verify the state of a GRE tunnel, use the show interface tunnel command.

  • True
  • False

It is a SPAN Terminology which refers to the traffic that leaves the switch.

  • [No Answer]

Internal BGP is the routing protocol used between routers in the same AS.

  • True
  • False

It is a queuing algorithm also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.

  • FIFA
  • FIFO

A purpose-built hardware solution for integrating cloud computing and data center management.

  • Cisco Application Centric Structure
  • Cisco Application Centric Infrastructure

Network traffic can be marked at both Layer 2 and Layer 3 for QoS..

  • True
  • False

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

  • True
  • False

Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.

  • 99
  • 75
  • 90
  • 85

DHCP _____ is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.

  • swooping
  • snooping

Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?

  • WFQ
  • FIFO
  • CBWFQ
  • FCFS

One of the new challenges associated with the rapid growth of the IoT is securing new devices with varying level of security.

  • False
  • True

One of the new challenges associated with the rapid growth of the IoT is improving the Internet connections from homes

  • False
  • True

Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic?

  • Ethernet WAN
  • dialup
  • ATM
  • ISDN BRI

VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.

  • False
  • True

A network architecture that virtualizes the network.

  • [No Answer]

What does the WFQ automated scheduling method stands for?

  • Weighted Fair Queuing
  • Heighted Fair Queuing

What happens when the memory queue of a device fills up and new network traffic is received?

  • The network device drops all traffic in the queue.
  • The network device sends the received traffic immediately.
  • The network device queues the received traffic while sending previously received traffic.
  • he network device will drop the arriving packets.

Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?

  • 172.16.2.1 to 172.16.3.254
  • 172.16.2.1 to 172.16.255.255
  • 172.16.2.0 to 172.16.3.255
  • 172.16.2.0 to 172.16.2.255