option
Cuestiones
ayuda
daypo
buscar.php

CCNA3 parte 2

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
CCNA3 parte 2

Descripción:
preguntas varias

Fecha de Creación: 2023/01/15

Categoría: Otros

Número Preguntas: 66

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?. to make repeated guesses in order to crack a password. to capture and analyze packets within traditional Ethernet LANs or WLANs. to probe and test the robustness of a firewall by using specially created forged packets.

What are two syntax rules for writing a JSON array? (Choose two.). Each value in the array is separated by a comma. Values are enclosed in square brackets. The array can include only one value type. A space must separate each value in the array. A semicolon separates the key and list of values.

What is a characteristic of a Trojan horse as it relates to network security?. Malware is contained in a seemingly legitimate executable program. Extreme quantities of data are sent to a particular network device interface. Too much information is destined for a particular memory block, causing additional memory areas to be affecte.

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?. DHCP spoofing. TCP SYN flood. ARP cache poisoning. DNS tunneling.

A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?. data integrity. non-repudiation. origin authentication. data confidentiality.

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?. to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network. to detect any evidence of a hack or malware in a computer or network. to probe and test the robustness of a firewall by using specially created forged packets. to capture and analyze packets within traditional Ethernet LANs or WLANs.

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?. 0.0.3.255. 0.0.15.255. 0.0.7.255. 0.0.1.255.

Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?​. 65. 128. 74. 782.

What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?. to activate the OSPF neighboring process. to influence the DR/BDR election process. to provide a backdoor for connectivity during the convergence process. to streamline and speed up the convergence process.

An ACL is applied inbound on a router interface. The ACL consists of a single entry access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?. permitted. denied.

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​. The spine and leaf switches are always linked through core switches. The spine switches attach to the leaf switches and attach to each other for redundancy. The leaf switches always attach to the spines and they are interlinked through a trunk line. The leaf switches always attach to the spines, but they never attach to each other.

Which two scenarios would result in a duplex mismatch? (Choose two.). connecting a device with autonegotiation to another that is manually set to full-duplex. starting and stopping a router interface during a normal operation. connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps. configuring dynamic routing incorrectly. manually setting the two connected devices to different duplex modes.

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?. authenticates a packet by a string match of the username or community string. authenticates a packet by using either the HMAC with MD5 method or the SHA method. authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms. authenticates a packet by using the SHA algorithm only.

What are two types of attacks used on DNS open resolvers? (Choose two.). amplification and reflection. resource utilization. fast flux. ARP poisoning. cushioning.

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet . If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied? access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet . case1. denied. case1. permitted. case2. denied. case2. permited.

Which type of resources are required for a Type 1 hypervisor?. a dedicated VLAN. a management console. a host operating system.

In JSON, what is held within square brackets [ ]?. nested values. key/value pairs. an object. an array.

What are three components used in the query portion of a typical RESTful API request? (Choose three.). resources. protocol. API server. format. key. parameters.

A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?. top-down. bottom-up. divide-and-conquer. substitution.

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?. MD5. AES. IPsec. ESP.

Which statement describes a characteristic of Cisco Catalyst 2960 switches?. They are best used as distribution layer switches. New Cisco Catalyst 2960-C switches support PoE pass-through. They are modular switches. They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

Which component of the ACI architecture translates application policies into network programming?. the hypervisor​. the Application Policy Infrastructure Controller. the Nexus 9000 switch. the Application Network Profile endpoints.

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.). device type. cable specification. interface identifier. OS/IOS version. connection type. cable type and identifier.

Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?v. The NAT pool has been exhausted. The wrong netmask was used on the NAT pool. Access-list 1 has not been configured properly. The inside and outside interfaces have been configured backwards.

What are two benefits of using SNMP traps? (Choose two.). They eliminate the need for some periodic polling requests. They reduce the load on network and agent resources. They limit access for management systems only. They can provide statistics on TCP/IP packets that flow through Cisco devices. They can passively listen for exported NetFlow datagrams.

In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.). connect users to the network. provide a high-speed network backbone. connect remote networks. provide Power over Ethernet to devices. provide data traffic security.

Which two statements describe the use of asymmetric algorithms? (Choose two.). Public and private keys may be used interchangeably. If a public key is used to encrypt the data, a public key must be used to decrypt the data. If a private key is used to encrypt the data, a public key must be used to decrypt the data. If a public key is used to encrypt the data, a private key must be used to decrypt the data. If a private key is used to encrypt the data, a private key must be used to decrypt the data.

Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?. Trust Boundary 4. Trust Boundary 3. Trust Boundary 1. Trust Boundary 2.

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.). reduced costs. decreased number of critical points of failure. increased flexibility. increased bandwidth availability. increased network management options.

What are two purposes of launching a reconnaissance attack on a network? (Choose two.). to scan for accessibility. to retrieve and modify data. to gather information about the network and devices. to prevent other users from accessing the system. to escalate access privileges.

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?. botnet. spyware. virus. rootkit.

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns . If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?. permitted. denied.

Refer to the exhibit. From which location did this router load the IOS?. flash memory. NVRAM?. RAM. ROM. a TFTP server?.

Refer to the exhibit. Which data format is used to represent the data for network automation applications?. XML. YAML. HTML. JSON.

What QoS step must occur before packets can be marked?. classifying. shaping. queuing. policing.

What is the main function of a hypervisor?. It is used to create and manage multiple VM instances on a host machine. It is a device that filters and checks security credentials. It is a device that synchronizes a group of sensors. It is software used to coordinate and prepare data for analysis. It is used by ISPs to monitor cloud computing resources.

A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?. Frame Relay. Ethernet WAN. VSAT. ISDN.

Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?. traffic shaping. weighted random early detection. classification and marking. traffic policing.

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns . If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?. denied. permitted.

Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?. defines which addresses are allowed into the router. defines which addresses can be translated. defines which addresses are assigned to a NAT pool. defines which addresses are allowed out of the router.

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?. 12. 4. 8. 16. 6.

Refer to the exhibit. An administrator first configured an extended ACL as shown by the output of the show access-lists command. The administrator then edited this access-list by issuing the commands below. Router(config)# ip access-list extended 101 Router(config-ext-nacl)# no 20 Router(config-ext-nacl)# 5 permit tcp any any eq 22 Router(config-ext-nacl)# 20 deny udp any any Which two conclusions can be drawn from this new configuration?​ (Choose two.). TFTP packets will be permitted.​. Ping packets will be permitted. Telnet packets will be permitted. SSH packets will be permitted. All TCP and UDP packets will be denied.​.

Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?. a less-structured approach based on an educated guess. an approach comparing working and nonworking components to spot significant differences. a structured approach starting with the physical layer and moving up through the layers of the OSI model until the cause of the problem is identified. an approach that starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified.

Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access. What is the best ACL type and placement to use in this situation?. extended ACL outbound on R2 WAN interface towards the internet. standard ACL outbound on R2 WAN interface towards the internet. standard ACL outbound on R2 S0/0/0. extended ACLs inbound on R1 G0/0 and G0/1.

Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The administrator tries to ping a server on the Internet from PC-A and collects the debugs that are shown in the exhibit. Based on this output, what is most likely the cause of the problem?. The inside and outside NAT interlaces have been configured backwards. The inside global address is not on the same subnet as the ISP. The address on Fa0/0 should be 64.100.0.1. The NAT source access list matches the wrong address range.

Why is QoS an important issue in a converged network that combines voice, video, and data communications?. Data communications must be given the first priority. Voice and video communications are more sensitive to latency. Legacy equipment is unable to transmit voice and video without QoS. Data communications are sensitive to jitter.

Which statement describes a VPN?. VPNs use logical connections to create public networks through the Internet. VPNs use open source virtualization software to create the tunnel through the Internet. VPNs use dedicated physical connections to transfer data between remote users. VPNs use virtual connections to create a private network through a public network.

In which OSPF state is the DR/BDR election conducted?. ExStart. Init. Two-Way. Exchange.

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?. Cisco Secure Mobility Clientless SSL VPN. Frame Relay. Remote access VPN using IPsec. Cisco AnyConnect Secure Mobility Client with SSL. site-to-site VPN.

What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?. loading. established. full. two-way.

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?. Router R3 will become the DR and router R1 will become the BDR. Router R4 will become the DR and router R3 will become the BDR. Router R1 will become the DR and router R2 will become the BDR. Router R3 will become the DR and router R2 will become the BDR.

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?. Router R2 will become the DR and router R4 will become the BDR. Router R1 will become the DR and router R3 will become the BDR. Router R4 will become the DR and router R3 will become the BDR. Router R3 will become the DR and router R2 will become the BDR.

Which type of server would be used to keep a historical record of messages from monitored network devices?. DNS. print. DHCP. syslog. authentication.

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.). packet addressing. delay. jitter. packet routing. link speed.

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?. Determine ownership. Determine the symptoms. Narrow the scope. Document the symptoms. Gather information.

What protocol sends periodic advertisements between connected Cisco devices in order to learn device name, IOS version, and the number and type of interfaces?. CDP. SNMP. NTP. LLDP.

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?. 0.0.0.127. 0.0.0.31. 0.0.3.255. 0.0.0.63.

Refer to the exhibit. An administrator configures the following ACL in order to prevent devices on the 192.168.1.0 subnet from accessing the server at 10.1.1.5: access-list 100 deny ip 192.168.1.0 0.0.0.255 host 10.1.1.5 access-list 100 permit ip any any Where should the administrator place this ACL for the most efficient use of network resources?. inbound on router A Fa0/0. outbound on router B Fa0/0. outbound on router A Fa0/1. inbound on router B Fa0/1.

Which type of OSPFv2 packet is used to forward OSPF link change information?. link-state acknowledgment. link-state update. hello. database description.

What protocol synchronizes with a private master clock or with a publicly available server on the internet?. MPLS. CBWFQ. TFTP. NTP.

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?. dynamic multipoint VPN. SSL VPN. IPsec virtual tunnel interface. GRE over IPsec.

An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?. router(config-router)# network 10.1.0.0 0.0.255.255 area 0. router(config-router)# network 10.1.0.0 0.0.15.255 area 0. router(config-router)# network 10.1.0.0 255.255.255.0 area 0. router(config-router)# network 10.1.0.0 0.0.0.0 area 0.

Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?. router ospf 1 network 192.168.10.0 area 0. router ospf 1 network 192.168.10.0. router ospf 1 network 192.168.10.64 255.255.255.192 network 192.168.10.192 255.255.255.252. router ospf 1 network 192.168.10.64 0.0.0.63 area 0 network 192.168.10.192 0.0.0.3 area 0.

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?. 0.0.7.255. 0.0.1.255. 0.0.3.255. 0.0.15.255.

How does virtualization help with disaster recovery within a data center?. improvement of business practices. supply of consistent air flow. support of live migration. guarantee of power.

Which statement accurately describes a characteristic of IPsec?. IPsec works at the application layer and protects all application data. IPsec is a framework of open standards that relies on existing algorithms.

Denunciar Test