45gghu 1. Which of the following Ethernet standards is referred to as the Fast Ethernet media? 10BASE-T100BASE-T1000BASE-T10GBASE-TQuestion 1 of 50 2. Which ethernet address(s) can send one frame to multiple devices on the local area network? Anycast addressBroadcast addressUnicast addressMulticast addressQuestion 2 of 50 3. Which of the following helps the router route the IP packet? Source IP addressDestination IP addressSource MAC addressDestination MAC addressQuestion 3 of 50 4. You have created an EtherChannel between two ports on a switch. Which of the following parameters must be same on both the ports? SpeedDuplexDTP negotiation settingsEncapsulationQuestion 4 of 50 5. You have installed new Cisco 3750 switch in your network. Which VLAN trunking protocol (VTP) mode will it operate by default? ClientServerTransparentDynamicQuestion 5 of 50 6. You have created 20 VLANs on core switch of your network. Now you want to copy this VLAN configuration to other switches in the network with less effort. Which protocol supports this? VTPRIPSTPCDPQuestion 6 of 50 7. VRRP supports IPv4 only TrueFalseQuestion 7 of 50 8. What is the first step in configuring static NAT? Define public and private IP addresses Define IP address access listDefine inside and outside interfacesConfigure NAT overloadQuestion 8 of 50 9. What are the two correct statements about NTP? NTP uses UDP port 123In case of multiple NTP servers, the preferred server is the one with highest stratum valueNTP overrides local configured timeNTP uses TCP port 123Question 9 of 50 10. You have configured NTP authentication and you notice some authentication failed logged messages. Which debug command would help troubleshoot the issue? Debug ntp packetsDebug ntp syncDebug ntp validityDebug ntp eventsQuestion 10 of 50 11. Which of the following two features are added to SNMPv3 over the previous versions? EncryptionManagementCompressionAuthenticationQuestion 11 of 50 12. You want to copy your router running configuration to TFTP server. Which command do you use to accomplish the task? Router#copy tftp: running-configRouter#copy running-config tftp:Router#(config)copy tftp: 192.168.0.1 running-configRouter#(config)copy running-config tftp:Question 12 of 50 13. TFTP is a TCP and connection-oriented application layer protocol TrueFalseQuestion 13 of 50 14. What are the advantages of using an external syslog server for saving the router's log messages? Log messages are stored at a centralized repositoryExternal server has large storage spaceIf router's internal log messages are cleared, you would still be able to access logs on the syslog serverAll above option are correctQuestion 14 of 50 15. Syslog logging is enabled by default on a Cisco router TrueFalseQuestion 15 of 50 16. You have configured a DHCP scope and DHCP client to get an IP address dynamically, but you get an IP conflict warning message under the messages log. What could be the issue? DHCP scope is wrongly configuredConflicting IP addresses are not excluded from DHCP scopeDHCP relay command is configuredDHCP snooping is configuredQuestion 16 of 50 17. DHCP relay is required whenever the DHCP server is not in the same subnet as DHCP client TrueFalseQuestion 17 of 50 18. Which of the following commands would guarantee your switch to be the root bridge for VLAN 10? spanning-tree vlan 10 priority 0spanning-tree vlan 10 priority 16384spanning-tree vlan 10 root guaranteespanning-tree vlan 10 root secondaryQuestion 18 of 50 19. If four switches are connected in a ring topology, with default settings, which of these switches becomes the root Bridge? Switch with highest bridge prioritySwitch with lowest bridge priorityDefault setting means the root bridge is not electedSwitch with lowest MAC addressQuestion 19 of 50 20. What do you conclude from a route as shown below S is a code for the static route0.0.0.0/0 is a destination network known to a routerL is a code for the IS-IS level-1 route[1/0] represents [administrative distance/metric]Question 20 of 50 21. You have two static routes configured as shown below. The route with metric 254 is a floating static route. Why floating route is used? A floating route is a static route used for unknown networksA floating route is a backup route specified with an administrative distance higher than the primary routeA floating route is a static route used for floating networksA floating route is a backup route specified with an administrative distance lower than the primary routeQuestion 21 of 50 22. Under OSPF process you have configured one interface as a passive interface. What is the effect of configuring an interface GigabitEthernet0/0 as passive? OSPF stops sending Hello messages on GigabitEthernet0/0 interfaceOSPF stops sending updates on GigabitEthernet0/0 interfaceOSPF does not form adjacency over GigabitEthernet0/0 interfaceOSPF forms adjacency over GigabitEthernet0/0 interfaceQuestion 22 of 50 23. Which of the following order does a router follow when choosing a router-id? Highest non-Loopback IP Highest Loopback IP address Manually configured router ID Question 23 of 50 24. You have configured NAT using following command on a router. This type of NAT is called? Dynamic NATStatic NATPAT or NAT OverloadSimple NATQuestion 24 of 50 25. To enable SSH on a device, Which of the following commands do you use to generate the rsa key? crypto key generate rsa generate crypto key rsa generate key rsacrypto generate key rsaQuestion 25 of 50 26. Which of the following technologies do you use to enable users to connect to an enterprise network while travelling? GRE over IPSEC VPNRemote access VPNDMVPNIt's not possible to connect to enterprise in this scenarioQuestion 26 of 50 27. Which of the following are advantages of controller-based networks versus traditional networks? The control and the data planes on each device are separated Control plane is hardware-basedNetwork devices function independently Control plane is software-basedQuestion 27 of 50 28. In a Cisco Software-Defined Access network, you have a GRE over IPsec tunnel between two different networks. Which term refers to the functions that deliver traffic across this network? FabricLISPUnderlayOverlayQuestion 28 of 50 29. Match the following statements about standard and extended access-listStandard access list It can filter traffic based on the source as well as the destination IP address UnselectIt can filter traffic based only on source IP addressUnselectExtended access list It can filter traffic based on the source as well as the destination IP address UnselectIt can filter traffic based only on source IP addressUnselectQuestion 29 of 50 30. In an SDN architecture with switches and a centralized controller, data plane functions are found on the controller but not on the switches TrueFalseQuestion 30 of 50 31. CRUD represents the elementary functions performed on data. Choose the correctly matched CRUD action to HTTP verb pairsCRUD Update HTTP DELETEUnselectHTTP POSTUnselectHTTP PUTUnselectHTTP GETUnselectCRUD Create HTTP DELETEUnselectHTTP POSTUnselectHTTP PUTUnselectHTTP GETUnselectCRUD Retrieve HTTP DELETEUnselectHTTP POSTUnselectHTTP PUTUnselectHTTP GETUnselectCRUD Delete HTTP DELETEUnselectHTTP POSTUnselectHTTP PUTUnselectHTTP GETUnselectQuestion 31 of 50 32. Match the NAT type with the correct usageStatic NAT used to do a one-to-one mapping between an private address and an public addressUnselectused to do many to one mapping between multiple private addresses and a single public addressUnselectused to do many to many mapping between multiple private addresses and multiple public addressesUnselectPAT used to do a one-to-one mapping between an private address and an public addressUnselectused to do many to one mapping between multiple private addresses and a single public addressUnselectused to do many to many mapping between multiple private addresses and multiple public addressesUnselectDynamic NAT used to do a one-to-one mapping between an private address and an public addressUnselectused to do many to one mapping between multiple private addresses and a single public addressUnselectused to do many to many mapping between multiple private addresses and multiple public addressesUnselectQuestion 32 of 50 33. Match the NTP command with the correct descriptionNtp peer ip-address This is to configure a peer to peer relationshipUnselectThis is to configure interface for source addressUnselectThis is to configure a device as NTP clientUnselectThis is to configure a device as NTP serverUnselectNtp server ip-address This is to configure a peer to peer relationshipUnselectThis is to configure interface for source addressUnselectThis is to configure a device as NTP clientUnselectThis is to configure a device as NTP serverUnselectNTP source ip-address This is to configure a peer to peer relationshipUnselectThis is to configure interface for source addressUnselectThis is to configure a device as NTP clientUnselectThis is to configure a device as NTP serverUnselectNTP master ip-address This is to configure a peer to peer relationshipUnselectThis is to configure interface for source addressUnselectThis is to configure a device as NTP clientUnselectThis is to configure a device as NTP serverUnselectQuestion 33 of 50 34. Which of the following ports does SNMP use? 161 – UDP161 – TCP141-TCP143- UDPQuestion 34 of 50 35. What is the name of the layer 2 security feature that limits the number of mac-addresses learned on a switch port MAC filteringARP inspectionMAC securityPort-securityQuestion 35 of 50 36. First In First Out (FIFO) has no concept of priority or classes of traffic and thus doesn't provide Quality of Service TrueFalseQuestion 36 of 50 37. Which QoS mechanism uses buffer management to allow TCP traffic to throttle back before tail drop occurs? PolicingBest Effort (BE)Weighted Random Early Detection (WRED)FIFOQuestion 37 of 50 38. Which of these are non-overlapping channels in 2.4 GHz band? 12116Question 38 of 50 39. Match the wireless access point modes with the correct functionalityFlexConnect This mode allows the network administrator to monitor and eliminate rogue devices in the networkUnselectThis mode is used when AP and WLC are at different locationsUnselectThis mode is mainly used when AP and WLC are in the same building.UnselectLocal This mode allows the network administrator to monitor and eliminate rogue devices in the networkUnselectThis mode is used when AP and WLC are at different locationsUnselectThis mode is mainly used when AP and WLC are in the same building.UnselectRogue detector This mode allows the network administrator to monitor and eliminate rogue devices in the networkUnselectThis mode is used when AP and WLC are at different locationsUnselectThis mode is mainly used when AP and WLC are in the same building.UnselectQuestion 39 of 50 40. Which of the following architecture model helps configure a wireless LAN controller (WLC) as a centralized device to manage all wireless access points? Ad HocSplit MACLWAPPLocal MACQuestion 40 of 50 41. Which of the following term refers to the time it takes by a packet to travel from source to destination? BandwidthDelayLossRound-trip delayQuestion 41 of 50 42. Match the QoS mechanism with the correct usageShaping Same priority is applied to all packets and delivery of packets isn’t guaranteedUnselectIt does not use buffer and typically re-marks traffic that exceeds the specified rateUnselectIt won’t drop excess traffic but would buffer it to slow down the transmissionUnselectPolicing Same priority is applied to all packets and delivery of packets isn’t guaranteedUnselectIt does not use buffer and typically re-marks traffic that exceeds the specified rateUnselectIt won’t drop excess traffic but would buffer it to slow down the transmissionUnselectBest effort Same priority is applied to all packets and delivery of packets isn’t guaranteedUnselectIt does not use buffer and typically re-marks traffic that exceeds the specified rateUnselectIt won’t drop excess traffic but would buffer it to slow down the transmissionUnselectQuestion 42 of 50 43. Which command you can use to enable gateway load balancing protocol (GLBP) on an interface? glbpstandby mode glbpglbp group_number ip ip_addressip glbp enableQuestion 43 of 50 44. RSMLT (Routed Split Multi-link Trunking) is part of Cisco First Hop Redundancy Protocols (FHRPs) TrueFalseQuestion 44 of 50 45. You have configured a cisco router using the following NTP command:Router(config)#ntp master 3What does this command do? The router acts as an authoritative NTP master at stratum 3The router acts as an authoritative NTP master with a priority 3The router acts as an NTP master for 3 minutes onlyThe router acts as an authoritative NTP master with 3 NTP peersQuestion 45 of 50 46. Which of the following two features are added to SNMPv3 over the previous versions? 64-bit counterEncryptionManagementCompressionQuestion 46 of 50 47. VLAN trunking protocol (VTP) version 3 introduced which of the following three features Password encryptionCompatibility with an extended range of VLANsProtection against the unwanted overwriting of the VLAN databasePropagate VLANs 1 to 1005Question 47 of 50 48. Which command sets the interval at which a device sends Link Layer Discovery Protocol (LLDP) advertisements to its neighbours? Lldp holdtimeLldp receiveLldp timerLldp transmitQuestion 48 of 50 49. Which of the following is the correct format for creating IPv6 default route? ipv6 route 0/0 exit-interfaceipv6 route 0/0 2001:1212:1212::2ip route ::/0 2001:1212:1212::2ipv6 route ::/0 2001:1212:1212::2Question 49 of 50 50. Match the Administrative Distance (AD) values with the correct protocols.OSPF 20Unselect170Unselect110Unselect90UnselectEIGRP internal routes 20Unselect170Unselect110Unselect90UnselectEIGRP external routes 20Unselect170Unselect110Unselect90UnselectBGP 20Unselect170Unselect110Unselect90UnselectQuestion 50 of 50 Loading...