Answers to Assessment Test

  1. B. To allow for the PVST+ to operate, there’s a field inserted into the BPDU to accommodate the extended system ID so that PVST+ can have a root bridge configured on a per-STP instance. The extended system ID (VLAN ID) is a 12-bit field, and we can even see what this field is carrying via show spanning-tree command output. See Chapter 9 for more information.

  2. A. Cisco’s EtherChannel can bundle up to eight ports between switches to provide resiliency and more bandwidth between switches. See Chapter 9 for more information.

  3. B, C, E. All the ports on both sides of every link must be configured exactly the same between switches or it will not work. Speed, duplex, and allowed VLANs must match. See Chapter 15 for more information.

  4. C. 2100 boots the router into ROM monitor mode, 2101 loads the mini-IOS from ROM, and 2102 is the default and loads the IOS from flash. See Chapter 12 for more information.

  5. D. The show license udi command displays the unique device identifier (UDI) of 
the router, which comprises the product ID (PID) and serial number of the router. See Chapter 12 for more information.

  6. B. The show license feature command allows you to view the technology package licenses and feature licenses that are supported on your router along with several status variables related to software activation and licensing, both licensed and unlicensed features. See Chapter 12 for more information.

  7. D. DNA Center stores the network snapshot for one week.

  8. B. There are eight different trap levels. If you choose, for example level 3, level 0 through level 3 messages will be displayed. See Chapter 13 for more information.

  9. C. The Code Preview feature in can generate a simple code snippet for several programming languages so you can quickly add it into your script. See Chapter 21 for 
more information.

  10. B. There is no IPv6 default gateway listed in the output, which will be the link-local address of the router interface, sent to the host as a router advertisement. Until this host receives the router address, the host will communicate with IPv6 only on the local subnet. See Chapter 17 for more information.

  11. D. The command show ipv6 neighbors provides the ARP cache for on a router. See Chapter 17 for more information.

  12. A. If the state is STALE when the interface has not communicated within the neighbor reachable time frame, the next time the neighbor communicates, the state will be REACH. See Chapter 17 for more information.

  13. A, C. Puppet and Chef require you to install an agent on the node before the configuration server can manage it. See Chapter 23 for more information.

  14. B. Puppet is a Ruby-based configuration management tool that uses custom manifest files to configure devices. See Chapter 23 for more information.

  15. C. Chef is a Ruby-based configuration tool that uses cookbooks to apply configuration. See Chapter 23 for more information.

  16. B, D, E. In order for two OSPF routers to create an adjacency, the Hello and dead timers must match, and they must both be configured into the same area, as well as being in the same subnet. See Chapter 6 for more information.

  17. A. The process starts by sending out Hello packets. Every listening router will then add the originating router to the neighbor database. The responding routers will reply with all of their Hello information so that the originating router can add them to its own neighbor table. At this point, we will have reached the 2WAY state—only certain routers will advance beyond to this. See Chapter 6 for more information.

  18. B. The Command Runner is a useful tool for pushing show commands to devices and viewing the results. See Chapter 22 for more information.

  19. B. A fabric entirely consists of layer 3 only. See Chapter 22 for more information.

  20. B. Generic Routing Encapsulation (GRE) has no built-in security mechanisms. See 
Chapter 15 for more information.

  21. C. When traffic exceeds the allocated rate, the policer can take one of two actions. It can either drop traffic or re-mark it to another class of service. The new class usually has a higher drop probability. See Chapter 16 for more information.

  22. B. This can be a hard question if you don’t remember to invert the 7th bit of the first octet in the MAC address! Always look for the 7th bit when studying for the Cisco R/S, and when using eui-64, invert it. The eui-64 autoconfiguration then inserts an FF:FE in the middle of the 48-bit MAC address to create a unique IPv6 address. See Chapter 17 for more information.

  23. A. The NDP neighbor advertisement (NA) contains the MAC address. A neighbor solicitation (NS) was initially sent asking for the MAC address. See Chapter 17 for 
more information.

  24. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 17 for more information.

  25. A. To enable OSPFv3, you enable the protocol at the interface level, as with RIPng. The command string is area-id. It’s important to understand that area 0 and area 0.0.0.0 both describe area 0. See Chapter 17 for more information.

  26. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 13 for more information.

  27. B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256–254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254. See Chapter 3 for more information.

  28. C. The IP address is configured under a logical interface, called a management domain or VLAN 1, by default. See Chapter 8 for more information.

  29. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 3 for more information.

  30. C. An inside global address is considered to be the IP address of the host on the private network after translation. See Chapter 11 for more information.

  31. B. Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question, we need to see if access list 100 is configured correctly, if at all, so show access-list is the best answer. See Chapter 11 for more information.

  32. D. Layer 2 switching creates individual collision domains per port. See Chapter 7 for more information.

  33. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 13 for more information.

  34. B. To see the contents of all access lists, use the show access-lists command. See Chapter 10 for more information.

  35. C. VLANs break up broadcast domains at layer 2. See Chapter 8 for more information.

  36. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 12 for more information.

  37. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 2 for more information.

  38. A. Class A addressing provides 22 bits for host subnetting. Class B provides 16 bits, but only 14 are available for subnetting. Class C provides only 6 bits for subnetting. See Chapter 3 for more information.

  39. E. For the DNS method you need to create a A record for CISCO-CAPWAP-CONTROLLER that points to the WLC management IP.

  40. D. Switches send information about only one VLAN down a link unless it is configured as a trunk link. See Chapter 8 for more information.

  41. B, G. To enable OSPF, you must first start OSPF using a process ID. The number is irrelevant; just choose a number from 1 to 65,535 and you’re good to go. After you start the OSPF process, you must configure interfaces on which to activate OSPF using the network command with wildcards and specification of an area. Option F is wrong because there must be a space after the parameter area and before you list the area number. See Chapter 6 for more information.

  42. C. Ansible uses the ansible-doc command to look up a module and how to use it. See Chapter 23 for more information.

  43. B. At the moment of OSPF process startup, the highest IP address on any active interface will be the router ID (RID) of the router. If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically. See Chapter 6 for more information.

  44. C, D. VLAN Trunking Protocol (VTP) is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1q and ISL encapsulations are used to configure trunking on a port. See Chapter 8 for more information.

  45. D. WLANs default to silver queue, which effectively means no QoS is being utilized. See Chapter 20 for more information.

  46. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1 for more information.

  47. A, C. Standard and extended access control lists (ACLs) are used to configure security on a router. See Chapter 10 for more information.

  48. E. TACACS+ uses port TCP 49 for all operations. See Chapter 20 for more information.

  49. B. The command to back up the configuration on a router is copy running-config startup-config. See Chapter 12 for more information.

  50. C. IEEE 802.3ab is the standard for 1 Gbps on twisted-pair. See Chapter 1 for more information.

  51. C. User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service. See Chapter 2 for more information.

  52. A. The resource section of the URI points to the specific. See Chapter 21 for more information.

  53. C. The show ip interface command will show you if any interfaces have an outbound or inbound access list set. See Chapter 12 for more information.

  54. C. Unlike ISL, which encapsulates the frame with control information, 802.1q inserts an 802.1q field along with tag control information. See Chapter 8 for more information.

  55. C. The PDU encapsulation method defines how data is encoded as it goes through each layer of the TCP/IP model. Data is segmented at the Transport later, packets created at the Network layer, frames at the Data Link layer, and finally, the Physical layer encodes the 1s and 0s into a digital signal. See Chapter 1 for more information.

  56. A. With a multilayer switch, enable IP routing and create one logical interface for each VLAN using the interface vlan number command and you’re now doing inter-VLAN routing on the backplane of the switch! See Chapter 8 for more information.

  57. C. The 802.11 “open” authentication support has been replaced with Opportunistic Wireless Encryption (OWE) enhancement, which is an enhancement, not a mandatory certified setting. See Chapter 19 for more information.

  58. A, C. The two AP-Modes listed that can serve wireless traffic are local and flexconnect. See Chapter 20 for more information.

  59. D. The token is used to authenticate you to the restful API service. Restful API does not support authorization. See Chapter 21 for more information.

  60. C. The Code Preview feature in can generate a simple code snippet for several programming languages so you can quickly add it into your script. See Chapter 22 for more information.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.24.134