Cuestionario 3
Cuestionario 3
Version 2
Version 3
Both
2. Which SNMP version provides services for security models?
Version 2
Version 3
Both
3. Which SNMP version does not provide encrypted management messages?
Version 2
Version 3
Both
4. Which SNMP version is supported by Cisco IOS software?
Version 2
Version 3
Both
5. Which SNMP version includes expanded error codes with types?
Version 2
Version 3
Both
6. Which SNMP version uses community-based forms of security?
Version 2
Version 3
Both
7. Which SNMP version is used for interoperability and includes message integrity reporting?
Version 2
Version 3
Both
Error
Informational
Warning
Debugging
2. Refer to the syslog output. What is the mnemonic for this syslog message?
IFMGR
NO_IFINDEX_FILE
ifIndex-table
3. Refer to the syslog output. What is the syslog reporting facility?
IFMGR
NO_IFINDEX_FILE
IFMGR-7
ifIndex-table
1. What are two reasons for an administrator to issue the copy running-config tftp command
on a switch or router? (Choose two.)
community strings
source validation
packet encryption
message integrity
4. What command must be issued on a Cisco router that will serve as an authoritative NTP
server?
ntp master 1
NetFlow
SNMP
NTP
syslog
6. Which statement describes a syslog message severity level?
A syslog alarm at the severity level 4 and higher is sent to an external syslog server by default.
A syslog alarm with a severity level of 7 indicates an emergency situation that can render the
system unusable.
a computer loaded with management software and used by an administrator to monitor a network
Commonly known community strings should be used when configuring secure SNMP.
A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in
plaintext.
SNMP read-only community strings can be used to get information from an SNMP-enabled device.
SNMP read-write community strings can be used to set information on an SNMP-enabled device.
9. A network administrator issues the copy tftp running-config command on a router. What is
the administrator trying to achieve?
copy the configuration file from the RAM of the router to the TFTP server
copy the configuration file from the TFTP server to the NVRAM of the router
copy the configuration file from the TFTP server to the RAM of the router
copy the configuration file from the NVRAM of the router to the TFTP server
10. What is a characteristic of the MIB?
A separate MIB tree exists for any given device in the network.
to display line status and other information about directly connected Cisco devices
to display device ID and other information about directly connected Cisco devices
to display routing table and other information about directly connected Cisco devices
14. What are SNMP trap messages?
messages that are used by the NMS to change configuration variables in the agent device
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the
network
messages that are sent periodically by the NMS to the SNMP agents that reside on managed
devices to query the device for data
messages that are used by the NMS to query the device for data
Hierarchical
Modular
Resilient
Flexible
2. Which characteristic of a network allows it to expand and provide on-demand services?
Hierarchical
Modularity
Resilient
Flexible
3. Which term describes the ability of a network to use all available network resources and to
provide data load sharing?
Hierarchical
Modular
Resilient
Flexible
4. Which network layer provides fault isolation and high-speed backbone switch connectivity?
Core
Distribution
Access
5. Which network layer provides direct, switched network connectivity to the user?
Core
Distribution
Access
6. Which network layer integrates with the backbone and users to provide intelligent switching,
routing, and security?
Core
Distribution
Access
1. Which three recommendations may be included in a network design strategy that is focused
on scalability? (Choose three.)
Use Layer 2 devices to filter and reduce network traffic in the core.
Choose routers or multilayer switches to limit broadcasts and filter other undesirable traffic from the
network.
Use expandable, modular equipment, or clustered devices that can be easily upgraded to increase
capabilities.
Combine the access and distribution layer for easier access and limit the size of the failure domain.
2. True or false? OSPF is well-suited for larger networks because it can be deployed using a
hierarchical design.
True
False
3. What are three important features that should be considered for implementation in a well-
designed, scalable network? (Choose three.)
static routes
redundant links
multiple links
1. Which category of switch is used to aggregate traffic at the edge of the network?
campus LAN switches
cloud-managed switches
modular
fixed configuration
virtual
stackable
3. This is the term used to describe switches that can be interconnected and managed as one
larger single switch.
modular
stackable
cloud-managed
multilayer
4. This is the term used to describe the number of ports available on a single switch.
speed
scalability
density
modularity
5. This is the term used to describe how much data a switch can process per second.
forwarding rate
power
reliability
wire speed
6. Which type of switch supports routing protocols and can forward IP packets at close to Layer
2 forwarding rates?
modular
stackable
cloud-managed
Multilayer
1. This type of router provides fast performance with high security for data centers, campus,
and branch networks.
branch routers
industrial routers
2. This type of router provides end-to-end delivery of subscriber services.
branch routers
industrial routers
3. This type of router provides simple network configuration and management for LANs and
WANs.
branch routers
industrial routers
4. This type of router is designed to provide enterprise-class features in rugged and harsh
environments.
branch routers
industrial routers
5. This type of router delivers next-generation internet experience across all devices and
locations.
branch routers
industrial routers
extended star
dual ring
mesh
bus
2. How much traffic is a 48-port gigabit switch capable of switching when operating at full wire
speed?
1 Gb/s, because data can only be forwarded from one port at a time
48 Gb/s, by providing full bandwidth to each port
user domain
failure domain
collision domain
broadcast domain
4. Which type of router would an enterprise use to allow customers to access content anytime
and anyplace, regardless of whether they are at home or work?
branch routers
modular routers
5. Which design feature will limit the size of a failure domain in an enterprise network?
the purchase of enterprise equipment that is designed for large traffic volume
fault isolation
network access to the user
7. What is the function of PoE pass-through?
allows switches, phones, and wireless access points to receive power over existing Ethernet cables
from an upstream switch
allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops
allows multiple physical switch ports to be aggregated together and act as a single logical link to
increase bandwidth on trunk links
allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by
bypassing the CPU
8. Which function is supplied by the access layer in a three-layer network design?
high-speed connectivity
routing
backbone connectivity
network access
application of policies
9. Which action should be taken when planning for redundancy on a hierarchical network
design?
Purchase backup equipment for every network device at the distribution layer.
10. What is a collapsed core in a network design?
data link
network access
network
access
core
12. Which technology is required when switched networks are designed to include redundant
links?
link aggregation
virtual LANs
EtherChannel
VLANs
subinterfaces
trunk ports
14. Which statement describes a characteristic of Cisco Catalyst 2960 switches?
implementing redundancy
implementing EtherChannel
ip topology
logical topology
physical topology
port topology
2. Which document could be referenced to identify the OS on a server?
End-system Documentation
True
False
5. Which command could be used to get detailed information about directly connected Cisco
neighbor devices?
show ip interface
show ip route
show version
1. Which option lists the three troubleshooting stages in the correct order?
Analyze information
Propose Hypothesis
Test hypothesis
3. Which are recommendations to be used when communicate with a user?
show interface
show ip protocols
show protocols
show version
5. What is the highest OSI layer that should be considered when troubleshooting routers and
Layer 3 switches?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 7
6. Which structured troubleshooting method should be used when a cabling problem is
suspected?
1. Which of these is an on-line network device vendor resource that can be used as a source of
information?
Baselining tool
Knowledge base
Protocol analyzer
2. Which tool is useful to investigate packet content while flowing through the network?
Baselining tool
Knowledge base
Protocol analyzer
3. Which hardware troubleshooting tool is a multifunctional handheld device used to test and
certify copper and fiber cables for different services and standards?
Cable Analyzer
Cable Tester
Digital Multimeters
1. Which OSI layer are you troubleshooting when the cause of network transmission errors is
due to late collisions, short frames, and jabber?
Application
Data link
Network
Physical
Transport
2. Which OSI layer are you troubleshooting when investigating a spanning-tree loop?
Application
Data link
Network
Physical
Transport
3. Which OSI layer are you troubleshooting when investigating a routing protocol loop?
Application
Data link
Network
Physical
Transport
4. Which OSI layer are you troubleshooting when investigating an extended ACL related
problem?
Application
Data link
Network
Physical
Transport
5. Which OSI layer are you troubleshooting when investigating a DNS related problem?
Application
Data link
Network
Physical
Transport
6. Which IOS command can be used to test if other network protocols are working?
ping
ssh
telnet
Traceroute
top-down
divide-and-conquer
bottom-up
3. A computer technician performed a number of actions to correct a problem. Some actions
did not solve the problem, but eventually a solution was found. What should be documented?
only the failed attempts, so that future technicians will know what not to try
4. A network engineer is troubleshooting a network problem and can successfully ping between
two devices. However, Telnet between the same two devices does not work. Which OSI layers
should the administrator investigate next?
digital multimeter
cable tester
8. Which troubleshooting software is an example of a network management system tool?
WhatsUp Gold
CyberGauge
LANsurveyor
Wireshark
9. What is the purpose of establishing a network baseline?
documenting symptoms
determining ownership
11. A company is setting up a web site with SSL technology to protect the authentication
credentials required to access the web site. A network engineer needs to verify that the setup is
correct and that the authentication is indeed encrypted. Which tool should be used?
protocol analyzer
cable analyzer
fault-management tool
baselining tool
12. When should a network performance baseline be measured?
The link between the switch to which the PC connects and the default gateway router is down.
The switch port to which the PC connects has an incorrect VLAN configured.
14. A technician installed a network adapter in a computer and wants to test network
connectivity. The ping command can receive responses from workstations on the same subnet but
not from remote workstations. What could be causing the problem?
1. Which cloud service provides programmers access to the development tool and services
used to deliver applications?
SaaS
PaaS
IaaS
2. Which cloud service provides users with access to services such as email, communications,
and Office 365 delivered over the internet?
SaaS
PaaS
IaaS
3. Which cloud service provides IT managers with access to network equipment, virtualized
services, and a supporting network infrastructure?
SaaS
PaaS
IaaS
4. Which cloud model represents two or more clouds where each part remains a distinctive
object, but both are connected using a single architecture?
public cloud
private cloud
hybrid cloud
community cloud
5. Which cloud model is used to meet the needs of a specific industry, such as healthcare or
media?
public cloud
private cloud
hybrid cloud
community cloud
web application
virtualization
dedicate servers
firmware
2. What device uses all the RAM, processing power, and hard drive space devoted to one
service?
virtual machine
Type 1 hypervisor
dedicated server
virtualized server
3. Which technology is a program, firmware, or hardware that adds an abstraction layer on top
of the physical hardware?
web application
virtualization
dedicated Server
hypervisor
4. What are the major advantages of virtualization? (Choose three)
requires less equipment
less abstraction
faster provisioning
Type 2 Hypervisor
web applications
virtualization
dedicated servers
1. True or False. A Type 1 hypervisor is installed on top of the existing OS and is called the
hosted approach.
True
False
2. True of False. A Type 1 hypervisor requires a management console to manage the
hypervisor.
True
False
3. True or False. Management consoles prevent server over allocation.
True
False
4. True of False. East-West traffic is exchanged between virtual servers in the same data
center.
True
False
1. Which characteristic best describes the control plane of a networking device? (Choose
three.)
This plane is typically made up of a switch fabric connecting the various ports on a device.
3. True of False. A network administrator accesses the control plane to configure a device.
True
False
4. This network architecture offers a new approach to network administration and management
that seeks to simplify and streamline the administration process.
network virtualization
SDN
Cisco ACI
centralized controller
5. This is a logical entity that enables network administrators to manage and dictate how the
data plane of switches and routers should handle network traffic.
control plane
data plane
VM
SDN controller
6. This is a standardized request from the SDN controller to define the behavior of the data
plane.
North-South traffic
Northbound APIs
East-West traffic
Southbound APIs
1. This is a table that matches incoming packets to a particular flow and specifies the functions
that are to be performed on the packet.
neighbor table
routing table
flow table
ARP table
meter table
2. This is a table that triggers a variety of performance-related actions on a flow including the
ability to rate-limit the traffic.
neighbor table
routing table
flow table
ARP table
meter table
3. This type of SDN, a centralized location is responsible for managing devices throughout the
network.
device-based SDN
controller-based SDN
policy-based SDN
4. In this type of SDN, the devices are programmable by applications running on the device
itself or on a server in the network.
device-based SDN
controller-based SDN
Policy-based SDN
5. This type of SDN uses built-in applications that automate advanced configuration tasks via a
guided workflow and user-friendly GUI. No programming skills are required.
device-based SDN
controller-based SDN
policy-based SDN
1. A company uses a cloud-based payroll system. Which cloud computing technology is this
company using?
control plane
data plane
adjacency table
IEEE 802.1aq
OpenStack
OpenFlow
5. Which two technologies are core components of Cisco ACI architecture? (Choose two.)
IaaS
PaaS
SaaS
7. Which services are provided by a private cloud?
Each data flow through the network must be approved by the SDN controller first.
The SDN controller routes a data flow first and the data plane will use policies to permit or deny the
flow.
The SDN controller attaches an entry to each packet to identify the flow.
10. What are three abstraction layers of a computer system? (Choose three.)
network
services
security
hardware
firmware
data
11. In software defined network architecture, what function is removed from network devices and
performed by an SDN controller?
control plane
data plane
application policies
security
12. Which term describes the data exchanges between virtual servers in a data center?
east-west traffic
north-south traffic
vertical traffic
backbone traffic
13. How is the control plane modified to operate with network virtualization?
A hypervisor is installed in each device to allow multiple instances of the control plane.
ITaaS
IaaS
PaaS
Automation
Not automation
2. Production levels are automatically tied to demand, eliminating unneeded product and
reducing the impact on the environment.
Automation
Not automation
3. Your GPS recalculates the best route to a destination based on current traffic congestion.
Automation
Not automation
4. The temperature and lighting in your home is adjusted based on your daily routine.
Automation
Not automation
5. A refrigerator senses that you are out of milk and places an order for more.
Automation
Not automation
6. You adjust the volume on the television set with a remote control.
Automation
Not automation
7. Robots are used in dangerous conditions to reduce safety risks to humans.
Automation
Not automation
8. You open your car door with a remote control.
Automation
Not automation
1. Which of the following data formats is typically used to display web pages?
HTML
XML
JSON
YAML
2. Which of the following describes a key/value pair?
A key describes the data and the value is the data itself.
True
False
4. This data format is a minimalist format that is very easy to read and is considered a superset
of another data format.
HTML
XML
JSON
YAML
5. This data format is self-descriptive through the use of the <tag>data</tag> structure.
HTML
XML
JSON
YAML
1. True or False: An API is a set of rules describing how one application can interact with
another, and the instructions to allow the interaction to occur.
True
False
2. Which of the following APIs would be used exclusively between Google and Cisco?
Partner API
3. Which of the following APIs is used by Cisco to provide access to students to complete labs?
Partner API
4. Which of the following APIs would be used exclusively between computing devices within
Cisco?
Partner API
5. Which of the following APIs provides flexible formatting and is the most widely used?
SOAP
REST
XML-RPC
JSON-RPC
1. An API in considered RESTful if it has which of the following features? (Choose three.)
Stateful
Stateless
Cacheable
Cacheless
Client-Server
Server-Server
2. Which of the following is a URL?
https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides
https://www.cisco.com/c/en/us/solutions/design-zone.html
www.cisco.com/c/en/us/solutions/design-zone.html
#~all-guides
3. Which of the following is a URN?
https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides
https://www.cisco.com/c/en/us/solutions/design-zone.html
www.cisco.com/c/en/us/solutions/design-zone.html
#~all-guides
4. Which of the following is a URI?
https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides
https://www.cisco.com/c/en/us/solutions/design-zone.html
www.cisco.com/c/en/us/solutions/design-zone.html
#~all-guides
5. Which of the following make up the query portion of a RESTful request? (Choose three.)
Key
Format
Parameters
Resources
API server
1. Which of the following are not typically used as configuration tools? (Choose two.)
API
Ansible
Chef
Puppet
SaltStack
SNMP
2. Identify the term for the following definition in relationship to configuration management tools:
Programmatically performing a task on a system such as configuring an interface or deploying a
VLAN.
Version control
Automation
Orchestration
Network management
3. Identify the term for the following definition in relationship to configuration management tools:
The process of how all automated activities need to happen, such as the order they must be done
and what must be completed before another task is begun.
Version control
Automation
Orchestration
Network management
4. True or False: Agentless means that the controller or master pushes the configuration to the
controlled device.
True
False
5. Which of the following configuration management tools use Python? (Choose all that apply.)
Ansible
Chef
Puppet
SaltStack
1. Which IBN feature is responsible for continuous validation and verification that the network is
meeting the expressed intent?
Translation
Activation
Assurance
Network Infrastructure
2. Which IBN feature enables the network administrator to express the expected networking
behavior that will best support the business intent?
Translation
Activation
Assurance
Network Infrastructure
3. Which IBN feature installs policies that capture intent into the physical and virtual network
infrastructure using networkwide automation?
Translation
Activation
Assurance
Network Infrastructure
4. True or False: The underlay limits the number of devices the network administrator must
program. It also provides services and alternative forwarding methods not controlled by the
underlying physical devices.
True
False
1. What is JSON?
It is a database.
It is a scripting language.
2. What is an architectural constraint to which a true RESTful API web service must adhere?
parameters
API server
query
resources
4. Which statement describes an API?
It is a set of functions and procedures that allows a client application to access the data of the
service application.
automation
orchestration
provisioning
version control
6. Which web service API can use multiple data formats including JSON, XML, and YAML?
SOAP
JSON-RPC
XML-RPC
REST
7. What are two reasons that most RESTful APIs require a key in the request? (Choose two.)
to make sure that the query matches the service offered by the web application
8. What is a difference between the XML and HTML data formats?
XML requires indentation for each key/value pair whereas HTML does not require indentation.
XML uses a self-descriptive data structure but HTML uses a standard document structure.
XML encloses data within a pair of tags whereas HTML uses a pair of quotation marks to enclose
data.
9. A programmer is using Ansible as the configuration management tool. Which term is used to
describe a set of instructions for execution?
Cookbook
Pillar
Playbook
Manifest
10. Which term is used to describe a set of instructions for execution by the configuration
management tool Chef?
Pillar
Manifest
Playbook
Cookbook
11. Which two configuration management tools are developed using Python? (Choose two.)
Ansible
Chef
SaltStack
NETCONF
Puppet
12. Which function of the Cisco intent-based networking system (IBNS) enables network
operators to express the expected networking behavior that will best support the business intent?
translation
assurance
ACL analysis
activation
13. Which types of APIs are suitable for the data communication between a travel website and a
hotel chain inquiring about room availability data?
internal APIs
open APIs
public APIs
partner APIs
14. Which characters are used to enclose a JSON key?
commas
quotation marks
colons
square brackets
15. Which character is used to separate JSON key/value pairs?
(comma) ,
(dash) -
(semi colon) ;
(forward slash) /