[ { "id": "Wired Network-5", "type": 1, "question": "Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.)", "choices": [ "RIPv1", "IGRP", "EIGRP", "OSPF", "BGP", "RIPv2" ], "answer": "C,D,F", "solution": "RIPv1 and IGRP are true distance-vector routing protocols and can't do much, really—except build and maintain routing tables and use a lot of bandwidth! RIPv2, EIGRP, and OSPF build and maintain routing tables, but they also provide classless routing, which allows for VLSM, summarization, and discontiguous networking", "topic": [ "Routing Protocols" ] }, { "id": "Wired Network-6", "type": 1, "question": "Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the following are typically assigned an IP address in the same subnet as host A? (Choose two answers.)", "choices": [ "The local router’s WAN interface", "The local router’s LAN interface", "All other hosts attached to the same switch", "Other hosts attached to the same switch and also in VLAN 1" ], "answer": "B,D", "solution": "The general rule to determine whether two devices’ interfaces should be in the same subnet is whether the two interfaces are separated from each other by a router. To provide a way for hosts in one VLAN to send data to hosts outside that VLAN, a local router must connect its LAN interface to the same VLAN as the hosts and have an address in the same subnet as the hosts. All the hosts in that same VLAN on the same switch would not be separated from each other by a router, so these hosts would also be in the same subnet. However, another PC, connected to the same switch but in a different VLAN, will require its packets to flow through a router to reach Host A, so Host A’s IP address would need to be in a different subnet compared to this new host", "topic": [ "Perspectives on IPv4 Subnetting" ] }, { "id": "Wired Network-7", "type": 1, "question": "Router R1 has a router-on-a-stick (ROAS) configuration with two subinterfaces of interface G0/1: G0/1.1 and G0/1.2. Physical interface G0/1 is currently in a down/down state. The network engineer then configures a **shutdown** command when in interface configuration mode for G0/1.1 and a **no shutdown** command when in interface configuration mode for G0/1.2. Which answers are correct about the interface state for the subinterfaces? (Choose two answers.)", "choices": [ "G0/1.1 will be in a down/down state.", "G0/1.2 will be in a down/down state.", "G0/1.1 will be in an administratively down state.", "G0/1.2 will be in an up/up state." ], "answer": "B,C", "solution": "Subinterface G0/1.1 must be in an administratively down state due to the **shutdown** command being issued on that subinterface. For subinterface G0/1.2, its status cannot be administratively down because of the **no shutdown** command. G0/1.2’s state will then track to the state of the underlying physical interface. With a physical interface state of down/down, subinterface G0/1.2 will be in a down/down state in this case", "topic": [ "IP Routing in the LAN" ] }, { "id": "Wired Network-8", "type": 1, "question": "Which SIP provisional responses indicate that in-band audio, such as ringback, will be streamed to CUBE through an audio channel? (Choose two.)", "choices": [ "183 Session in Progress without SDP", "183 Session in Progress with SDP", "180 Ringing without SDP", "180 Ringing with SDP" ], "answer": "B,D", "solution": "The inclusion of SDP in a 18X message generally indicates that ringback will be in-band, as per the SDP attributes", "topic": [ "CUBE Interworking Features" ] }, { "id": "Wired Network-9", "type": 1, "question": "Network latency can be broken down into which of the following types? (Choose all that apply.)", "choices": [ "Propagation delay (fixed)", "Time delay (variable)", "Serialization delay (fixed)", "Processing delay (fixed)", "Packet delay (fixed)", "Delay variation (variable)" ], "answer": "A,C,D,F", "solution": "Network latency can be broken down into propagation delay, serialization delay, processing delay, and delay variation", "topic": [ "Quality of Service (QoS)" ] }, { "id": "Wired Network-10", "type": 1, "question": "Which of the following are considered hybrid routing protocols? (Choose two.)", "choices": [ "OSPF", "BGP", "RIPv2", "IS-IS", "EIGRP" ], "answer": "B,E", "solution": "RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state. EIGRP uses qualities from both distance vector and link state to create a hybrid routing protocol. BGP can be used as an EGP and IGP, so the objectives consider BGP a hybrid routing protocol", "topic": [ "Routing Protocols" ] }, { "id": "Wired Network-11", "type": 1, "question": "In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server? (Choose all that apply.)", "choices": [ "Company database servers", "Internet web servers", "Incoming email servers", "Domain controllers" ], "answer": "B,C", "solution": "The external DNS server should contain records only for the resources that must be accessible from the Internet, such as web servers and public email servers. For security reasons, servers containing sensitive data, such as database servers and domain controllers, should be registered on the internal DNS server", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-12", "type": 1, "question": "Which of the following are the recommended congestion management mechanisms for modern rich-media networks? (Choose two.)", "choices": [ "Class-based weighted fair queuing (CBWFQ)", "Priority queuing (PQ)", "Weighted RED (WRED)", "Low-latency queuing (LLQ)" ], "answer": "A,D", "solution": "CBWFQ and LLQ provide real-time, delay-sensitive traffic bandwidth and delay guarantees while not starving other types of traffic", "topic": [ "Quality of Service (QoS)" ] }, { "id": "Wired Network-13", "type": 1, "question": "Barney is a host with IP address 10.1.1.1 in subnet 10.1.1.0/24. Which of the following are things that a standard IP ACL could be configured to do? (Choose two answers.)", "choices": [ "Match the exact source IP address.", "Match IP addresses 10.1.1.1 through 10.1.1.4 with one access-list command without matching other IP addresses.", "Match all IP addresses in Barney’s subnet with one access-list command without matching other IP addresses.", "Match only the packet’s destination IP address." ], "answer": "A,C", "solution": "Standard ACLs check the source IP address. The address range 10.1.1.1–10.1.1.4 can be matched by an ACL, but it requires multiple **access-list** commands. Matching all hosts in Barney’s subnet can be accomplished with the **access-list 1 permit 10.1.1.0 0.0.0.255** command", "topic": [ "Basic IPv4 Access Control Lists" ] }, { "id": "Wired Network-14", "type": 1, "question": "What are the two main factors that affect DSL (Digital Subscriber Line) transmission rates?", "choices": [ "Signal termination", "Distance to the nearest central office", "Line conditions", "Line reflection" ], "answer": "B,C", "solution": "There are two factors that affect DSL transmission rates. The first is the distance to the nearest central office, and the second is the condition and quality of the line. For DSL to achieve higher data rates, the site must be close to the central office and use good-quality lines for signal transmission. The other options are not factors relating to DSL transmission", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-15", "type": 1, "question": "Which wireless networking (Wi-Fi) standards can use both the 2.4 GHz and 5 GHz frequencies? (Choose two.)", "choices": [ "802.11g", "802.11n", "802.11ac (Wi-Fi 5)", "802.11ax (Wi-Fi 6)" ], "answer": "B,D", "solution": "Only the 802.11n and 802.11ax standards can use both the 2.4 GHz and 5 GHz frequencies, which makes them backward compatible with all the other standards. 802.11a and 802.11ac standards use only the 5 GHz frequency. 802.11b, and 802.11g use only the 2.4 GHz frequency", "topic": [] }, { "id": "Wired Network-16", "type": 1, "question": "Which of the following are examples of out-of-band device management? (Choose all that apply.)", "choices": [ "Logging on remotely from a network workstation", "Plugging a laptop into a console port", "Establishing a point-to-point modem connection", "Connecting dedicated ports on each device to a separate switch" ], "answer": "B,C,D", "solution": "Any method of connecting to a router, switch, or other managed device that does not use the production network is considered to be out-of-band management. This includes connecting a computer or terminal directly to the device, using a point-to-point modem connection, or consolidating dedicated ports on all of the devices by connecting them to an isolated switch. Logging on remotely using a workstation on the production network would be considered in-band management", "topic": [ "Network Security" ] }, { "id": "Wired Network-17", "type": 1, "question": "Which network prefixes match the prefix match pattern 10.168.0.0/13 ge 24? (Choose two.)", "choices": [ "10.168.0.0/13", "10.168.0.0/24", "10.173.1.0/28", "10.104.0.0/24" ], "answer": "B,C", "solution": "Please see Figure 12-6 for an explanation", "topic": [ "Advanced BGP" ] }, { "id": "Wired Network-18", "type": 1, "question": "Which of the following connector types are associated with fiber-optic cables? (Choose all that apply.)", "choices": [ "RJ11", "ST", "F", "LC", "MT-RJ" ], "answer": "B,D,E", "solution": "Fiber-optic cable connectors all function on the same basic principles, but there are a variety of form factors from which to choose, including Straight Tip (ST), Local Connector (LC), and Mechanical Transfer–Registered Jack (MT-RJ). RJ-11 is a twisted pair cable connector, and F connectors are for coaxial cable", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-19", "type": 1, "question": "Which of the following explains why splitting a large, switched Ethernet LAN into two LANs by adding a router can help to alleviate traffic congestion and improve performance? (Choose all that apply.)", "choices": [ "Adding a router reduces the amount of broadcast traffic on each of the two LANs.", "Adding a router reduces the amount of unicast traffic on each of the two LANs.", "Adding a router diverts traffic to an alternate path through the network.", "Adding a router prevents computers on one LAN from communicating with computers on another LAN." ], "answer": "A,B", "solution": "Adding a router splits the Ethernet LAN into two LANs, creating two separate broadcast domains. Each computer, therefore, has a smaller number of broadcast messages to process. Because the network is split by the router, the amount of unicast traffic on each subnet is reduced", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-20", "type": 1, "question": "Cisco NX-OS streaming telemetry allows you to push data off the device to a server endpoint as or using ____________. (Choose two answers.)", "choices": [ "JavaScript Object Notation (JSON)", "Google Protocol Buffers (GPB)", "XML", "TCL" ], "answer": "A,B", "solution": "Cisco NX-OS streaming telemetry allows you to push data off the device to a defined endpoint as JavaScript Object Notation (JSON) or using Google Protocol Buffers (GPB) at a much higher frequency and more efficiently", "topic": [ "Data Center Network Management and Monitoring" ] }, { "id": "Wired Network-21", "type": 1, "question": "After a client has been profiled, what policy features may be used? (Choose all that apply.)", "choices": [ "VLAN ID assignment", "Time of day restrictions", "QoS profile", "ACLs" ], "answer": "A,B,C,D", "solution": "The controller can enforce policy based on all of these", "topic": [ "Security for Wireless Client Connectivity" ] }, { "id": "Wired Network-22", "type": 1, "question": "Which of the following statements are CORRECT regarding the SPAN destination (SD) port? (Choose two answers.)", "choices": [ "It allows data traffic only in the egress (Tx) direction.", "Multiple sessions can’t share the same destination ports.", "If the SD port is shut down, all shared sessions stop generating SPAN traffic.", "The SD port always has a port VSAN 1 configured automatically." ], "answer": "A,C", "solution": "Each SPAN session represents an association of one destination with a set of sources along with various other parameters that you specify to monitor the network traffic. One destination can be used by one or more SPAN sessions. The SD port does not have a port VSAN", "topic": [ "Describe Software Management and Infrastructure Monitoring" ] }, { "id": "Wired Network-23", "type": 1, "question": "You are working on your company's screened subnet (also known as a perimeter network), which has five Linux web servers, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall on it. While trying to troubleshoot a network communications failure, you type the following command on one of the systems: `traceroute` `[adatum.com](http://adatum.com)`. Which of the following systems might you be working on? (Choose all that apply.)", "choices": [ "The Cisco router", "One of the Linux web servers", "The CSU/DSU console", "The Windows-based firewall" ], "answer": "A,B", "solution": "Both Linux and the Cisco IOS operating systems include the traceroute utility. Windows has its own version of the utility, but it is called `tracert` . The CSU/DSU cannot run a `traceroute` command", "topic": [] }, { "id": "Wired Network-24", "type": 1, "question": "Which of the following wireless networking standards are capable of using only the 5 GHz frequency? (Choose all that apply.)", "choices": [ "IEEE 802.11a", "IEEE 802.11b", "IEEE 802.11g", "IEEE 802.11n", "IEEE 802.11ac" ], "answer": "A,E", "solution": "The IEEE 802.11a and IEEE 802.11ac standards can use the 5 GHz band only. IEEE 802.11b and IEEE 802.11g can use the 2.4 GHz band only. IEEE 802.11n can use either the 2.4 or 5 GHz band", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-25", "type": 1, "question": "A multilayer switch typically functions at which layers of the OSI reference model? (Choose two.)", "choices": [ "Data link", "Network", "Transport", "Application" ], "answer": "A,B", "solution": "All switches operate at the data link layer of the OSI model, but multilayer switches usually also function as routers, which are network layer devices. They are not usually transport or application layer devices", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-26", "type": 1, "question": "Routers using link states and Dijkstra's algorithm to calculate the lowest cost route to a specific destination can conceivably be running which of the following interior gateway routing protocols? (Choose all that apply.)", "choices": [ "OSPF", "RIP", "EIGRP", "IS-IS", "BGP" ], "answer": "A,D", "solution": "Link states and Dijkstra's algorithm are used by link state routing protocols, such as Open Shortest Path First (OSPF) and Intermediate System – Intermediate System (IS – IS). Routing Information Protocol (RIP) and Enhanced Interior Gateway Routing Protocol (EIGRP) are distance vector protocols, which do not use link states. Border Gateway Protocol (BGP) is a distance vector protocol and an exterior (not interior) gateway protocol", "topic": [ "Network Operations" ] }, { "id": "Wired Network-27", "type": 1, "question": "Which of the following are required on the client’s wireless adapter before a CCX link test can be performed on a controller? (Select all that apply.)", "choices": [ "CCXv1", "CCXv2", "CCXv4", "CCXv5", "Support for any CCX version" ], "answer": "C,D", "solution": "The client must support CCXv4 or CCXv5 before it can accept the CCX link test frames and return information about its own radio to the controller", "topic": [ "Troubleshooting WLAN Connectivity" ] }, { "id": "Wired Network-28", "type": 1, "question": "What four components are required for a computer to establish a remote Transmission Control Protocol/Internet Protocol (TCP/IP) connection?", "choices": [ "Common protocols", "Remote Access Service (RAS)", "A physical layer connection", "TCP/IP configuration", "Point-to-Point Tunneling Protocol (PPTP)", "Host and remote software" ], "answer": "A,C,D,F", "solution": "A computer requires four components to establish a remote connection. First, a physical-layer Wide Area Network (WAN) connection is needed. Second, the two systems must share common protocols from the data link layer and above. Third, if TCP/IP is being used to establish a remote session, then TCP/IP parameters must be configured on the systems. Fourth, host and remote software are needed. The remote client must have software that enables it to establish a remote session, and the server must have software that enables it to receive and grant remote sessions. Microsoft RAS supports both client and server remote access software; however, this is not a required component since other types of software can be used. PPTP is a tunneling protocol and is not a required component for establishing a remote session", "topic": [ "Network Security" ] }, { "id": "Wired Network-29", "type": 1, "question": "Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all that apply.)", "choices": [ "65", "66", "67", "68", "69" ], "answer": "C,D,E", "solution": "Dynamic Host Configuration Protocol (DHCP) servers use port numbers 67 and 68. The Trivial File Transfer Protocol (TFTP) uses port number 69. Neither protocol uses port 65 or 66", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-30", "type": 1, "question": "Ralph is installing a wireless LAN that includes three Access Points (APs) to provide coverage for a large building. Which of the following must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices? (Choose all that apply.)", "choices": [ "Configure each AP with the same IP address.", "Configure each AP with the same security passphrase.", "Configure each AP to use the same security protocol.", "Configure each AP with the same SSID." ], "answer": "B,C,D", "solution": "Roaming from one AP to another without interruption requires that the APs all use the same SSID, the same security protocol, and the same passphrase. The APs will not function properly if they have the same IP address", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-31", "type": 1, "question": "Which of the following types of Wide Area Network (WAN) connections commonly use Point-to-Point Protocol over Ethernet (PPPoE)? (Choose all that apply.)", "choices": [ "Leased lines", "SONET", "Cable broadband", "Digital Subscriber Line (DSL)" ], "answer": "C,D", "solution": "Cable broadband and DSL subscribers typically connect to ISP networks that run Ethernet, but Ethernet has no built-in authentication or encryption mechanisms. PPP has the ability to use external authentication and encryption protocols, so by encapsulating PPP within Ethernet frames, users are able to log on to the ISP network securely. Leased lines, such as T-1s, and Synchronous Optical Network (SONET) connections do not use Ethernet connections, so they have no need for PPPoE", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-32", "type": 1, "question": "What two terms are used to identify an Internet provider that may connect to the Internet using T1 or T3 lines, or fiber optic, for example, and uses point-to-point millimeter-wave or microwave links between its towers for its backbone or to extend its service area, and point-to-multipoint wireless to provide Internet access to its customers?", "choices": [ "WISP", "ISP", "Demarcation point", "Long-range fixed wireless" ], "answer": "A,D", "solution": "For decades now, wireless Internet service providers (WISPs) have been established by groups of individuals or small companies to provide Internet access to areas where it is not profitable for large commercial Internet providers to run, such as very rural areas. They are also called long-range fixed wireless providers. The first one was established in 1992 in the Midwest of the United States. Now there are thousands of them all over the world. In some areas of the world, where there is little or no wired infrastructure, WISPs are the only way that people can get Internet connectivity. A WISP connects to the Internet using either leased lines or microwaves, generally uses point-to-point microwaves between its towers, and uses point-to-multipoint connections between the final tower and users. An ISP is an Internet service provider, and a demarcation point is the place in a customer’s premises where the responsibility for the network changes from the ISP to the customer", "topic": [ "Networking" ] }, { "id": "Wired Network-33", "type": 1, "question": "Ralph is having trouble providing satisfactory wireless network performance to a row of glass-walled conference rooms at the far end of the building. The doors to the conference rooms are also made of glass and are always closed when meetings are in progress. Which of the following types of radio signal interference are likely to be the main issues that Ralph is trying to overcome? (Choose all that apply.)", "choices": [ "Reflection", "Refraction", "Diffraction", "Attenuation" ], "answer": "B,D", "solution": "Attenuation is the tendency of signals to weaken as they travel through a network medium. In the case of a wireless network, the medium is the air, and the farther away a wireless device is from the Access Point (AP), the weaker the signal will be. Refraction is when signals bend as they pass through certain types of barriers, such as the glass walls of conference rooms. The bending changes the direction of the signals, possibly causing them to weaken in the process. Reflection is when signals bounce off of certain surfaces, such as metal. Diffraction is when signals have to pass around barriers to reach a particular destination. All of these phenomena can weaken the radio signals used in wireless networking, but attenuation and refraction are likely to be the primary problems for Ralph in this case", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-34", "type": 1, "question": "Which of the following command-line utilities can run on Windows, Unix, or Linux systems? (Choose all that apply.)", "choices": [ "`ping`", "`traceroute`", "`ifconfig`", "`iptables`", "`nslookup`" ], "answer": "A,E", "solution": "The `ping` and `nslookup` utilities can both run on Windows, Unix, or Linux systems. The `traceroute` command runs only on Unix or Linux, although there is a Windows version called `tracert` . The `ifconfig` and `iptables` commands only exist on Unix and Linux systems", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-35", "type": 1, "question": "Which of the following fields cannot be compared based on an extended IP ACL? (Choose two answers.)", "choices": [ "Protocol", "Source IP address", "Destination IP address", "TOS byte", "URL", "Filename for FTP transfers" ], "answer": "E,F", "solution": "Extended ACLs can look at the Layer 3 (IP) and Layer 4 (TCP, UDP) headers and a few others, but not any application layer information. Named extended ACLs can look for the same fields as numbered extended ACLs", "topic": [ "Advanced IPv4 Access Control Lists" ] }, { "id": "Wired Network-36", "type": 1, "question": "Which of the following are methods that can be used to solve routing issues caused by multipoint redistribution? (Choose all that apply.)", "choices": [ "Modify the seed metrics of the redistributed routes.", "Modify the administrative distances of redistributed routes.", "Tag routes as they are redistributed and then deny them from being redistributed back into the originating routing source.", "Modify the metric used to reach the boundary routers." ], "answer": "A,B,C", "solution": "You can solve multi-point redistribution issues by modify the seed metrics of the redistributed routes, modifying the administrative distances of redistributed routes, and taging routes as they are redistributed and then deny them from being redistributed back into the originating routing source", "topic": [ "Troubleshooting Redistribution" ] }, { "id": "Wired Network-37", "type": 1, "question": "What are two enhancements that OSPFv3 supports over OSPFv2?", "choices": [ "It requires the use of ARP.", "It can support multiple IPv6 subnets on a single link.", "It supports up to two instances of OSPFv3 over a common link.", "It routes over links rather than over networks." ], "answer": "B,D", "solution": "The OSPF IPv6 interface to a link can have more than one IPv6 address. In fact, a single link can belong to multiple subnets, and two interfaces attached to the same link but belonging to different IPv6 subnets can still communicate. OSPFv3 changes the OSPFv2 language of “subnet” to “link” and allows the exchange of packets between two neighbors on the same link but belonging to different IPv6 subnets", "topic": [ "Implementing Routing in the Data Center" ] }, { "id": "Wired Network-38", "type": 1, "question": "Which two of the following file transfer methods can be used to move a centralized controller code image file onto a controller?", "choices": [ "TFTP", "RCP", "SSH", "FTP", "XMODEM", "HTTP" ], "answer": "A,D", "solution": "TFTP and FTP are the only two methods supported", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-39", "type": 1, "question": "Which of the following messages are server error final responses? (Choose two.)", "choices": [ "404 Not Found", "503 Service Unavailable", "488 Unacceptable Media", "301 Moved Temporarily", "500 Internal Server Error" ], "answer": "B,E", "solution": "5xx-level messages are server error final responses", "topic": [ "VoIP Protocols: SIP and H.323" ] }, { "id": "Wired Network-40", "type": 1, "question": "A laptop cannot access the wireless network. Which of the following statements best describe the most likely causes of this? (Select the two best answers.)", "choices": [ "The function key for wireless was pressed by accident.", "The user installed a new web browser.", "The wireless network was forgotten in Windows.", "The computer is obtaining an IP address automatically." ], "answer": "A,C", "solution": "**Explanation:** Most laptops have a special function key (for example, F12) that allows you to enable or disable the Wi-Fi connection with a single key press. Also, a wireless network can be “forgotten” in the operating system. If this happens, the laptop has to be reconnected to the wireless network.\n\n **Incorrect answers:** After you are connected to a network, you can typically use whatever web browser you want, as long as the browser is compatible with the operating system that is in use. Client computers (such as laptops) normally obtain their IP addresses automatically from a DHCP server, so this is not a likely problem", "topic": [] }, { "id": "Wired Network-41", "type": 1, "question": "Which of the following are true about IP address 172.16.99.45’s IP network? (Choose two answers.)", "choices": [ "The network ID is 172.0.0.0.", "The network is a Class B network.", "The default mask for the network is 255.255.255.0.", "The number of host bits in the unsubnetted network is 16." ], "answer": "B,D", "solution": "The first octet (172) is in the range of values for Class B addresses (128–191). As a result, the network ID can be formed by copying the first two octets (172.16) and writing 0s for the last two octets (172.16.0.0). The default mask for all Class B networks is 255.255.0.0, and the number of host bits in all unsubnetted Class B networks is 16", "topic": [ "Analyzing Classful IPv4 Networks" ] }, { "id": "Wired Network-42", "type": 1, "question": "Which network prefixes match the prefix match pattern 10.168.0.0/13 ge 24? (Choose two.)", "choices": [ "10.168.0.0/13", "10.168.0.0/24", "10.173.1.0/28", "10.104.0.0/24" ], "answer": "B,C", "solution": "Please see Figure 15-3 for an explanation", "topic": [ "Route Maps and Conditional Forwarding" ] }, { "id": "Wired Network-43", "type": 1, "question": "Which of the following cabling topologies have never been used by standard Ethernet networks? (Choose all that apply.)", "choices": [ "Bus", "Ring", "Star", "Mesh" ], "answer": "B,D", "solution": "Ethernet has never used a ring or mesh topology. The first Ethernet networks used a physical layer implementation commonly known as Thick Ethernet or 10Base5. The network used coaxial cable in a bus topology. Later Ethernet standards use twisted-pair or fiber-optic cables in a star topology", "topic": [] }, { "id": "Wired Network-44", "type": 1, "question": "Originally, Storage Area Networks (SANs) were dedicated solely to storage-based traffic. A Local Area Network (LAN) was also required for other types of traffic. Today, however, it is possible for SAN and LAN traffic to coexist on a single network medium. Which of the following SAN protocols are capable of sharing a network medium with standard LAN traffic? (Choose all that apply.)", "choices": [ "InfiniBand", "Fibre Channel", "iSCSI", "FCoE" ], "answer": "C,D", "solution": "The iSCSI protocol runs on a standard IP network, and the Fibre Channel over Ethernet (FCoE) variant runs on a standard Ethernet network. Both of these protocols can share a network with LAN traffic, although the use of a Quality of Service (QoS) mechanism is usually recommended. The original Fibre Channel implementation and InfiniBand both require a dedicated network medium that does not support LAN traffic", "topic": [] }, { "id": "Wired Network-45", "type": 1, "question": "A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user’s PC. The end user, thinking the user is helping, manually sets the PC’s OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of autonegotiation. The switch’s G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.)", "choices": [ "Full duplex", "Half duplex", "10 Mbps", "1000 Mbps" ], "answer": "A,D", "solution": "The IEEE autonegotiation rules dictate that if a device attempts autonegotiation but the other side does not participate, use the slowest speed it supports. However, Cisco switches override that logic, instead sampling the electrical signal to detect the speed used by the connected device, so the switch will operate at 1000 Mbps. The switch uses the IEEE default setting for duplex based on the speed, and the IEEE default for duplex when using 1000 Mbps is to use full duplex. So in this case, the switch will match both the speed and the duplex setting made on the PC", "topic": [ "Configuring and Verifying Switch Interfaces" ] }, { "id": "Wired Network-46", "type": 1, "question": "You're setting up a network for a customer. The network uses a DHCP server, but the customer needs an IP address for their print server that does not change. What are two possible solutions? (Choose two.)", "choices": [ "Let the DHCP server assign a number because once assigned, it will not change.", "Manually configure the print server to have a static IP address.", "Configure a reserved IP address on the DHCP server for the print server.", "Static and dynamic IP addresses can't exist on the same network. You'll have to manually configure everything." ], "answer": "B,C", "solution": "Certain devices on a network, such as printers and servers, should have an IP address that doesn't change (static) so that the other nodes on the network can always find the device. Option A is incorrect because if the DHCP lease on the IP address expires, the print server would be assigned a different IP address the next time it logs in. A static IP could be configured on the printer server, or the IP address could be configured as reserved on the DHCP server for that print server. Either choice would work. Static and dynamic IP addresses almost always exist on the same network, because each is needed to have a network that runs smoothly", "topic": [ "Networking" ] }, { "id": "Wired Network-47", "type": 1, "question": "Which of the following are Layer 2 VPN options from service providers? (Choose two.)", "choices": [ "VPWS", "GPRS", "MPLS Layer 3 VPN", "VPLS" ], "answer": "A,D", "solution": "Both VPWS and VPLS are Layer 2 VPN technologies that service providers offer", "topic": [ "WAN for the Enterprise" ] }, { "id": "Wired Network-48", "type": 1, "question": "There seems to be a great deal of interference on your wireless network. You determine that it's due to the network in the office next door. What should you do to keep your network safe and reliable? (Choose three.)", "choices": [ "Change the channel your router uses.", "Turn your Wi-Fi signal power to maximum power to drown out theirs.", "Turn your signal power down to decrease interference.", "Try moving the router or using a different band." ], "answer": "A,C,D", "solution": "While the interference is usually more of an annoyance than a problem, having your wireless network easily accessed by others is a security issue. If you change the channel so that your Wi-Fi and theirs are on different channels, there will be less interference. Turn your signal power down to keep your Wi-Fi signal inside your office. If the offending network is already interfering with your Wi-Fi signal, turning up the power on your router's Wi-Fi signal might make it worse because there would be more crossover between your network and theirs. You could also try moving the router to an area with less interference. Finally, try using a different band to avoid interference. If you're using the 5 GHz band, try using the 2.4 GHz band instead if devices support it. Some environments employ a process called channel hopping (changing channels frequently) to avoid packet sniffing and signal jamming on their wireless networks", "topic": [ "Security" ] }, { "id": "Wired Network-49", "type": 1, "question": "What are two environmental variables that are commonly monitored? (Choose two.)", "choices": [ "Temperature", "Airflow", "Humidity", "Utilization" ], "answer": "A,C", "solution": "Data centers monitor the temperature and humidity to ensure they are in safe operating ranges to protect the equipment and to make sure they are within their heat and humidity specifications", "topic": [ "Ensuring Network Availability" ] }, { "id": "Wired Network-50", "type": 1, "question": "You need to configure dynamic IP addressing on your network to cut down on management time. How will you do this? (Choose two.)", "choices": [ "Enable DHCP settings on the router.", "Configure each NIC to obtain an IP address automatically.", "Configure each NIC to a specific IP address.", "Configure each NIC to obtain DNS server addresses automatically." ], "answer": "A,B", "solution": "A NIC can be configured either with a specific (static) IP address, or to obtain an IP address from an available Dynamic Host Configuration Protocol (DHCP) server. Many routers have the capability to provide DHCP services. When a device with a properly configured NIC attempts to join a network, a request for an address will be sent to the DHCP server, and the DHCP server will lease an address to that device, if one is available", "topic": [ "Networking" ] }, { "id": "Wired Network-51", "type": 1, "question": "You're verifying settings on your router and notice that it only has WPA2, not WPA3. Your devices have all been working with WPA2 and you have some older and some newer devices. What should your next steps be? (Choose two.)", "choices": [ "Update the router's firmware.", "Choose WPA2/WPA3 Transitional.", "Choose WPA3 Personal.", "Chose WPA2 Personal (AES)." ], "answer": "A,B", "solution": "Many routers that don't have a setting for WPA3 can get it by updating the router's firmware. If some of your devices are older they may not work with WPA3. WPA2/WPA3 Transitional (also known as WPA2/WPA3 mixed mode) is a mode that allows older devices to still work with WPA2, but they should be replaced or updated to WPA3 as soon as practicable. If you choose WPA3 Personal, some devices might not work. If you choose WPA2 Personal, your network is not as secure as it could be", "topic": [] }, { "id": "Wired Network-52", "type": 1, "question": "Which statements are true regarding the Cisco Nexus setup utility? (Choose two answers.)", "choices": [ "After bootup, the setup utility will start if there is a config file saved in NVRAM.", "After bootup, the setup utility will start if there is no config file saved in NVRAM.", "The setup utility is a dialog with steps that help you configure the final configuration on Nexus switch.", "The setup utility is a dialog with steps that help you with switch initial configuration only." ], "answer": "B,D", "solution": "When a boot is successful, you can use the setup utility to build an initial configuration file using the System Configuration dialog. The setup starts automatically when a device has no configuration file in NVRAM. The dialog guides you through the initial configuration", "topic": [ "Data Center Network Management and Monitoring" ] }, { "id": "Wired Network-53", "type": 1, "question": "Which of the following installation steps are more likely required on a Cisco router, but not typically required on a Cisco switch? (Choose two answers.)", "choices": [ "Connect Ethernet cables", "Connect serial cables", "Connect to the console port", "Connect the power cable", "Turn the on/off switch to “on”" ], "answer": "B,E", "solution": "Cisco routers have an on/off switch, but Cisco switches generally do not", "topic": [ "Operating Cisco Routers" ] }, { "id": "Wired Network-54", "type": 1, "question": "What are some of the characteristics of IPv6 addresses? (Choose three.)", "choices": [ "They are 128 bits long.", "Colons separate 16-bit hexadecimal fields.", "Hexadecimal characters are case sensitive.", "Successive fields of zero can be represented as ::." ], "answer": "A,B,D", "solution": "An IPv6 address is 128 bits long, with colons separating entries (x:x:x:x:x:x:x:x, where x is a 16-bit hexadecimal field). Successive fields of zero can be represented as :: but only once per address, and the hexadecimal characters are not case sensitive", "topic": [ "Network Fundamentals" ] }, { "id": "Wired Network-55", "type": 1, "question": "You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.)", "choices": [ "Cellular", "Bluetooth", "Wi-Fi", "USB", "Tethering" ], "answer": "A,C,D", "solution": "Three common connection types for synchronization to a desktop (or laptop) are cellular, Wi‐Fi, and USB. Bluetooth is not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone", "topic": [ "Mobile Connectivity and Application Support" ] }, { "id": "Wired Network-56", "type": 1, "question": "Which of the following are part of the YANG model? (Choose two.)", "choices": [ "Type", "Leaf", "Container", "String", "Method" ], "answer": "B,C", "solution": "Leaf and Container are parts of a YANG model. A container can hold multiple leafs", "topic": [ "Foundational Network Programmability Concepts" ] }, { "id": "Wired Network-57", "type": 1, "question": "Ed is trying to troubleshoot a problem that has caused a wired network connection to fail completely. Which of the following wired network problems will cause a complete failure of a network connection? (Choose all that apply.)", "choices": [ "Bottleneck", "Speed mismatch", "Duplex mismatch", "TX/RX reversal", "Bad switch port" ], "answer": "B,D,E", "solution": "A speed mismatch on a wired network only occurs when two devices are configured to use a specific transmission speed and those speeds are different. In that case, network communication stops. For network communication to occur on a twisted-pair network, transmit (TX) pins must be connected to receive (RX) pins. If the connections are reversed, no communication occurs. If the switch port to which a computer is connected is bad, there will be no network communication. Bottlenecks and duplex mismatches will slow down network communications, but they will not stop them completely", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-58", "type": 1, "question": "On which of the following types of devices should you consider disabling unused ports as a security precaution? (Choose all that apply.)", "choices": [ "Hubs", "Servers", "Switches", "Wireless Access Points" ], "answer": "B,C", "solution": "Servers and switches are both devices on which unused ports can be a security hazard, but they use the term port differently. Servers have application layer ports that permit specific types of service traffic to enter the server. Switches have ports to which administrators can connect computers and other devices. Both can provide attackers with unauthorized access to the device. It is not possible to disable hub ports, and the Wireless Access Points (WAPs) used on enterprise networks typically have only a single port", "topic": [ "Network Security" ] }, { "id": "Wired Network-59", "type": 1, "question": "Which of the following types of servers are typically found in a screened subnet? (Choose all that apply.)", "choices": [ "Domain controllers", "DHCP servers", "Email servers", "Web servers" ], "answer": "C,D", "solution": "A network segment that is separated from the internal network by a firewall and exposed to the Internet is called a screened subnet, a demilitarized zone (DMZ), or a perimeter network. Administrators typically use a screened subnet for servers that must be accessible by outside users, such as web and email servers. For security reasons, domain controllers and Dynamic Host Configuration Protocol (DHCP) servers should be located on internal network segments", "topic": [ "Network Security" ] }, { "id": "Wired Network-60", "type": 1, "question": "A customer’s mobile device cannot connect to Wi-Fi. According to the customer, it was working fine yesterday. Troubleshoot! Which of the following statements best describes the recommended course of action? (Select the three best answers.)", "choices": [ "Power cycle the device.", "Re-pair the device.", "Perform a hard reset.", "Forget the Wi-Fi network.", "Ensure that the correct SSID was entered.", "Change the IP address." ], "answer": "A,D,E", "solution": "**Explanation:** If a mobile device cannot connect to the network, you should attempt to power cycle the device, forget and reconnect to the Wi-Fi network, and ensure that the correct SSID was entered in the first place. Perhaps the number-one method would be to power cycle Wi-Fi (which is not listed in the answers).\n\n **Incorrect answers:** Re-pairing has to do with Bluetooth, not Wi-Fi. Re-pairing means that you remove the paired Bluetooth device and then reconnect it. A hard reset wipes a device of its data and returns it to factory condition. This is a very last resort; there are plenty of other things you can try before that. Changing the IP address is possible but usually not necessary because most mobile devices obtain their IP addresses dynamically", "topic": [] }, { "id": "Wired Network-61", "type": 1, "question": "Router R1 lists a route in its routing table. Which of the following answers list a fact from a route that the router uses when matching the packet’s destination address? (Choose two answers.)", "choices": [ "Mask", "Next-hop router", "Subnet ID", "Outgoing interface" ], "answer": "A,C", "solution": "The route defines the group of addresses represented by the route using the subnet ID and mask. The router can use those numbers to find the range of addresses that should be matched by this route. The other two answers list facts useful when forwarding packets that happen to match the route", "topic": [ "Configuring IPv4 Addresses and Static Routes" ] }, { "id": "Wired Network-62", "type": 1, "question": "What are some of the benefits of DMVPN technology compared to legacy site-to-site VPN solutions? (Choose three.)", "choices": [ "Multicast support", "Crypto map enhancement", "QoS support", "Dynamic routing protocol capabilities", "Complex administrative overhead" ], "answer": "A,C,D", "solution": "DMVPN technology enables support for multicast traffic, dynamic routing protocols, and QoS for bandwidth optimization", "topic": [ "Dynamic Multipoint Virtual Private Network (DMVPN)" ] }, { "id": "Wired Network-63", "type": 1, "question": "After experiencing some problems with devices connected to the company's fiber-optic network, Alice brings in a contractor to test the fiber-optic cable runs. The contractor detects a significant amount of decibel (dB) loss in some of the cable runs, which could be the source of the problems. Which of the following are possible causes of the decibel loss? (Choose all that apply.)", "choices": [ "Electromagnetic interference", "Dirty optical cables", "Excessive cable length", "Signal crosstalk" ], "answer": "B,C", "solution": "Dirt on fiber-optic cable connectors can reduce the strength of the signal, resulting in decibel loss. Excessive cable length can result in greater attenuation and weaker signals due to the decibel loss. Electromagnetic interference and signal crosstalk are both factors that can affect copper cable transmissions, but not fiber optic", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-64", "type": 1, "question": "Which OSPFv3 address family commands are used to verify which OSPFv3 address family an interface is participating in? (Choose two.)", "choices": [ "show ospfv3", "show ospfv3 interface brief", "show ospfv3 neighbor", "show ospfv3 database" ], "answer": "B,C", "solution": "You can verify which OSPFv3 address family an interface is participating in with the commands **show ospfv3 interface brief** and **show ospfv3 neighbor", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-65", "type": 1, "question": "Which of the following items contribute to network management complexity? (Choose all that apply.)", "choices": [ "Level of engineering expertise needed", "Open standards", "Number of managed endpoints", "Correlation of information across devices" ], "answer": "A,C,D", "solution": "Level of expertise, number of managed endpoints, and difficulty of information correlation across devices all contribute to management complexity. However, open standards _do not_ contribute to management complexity, even though different vendor interpretations of open standards do contribute to network management complexity", "topic": [ "Why ACI?" ] }, { "id": "Wired Network-66", "type": 1, "question": "What happens if you add the following entry to the end of an IPv6 ACL: **deny ipv6 any any log** _?_ (Choose two.)", "choices": [ "All traffic is denied and logged.", "All traffic that does not match an entry in the ACL is denied and logged.", "ICMP Neighbor Discovery messages are implicitly permitted.", "ICMP Neighbor Discovery messages are denied." ], "answer": "B,D", "solution": "The entry **deny ipv6 any any log** will deny and log all traffic that does not match an entry in the ACL, and ICMP Neighbor Discovery messages will also be denied", "topic": [ "Troubleshooting ACLs and Prefix Lists" ] }, { "id": "Wired Network-67", "type": 1, "question": "What licensing does Cisco Expressway utilize? (Choose two.)", "choices": [ "VLSC", "APSL", "PAK", "CUWL", "Smart Licensing" ], "answer": "C,E", "solution": "Cisco Expressway utilizes Product Authorization Keys (PAK) as its legacy licensing, but the shift is toward the flexible and simplified Smart Licensing", "topic": [ "Configure Key Cisco Expressway Settings" ] }, { "id": "Wired Network-68", "type": 1, "question": "Which of the following are advantages to using a SAN? (Choose two.)", "choices": [ "More storage space on the network", "More efficient data storage", "Faster data access", "Automated data backups" ], "answer": "B,C", "solution": "Storage area networks (SANs) have many advantages, including block‐level data storage, which is more efficient. They also reduce network loads, provide faster data access, and are easily expandable. They do not inherently provide more storage space (although they are easy to expand) or do automated data backups (although they are easier to set up)", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-69", "type": 1, "question": "Which two of the following choices are the correct criteria used by the FRA algorithm?", "choices": [ "4GHz coverage overlap", "5GHz coverage overlap", "An AP’s COF value", "An AP’s transmit power level value" ], "answer": "A,C", "solution": "The Flexible Radio Assignment (FRA) algorithm computes a Coverage Overlap Factor (COF) value for each AP. If the COF exceeds a threshold, the AP is considered to be providing redundant coverage. FRA can only reassign a flexible (XOR) radio from 2.4GHz to the 5GHz band, so 2.4GHz coverage overlap is also an FRA criteria", "topic": [ "Designing Radio Management" ] }, { "id": "Wired Network-70", "type": 1, "question": "Which of the following are places where network wiring connections are found? (Choose all that apply.)", "choices": [ "MDF", "MTBF", "IDF", "RDP" ], "answer": "A,C", "solution": "A large enterprise network will—at minimum—have demarcation points for telephone services and a connection to an Internet Service Provider's (ISP's) network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. This room is then called the Main Distribution Frame (MDF). An Intermediate Distribution Frame (IDF) is the location of localized telecommunications equipment such as the interface between the horizontal cabling and the backbone. Mean Time Between Failure (MTBF) and Remote Desktop Protocol (RDP) are not locations of network wiring", "topic": [ "Network Operations" ] }, { "id": "Wired Network-71", "type": 1, "question": "Which methods can be used to assign an IP address to an autonomous AP? (Choose all that apply.)", "choices": [ "DHCP", "Static through the CLI", "TFTP", "DNS" ], "answer": "A,B", "solution": "An autonomous AP tries to use Dynamic Host Configuration Protocol (DHCP) by default, but you can configure a static address if necessary", "topic": [ "Implementing Autonomous and Cloud Deployments" ] }, { "id": "Wired Network-72", "type": 1, "question": "What can be verified with the output of **show ipv6 protocols**? (Choose two.)", "choices": [ "The router ID", "Which areas are normal, stub, and not-so-stubby areas", "The interfaces participating in the routing process", "The ID of the designated router" ], "answer": "A,C", "solution": "With **show ipv6 protocols** you can verify the router ID as well as which interface are participating in the routing process", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-73", "type": 1, "question": "Which of the following are not general troubleshooting steps? (Choose all that apply.)", "choices": [ "Identify the problem", "Establish a theory of probable cause", "Test the theory to determine cause", "Verify that the client's Internet Protocol (IP) configuration is correct", "Establish a plan of action to resolve the problem and identify potential effects", "Verify that the router is forwarding.", "Implement the solution or escalate as necessary", "Verify full system functionality and, if applicable, implement preventive measures", "Document findings, actions, and outcomes" ], "answer": "D,F", "solution": "Verifying that a router is functioning and forwarding traffic and verifying that a client's IP configuration is correct are not considered general troubleshooting steps. You might perform these two steps as a subset of general troubleshooting steps", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-74", "type": 1, "question": "Which of the following are distribution algorithms you can configure on a route group? (Choose two.)", "choices": [ "Longest Idle", "Top Down", "Bottom Up", "Circular", "Randomized" ], "answer": "B,D", "solution": "Top Down and Circular are the two options available for a route group. Line groups also have the Longest Idle option, but this is not available on a route group", "topic": [ "Unified CM Call Routing and Digit Manipulation" ] }, { "id": "Wired Network-75", "type": 1, "question": "Which protocols do media resources use to communicate with Unified CM? (Choose three.)", "choices": [ "DSP Registration Protocol (DRP)", "Skinny Client Control Protocol (SCCP)", "Session Initiation Protocol (SIP)", "Hypertext Transfer Protocol (HTTP)", "Media Gateway Control Protocol (MGCP)" ], "answer": "B,C,D", "solution": "Media resources either register using SCCP or, for some conference resources, a combination of SIP and HTTPS", "topic": [ "Unified CM Call Control Features" ] }, { "id": "Wired Network-76", "type": 1, "question": "Which of the following statements are CORRECT regarding FCoE NPV? (Choose three answers.)", "choices": [ "FCoE NPV implements FIP snooping as an extension to the NPV function while retaining the traffic-engineering, vsan-management, administration, and troubleshooting aspects of NPV.", "Connectivity from an FCoE NPV bridge to the FCF is supported only over point-to-multipoint links.", "From a control plane perspective, FCoE NPV performs proxy functions toward the FCF and the hosts in order to load-balance logins from the hosts evenly across the available FCF uplink ports.", "An FCoE NPV bridge is VSAN-aware and capable of assigning VSANs to the hosts." ], "answer": "A,C,D", "solution": "Connectivity from an FCoE NPV bridge to the FCF is supported only over point-to-point links", "topic": [ "Implement FCoE Unified Fabric" ] }, { "id": "Wired Network-77", "type": 1, "question": "Which of the following configurations are supplied for FlexVPN? (Choose two.)", "choices": [ "IKEv2 profile", "IPsec profile", "IKEv2 policy", "IPsec policy" ], "answer": "B,C", "solution": "FlexVPN provides a default IPsec profile and IKEv2 policy", "topic": [ "FlexVPN Configuration and Troubleshooting" ] }, { "id": "Wired Network-78", "type": 1, "question": "Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router? (Choose two.)", "choices": [ "172.16.0.5", "172.16.1.100", "172.16.1.198", "172.16.2.255", "172.16.3.0", "172.16.3.255" ], "answer": "D,E", "solution": "The router's IP address on the E0 interface is 172.16.2.1/23, which is a 255.255.254.0. This makes the third octet a block size of 2. The router's interface is in the 2.0 subnet, and the broadcast address is 3.255 because the next subnet is 4.0. The valid host range is 2.1 through 3.254. The router is using the first valid host address in the range", "topic": [ "IP Subnetting, Troubleshooting IP, and Introduction to NAT" ] }, { "id": "Wired Network-79", "type": 1, "question": "Given the IP address of `fe80::308c:fee2:2abc:8337`, what do we know about this address? (Choose two.)", "choices": [ "It is an IPv4 address.", "It is an IPv6 address.", "The subnet mask is 0.", "It is not routable." ], "answer": "B,D", "solution": "IPv4 addresses are 32 bits long and consist of 4 octets, which is a group of 8 bits each, separated by a period (.) They are normally presented in dotted decimal notation, meaning each group of 8 bits is shown as a decimal number less than 256, with a period (.) between each number, such as `192.168.1.1`. IPv6 addresses are a 128-bit IP address presented as eight segments of four hexadecimal numbers each, separated by a colon (:). Where the hexadecimal number is 0 in any segment, it can be omitted and replaced simply by double colons (::). If consecutive segments are 0, they can all be replaced by a single set of double colons, but only one set of double colons can exist in any given address—otherwise you wouldn't be able to tell how many sets of zero are in each part of the IP address. In the example, `fe80::308c:fee2:dabc:8337`, the expanded address would be `fe80:0:0:0:308c:fee2:dabc:8337`. The first three segments (48 bits) are the site prefix, and the fourth segment (16 bits) is the subnet ID, also known as private topology or site topology. The site prefix and subnet number together constitute the subnet prefix. The last four segments (64 bits) are the interface ID, also sometimes called a token. The subnet ID in this case would be `0`. IPv6 addresses do not have a subnet mask. The value of the first octet, `fe80`, tells us that this number is a link-local address, an internal number only and not routable", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-80", "type": 1, "question": "Which of the following is a valid reason for upgrading a pair of Nexus 9336PQ ACI switches to second-generation Nexus 9332C spine hardware? (Choose all that apply.)", "choices": [ "Namespace normalization for ACI Multi-Site support", "Support for 40 Gbps leaf-to-spine connectivity", "Support for CloudSec", "Support for ACI Multi-Pod" ], "answer": "A,C", "solution": "The Nexus 9336PQ is a first-generation spine. It does not support the namespace normalization required for ACI Multi-Site support. It does, however, support 40 Gbps connectivity. Therefore, an upgrade from Nexus 9336PQ would not help increase bandwidth unless 100 Gbps leaf-to-spine connectivity is the desired target. This upgrade would allow enablement of CloudSec. ACI Multi-Pod is supported in first-generation hardware", "topic": [ "Understanding ACI Hardware and Topologies" ] }, { "id": "Wired Network-81", "type": 1, "question": "What two tools will you need to connect an RJ45 connector to an appropriate cable? (Choose two.)", "choices": [ "Punchdown tool", "Network tap", "Crimper", "Cable stripper" ], "answer": "C,D", "solution": "Punchdown tools are used to connect unshielded twisted pair (UTP) and shielded twisted pair (STP) to a patch panel. A network tap is used to monitor network traffic. The crimper and cable stripper are both needed to add an RJ45 connector to the end of a twisted pair cable. Often both tools are included in one. The stripper removes the outer insulation from the group of wires so that they can be individually inserted into the RJ45 jack. Once the wires are properly inserted, the crimping tool is used to force metal teeth into each wire so that an electrical connection can be made", "topic": [ "Networking" ] }, { "id": "Wired Network-82", "type": 1, "question": "Router 1 has a Fast Ethernet interface 0/0 with IP address 10.1.1.1. The interface is connected to a switch. This connection is then migrated to use 802.1Q trunking. Which of the following commands could be part of a valid configuration for Router 1’s Fa0/0 interface? (Choose two answers.)", "choices": [ "interface fastethernet 0/0.4", "dot1q enable", "dot1q enable 4", "trunking enable", "trunking enable 4", "encapsulation dot1q 4" ], "answer": "A,F", "solution": "Of all the commands listed, only the two correct answers are syntactically correct router configuration commands. The command to enable 802.1Q trunking is **encapsulation dot1q** _vlan_id_", "topic": [ "IP Routing in the LAN" ] }, { "id": "Wired Network-83", "type": 1, "question": "You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (Choose two.)", "choices": [ "The router is not configured for the new host.", "The STP configuration on the switch is not updated for the new host.", "The host has an invalid MAC address.", "The switch port the host is connected to is not configured to the correct VLAN membership.", "STP shut down the port." ], "answer": "D,E", "solution": "The best answers are that the VLAN membership for the port is configured incorrectly and that STP shut down the port", "topic": [ "Switching and Virtual LANs" ] }, { "id": "Wired Network-84", "type": 1, "question": "An administrator learns that when she modifies a bridge domain subnet scope to Advertised Externally and adds the bridge domain for advertisement to an OSPF L3Out, the subnet also gets advertised out an EIGRP L3Out. Which of the following options would allow advertisement of the BD subnet out a single L3Out? (Choose all that apply.)", "choices": [ "Remove the bridge domain from the EIGRP L3Out.", "Move one of the L3Outs to a different switch or set of switches.", "Switch the bridge domain back to Private to VRF.", "Use BGP for a dedicated route map per L3Out." ], "answer": "B,D", "solution": "In this case, the administrator is experiencing a common problem. If the requirement is to implement multiple L3Outs in a single VRF, the administrator is advised to either use BGP to benefit from a separate route map per L3Out or to implement the EIGRP and OSPF L3Outs on different switches. This problem may at some point be resolved through an enhancement", "topic": [ "L3Outs" ] }, { "id": "Wired Network-85", "type": 1, "question": "Virtual Private Networks (VPNs) use tunneling, which is the process of encapsulating a data packet within another packet for transmission over a network connection, typically using the Internet. The system encrypts the entire encapsulated data packet for protection. Split tunneling is a variation of this method that provides which of the following advantages? (Choose all that apply.)", "choices": [ "Conservation of VPN bandwidth", "Access to local network devices while connected to the VPN", "Additional data integrity protection", "Faster data transmission through multiplexing" ], "answer": "B,C", "solution": "A basic VPN typically uses full tunneling, in which all of the system's network traffic is encapsulated and encrypted for transmission. Split tunneling is a variation of this method in which only part of the system's traffic uses the VPN connection; the rest is transmitted over the network in the normal manner. Administrators can select which applications and devices use the VPN. Split tunneling can conserve Internet bandwidth used by the VPN and provide access to local services without the need for encapsulation. Split tunneling does not provide additional data integrity protection or improved performance through multiplexing", "topic": [ "Network Security" ] }, { "id": "Wired Network-86", "type": 1, "question": "Which of the following methods can you use to perform the initial setup of a wireless LAN controller? (Choose all that apply.)", "choices": [ "CLI", "TFTP", "FTP", "Web browser" ], "answer": "A,D", "solution": "You can either connect to the controller console port or use a web browser to run through the initial setup procedure. The console will use CLI only, while the service port is used for a web interface. A Cisco 2504 Wireless Controller does not have a service port, so a web browser is used from an Ethernet port instead", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-87", "type": 1, "question": "Of the following fiber connectors, which are used for duplex (two strands instead of one)? (Choose two.)", "choices": [ "ST", "SC", "FC", "LC" ], "answer": "B,D", "solution": "Both SC and LC connectors are square and can be purchased in single or duplex connectors. SC is square and is a push/pull design. ST have a bayonet connection. FC connectors have a threaded coupling. LC connectors are smaller at 1.25 mm and have a latching mechanism to keep them in place, making them good for rack mount use. SC, FC, and ST connectors are 2.5 mm. There are other connectors on the market, but not on the A+ exam", "topic": [ "Hardware" ] }, { "id": "Wired Network-88", "type": 1, "question": "You are a junior IT administrator, and the senior IT administrator has just set up a proxy server, so you need to add settings for it to every workstation. What information do you need to properly set up the proxy server in the Network & Internet group of Windows Settings? (Choose two.)", "choices": [ "The proxy server's IP address", "The router's IP address", "The DHCP server's IP address", "The port number to use for the proxy server" ], "answer": "A,D", "solution": "To set up a proxy server in Windows Settings, you only need the server's IP address and port number to use. You likely should also check the box that says “Don't use the proxy server for local (intranet) addresses.” You would not need the router's IP address or the DHCP server's IP address unless it is also functioning as the proxy server. A router decides if a packet belongs on the LAN or another network, and a DHCP server's job is to provide IP addresses and other settings to devices that log into a network", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-89", "type": 1, "question": "Where are YANG data models published for most vendors and standards bodies? (Choose two.)", "choices": [ "", "", "", "", "" ], "answer": "B,D", "solution": "YANG data models are published on GitHub by de facto convention across several vendors and standards bodies. They are also published and searchable on yangcatalog.org, an IETF project since 2015’s IETF 92 YANG Model Coordination Group and Hackathon. Answer A is incorrect because YANG models are not published to stackoverflow. Answer C is incorrect because YANG models are not published to yang.org", "topic": [ "Model-Driven Telemetry" ] }, { "id": "Wired Network-90", "type": 1, "question": "Imagine that a switch connects through an Ethernet cable to a router, and the router’s host name is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah? (Choose two answers.)", "choices": [ "show neighbors Hannah", "show cdp", "show cdp neighbors", "show cdp neighbors Hannah", "show cdp entry Hannah", "show cdp neighbors detail" ], "answer": "E,F", "solution": "CDP discovers information about neighbors. **show cdp** gives you several options that display more or less information, depending on the parameters used", "topic": [ "Device Management Protocols" ] }, { "id": "Wired Network-91", "type": 1, "question": "Which of the following message types are exchanged by Dynamic Host Configuration Protocol (DHCP) clients and servers during a successful IP address lease renewal transaction? (Choose all that apply.)", "choices": [ "DHCPDISCOVER", "DHCPOFFER", "DHCPINFORM", "DHCPACK", "DHCPREQUEST", "DHCPNAK", "DHCPRENEW", "DHCPRELEASE" ], "answer": "D,E", "solution": "In a successful DHCP address renewal transaction, the client issues a DHCPDREQUEST message, and the server replies with a DHCPACK. DHCPNAK messages are only used in unsuccessful transactions, and the other message types are not used during the address renewal process", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-92", "type": 1, "question": "Why is using the command-line interface (CLI) to configure a large number of devices considered difficult to scale? (Choose two.)", "choices": [ "The CLI is prone to human error and misconfiguration.", "The CLI is quick and efficient for configuring many devices simultaneously.", "Telnet access to the CLI is best practice.", "The command line is used on a device-by-device basis.", "Using APIs is considered a legacy method of configuration." ], "answer": "A,D", "solution": "The CLI is difficult to scale when configuring multiple devices at the same time. This is because the CLI is designed for configuration of a single device on a device-by-device basis. Although scripting can help with some of the burden, it is not the best method for scaling. Consistency in configuration from device to device also becomes more difficult to manage as a network grows", "topic": [ "Foundational Network Programmability Concepts" ] }, { "id": "Wired Network-93", "type": 1, "question": "Traffic shaping is a series of techniques that optimize the allocation of network bandwidth. Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all that apply.)", "choices": [ "Broadcast storming", "Bandwidth throttling", "Network Address Translation (NAT)", "Rate limiting" ], "answer": "B,D", "solution": "Bandwidth throttling is a traffic shaping technique that prevents specified data streams from transmitting too many packets. Rate limiting is a traffic shaping technique that controls the transmission rate of sending systems. A broadcast storm is a type of network switching loop. NAT is a method by which private networks can share registered IP addresses. Neither of these last two is a traffic shaping technique", "topic": [] }, { "id": "Wired Network-94", "type": 1, "question": "Which of the following network devices can employ Access Control Lists (ACLs) to restrict access? (Choose all that apply.)", "choices": [ "Routers", "Servers", "Switches", "Hubs", "Wireless Access Points" ], "answer": "A,B,C,E", "solution": "ACLs restrict access to network devices by filtering user names, Media Access Control (MAC) addresses, IP addresses, or other criteria. Routers, servers, switches, and Wireless Access Points (WAPs) all can use ACLs to control access to them. Hubs are purely physical layer devices that relay electrical or optical signals. They have no access control mechanisms", "topic": [] }, { "id": "Wired Network-95", "type": 1, "question": "An AP is located in the main office on the third floor of a building. The AP is configured to use channel 6 in the 2.4-GHz band. Which of the following conditions might hinder clients as they move around on the third floor and need to roam? (Choose all that apply.)", "choices": [ "Two other APs in the third-floor main office area use channel 6.", "None of the fourth-floor APs directly above the main office use channel 6.", "One of the second-floor APs directly below the main office uses channel 6.", "All of these answers are correct." ], "answer": "A,C", "solution": "The fourth-floor APs will not interfere with the main office AP on channel 6. However, the other third-floor APs and the second-floor AP all use channel 6. Those signals could penetrate the floor and interfere with the main office AP, causing roaming issues", "topic": [ "Planning Coverage with Wireless APs" ] }, { "id": "Wired Network-96", "type": 1, "question": "OSPF interface configuration uses the **ip ospf** _process-id_ **area** _area-number_ configuration command. In which modes do you configure the following settings when using this command?", "choices": [ "The router ID is configured explicitly in router mode.", "The router ID is configured explicitly in interface mode.", "An interface’s area number is configured in router mode.", "An interface’s area number is configured in interface mode." ], "answer": "A,D", "solution": "The configuration enables OSPF and identifies the area number to use with the interface using an interface subcommand in interface mode: the **ip ospf** _process-id_ **area** _area-number_ command. However, to explicitly configure the router ID, the configuration must use the **router-id** _router-id-value_ command, which is a command issued in OSPF router mode", "topic": [ "Implementing OSPF" ] }, { "id": "Wired Network-97", "type": 1, "question": "In a three-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.)", "choices": [ "The design uses a partial mesh of links between access and distribution switches.", "The design uses a full mesh of links between access and distribution switches.", "The design uses a partial mesh of links between the distribution and core switches.", "The end-user and server devices connect directly to distribution layer switches." ], "answer": "A,C", "solution": "The access layer switches, not the distribution layer switches, play the role of connecting to the endpoint devices, whether they are end-user devices or servers. Then, from the access to the distribution layer, each access layer connects to two distribution switches typically, but with no direct connections between access layer switches, creating a mesh (but a partial mesh). A three-tier design, also called a core design, does use core switches, with a partial mesh of links between the distribution and core switches. Basically, each distribution switch connects to multiple core switches but often does not connect directly to other distribution switches", "topic": [ "LAN Architecture" ] }, { "id": "Wired Network-98", "type": 1, "question": "Address Resolution Protocol (ARP) poisoning is the deliberate insertion of fraudulent information into the ARP cache stored on computers and switches. Which of the following types of attack can be facilitated by ARP poisoning? (Choose all that apply.)", "choices": [ "Social engineering", "Man in the middle", "Evil twin", "Session hijacking" ], "answer": "B,D", "solution": "By inserting modified entries into a device's ARP cache, an attacker can cause traffic to be diverted from the correct destination to a system controlled by the attacker. This can enable the attacker to intercept traffic intended for another destination. In a man-in-the-middle attack, the attacker can read the intercepted traffic and even modify it before sending it on to the correct destination. In a session hijacking attack, the attacker can use the intercepted traffic to obtain authentication information, including passwords. Neither of the other two options is facilitated by ARP poisoning. An evil twin is a fraudulent access point on a wireless network. Social engineering is a form of attack in which an innocent user is persuaded by an attacker to provide sensitive information via email or telephone", "topic": [] }, { "id": "Wired Network-99", "type": 1, "question": "Which two of the following are correct regarding resolvable DNS addresses? (Choose two.)", "choices": [ "The Expressway-C is configured with DNS servers that are located on the external network.", "The Expressway-C is configured with DNS servers that are located on the internal network.", "The Expressway-C is configured with DNS servers that are publicly routable.", "The Expressway-E is configured with DNS servers that are publicly routable." ], "answer": "B,D", "solution": "Expressway-C must be resolvable within the internal network and the Expressway-E must be publicly routable with the corresponding DNS server", "topic": [ "Configure Key Cisco Expressway Settings" ] }, { "id": "Wired Network-100", "type": 1, "question": "What do you need to do when using MP-BGP? (Choose two.)", "choices": [ "Activate the IPv6 neighbors in address family configuration mode.", "Activate the IPv6 neighbors in router configuration mode.", "Define the IPv6 neighbors in router configuration mode.", "Define the IPv6 neighbors in address family configuration mode." ], "answer": "A,C", "solution": "When using MP-BGP you need to activate the IPv6 neighbors in address family configuration mode, and define the IPv6 neighbors in router configuration mode", "topic": [ "Troubleshooting BGP" ] }, { "id": "Wired Network-101", "type": 1, "question": "What are the default guest portal types? (Choose three.)", "choices": [ "Self-registered guest portal", "SAML portal", "Sponsored guest portal", "Hotspot guest portal", "Social login guest portal" ], "answer": "A,C,D", "solution": "**Explanation:** There are three default guest portals with ISE: hotspot, self-registered and sponsored guest portals. SAML and social login are options for portal authentication", "topic": [ "Guest Services" ] }, { "id": "Wired Network-102", "type": 1, "question": "Which of the following parameters can be adjusted on an AP to change the size of its cell or BSA? (Choose all that apply.)", "choices": [ "Channel number within a band", "Transmit power", "Supported modulation and coding schemes", "Supported data rates" ], "answer": "B,C,D", "solution": "The transmit power directly affects the range of the AP’s signal. The supported modulation and coding schemes can affect the range because the simpler schemes can tolerate a lower SNR and a weaker signal, implying a greater range. The more complex schemes offer better data rates, but need a better signal quality within a shorter range. The supported data rates also affect the range because they directly affect the modulation and coding schemes that are used", "topic": [ "Planning Coverage with Wireless APs" ] }, { "id": "Wired Network-103", "type": 1, "question": "Which layers of the Open Systems Interconnection (OSI) model do not have protocols in the TCP/IP suite exclusively dedicated to them? (Choose all that apply.)", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "E,F", "solution": "In the TCP/IP suite, the functions of the session layer are primarily implemented in the transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). The presentation layer functions are often implemented in application layer protocols, although some functions, such as encryption, can also be performed by transport or network layer protocols", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-104", "type": 1, "question": "Which of the following is true of a network TAP? (Choose two.)", "choices": [ "TAP stands for terminal access point.", "It is solely used by hackers to intercept packets.", "It is part of a router.", "It allows network admins to monitor network traffic." ], "answer": "A,D", "solution": "A network terminal access point (TAP) connects to a network in an area of concern and creates a copy of traffic, sending it on to monitoring devices. It can be an integral part of network management. TAPs can be active or passive. Passive TAPs do not require power or management, but active TAPs do", "topic": [ "Networking" ] }, { "id": "Wired Network-105", "type": 1, "question": "A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An engineer configures the **vlan 22** and **name Hannahs-VLAN** commands and then exits configuration mode. Which of the following are true? (Choose two answers.)", "choices": [ "VLAN 22 is listed in the output of the show vlan brief command.", "VLAN 22 is listed in the output of the show running-config command.", "VLAN 22 is not created by this process.", "VLAN 22 does not exist in that switch until at least one interface is assigned to that VLAN." ], "answer": "A,B", "solution": "The configured VTP setting of VTP transparent mode means that the switch can configure VLANs, so the VLAN is configured. In addition, the VLAN configuration details, including the VLAN name, show up as part of the running-config file", "topic": [ "Implementing Ethernet Virtual LANs" ] }, { "id": "Wired Network-106", "type": 1, "question": "What advantages does DMVPN offer that a crypto map–based VPN does not? (Choose two.)", "choices": [ "Scalability", "Lack of routing protocol support", "Reduced configuration overhead", "Increased bandwidth requirements" ], "answer": "A,C", "solution": "DMVPN can scale better than a crypto map–based VPN, and the configuration overhead on the hub site is much lower", "topic": [ "Dynamic Multipoint Virtual Private Network (DMVPN)" ] }, { "id": "Wired Network-107", "type": 1, "question": "Your company has two users who want to telecommute from home. They do not have any hardware or software configured or installed. They need to transfer files to the corporate network over a secure link. Your company has a Virtual Private Network (VPN) concentrator that uses Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPSec). The users want to implement the fastest available service. Both of the users’ homes are within 10,000 feet of a central office. Which of the following solutions address this scenario? (Choose all that apply.)", "choices": [ "Each user should install a modem and VPN client software, and configure it to dial through a local Internet Service Provider (ISP) to connect to the company server using L2TP and IPSec.", "Each user should establish a Digital Subscriber Line (DSL) connection by either ordering a new line or using the existing line. Each user then needs to install VPN client software and configure it to connect to the company server using L2TP and IPsec.", "Each user should establish a cable television (CATV) connection with a local broadband ISP. Each user then needs to install VPN client software and configure it to connect to the company server using L2TP and IPSec.", "Each user should install an Integrated Services Digital Network (ISDN) line in his or her house. Each user then needs to install VPN client software and configure it to dial through a local ISP to connect to the company server using L2TP and IPsec." ], "answer": "B,C", "solution": "In this scenario, each user wants the fastest service available to connect to the corporate network over a VPN connection. Of all the services listed here, the only ones that will meet this requirement are DSL and CATV Internet. CATV and DSL Internet connections support high data rates and can be used to connect using a VPN tunnel, so they meet the speed requirement. Each user can use his or her existing CATV connection or use an existing telephone line to install DSL. Once the line is installed, each user needs to install and configure a VPN client on his or her computer and configure it to use L2TP and IPSec. Modem connections are slow—the maximum upstream speed is 33.6 Kbps, and the downstream is 56 Kbps. ISDN's maximum transfer rate for Basic Rate Interface (BRI) is 128 Kbps", "topic": [ "Network Security" ] }, { "id": "Wired Network-108", "type": 1, "question": "Which of the following traits and port numbers are associated with POP3? (Select the two best answers.)", "choices": [ "Receives inbound email on port 110", "Receives inbound email on port 25", "Sends outbound email on port 110", "Sends outbound email on port 25", "Receives inbound email on port 995", "Sends outbound email on port 587" ], "answer": "A,E", "solution": "**Explanation:** POP3 is a protocol used by email clients to receive email. It makes use of either port 110 (considered insecure) or port 995 (a default secure port).\n\n **Incorrect answers:** SMTP is used by email clients to send email. It uses port 25 and the more secure port 587", "topic": [] }, { "id": "Wired Network-109", "type": 1, "question": "Which statements are true regarding ICMP packets? (Choose two.)", "choices": [ "They acknowledge receipt of a TCP segment.", "They guarantee datagram delivery.", "They can provide hosts with information about network problems.", "They are encapsulated within IP datagrams.", "They are encapsulated within UDP datagrams." ], "answer": "C,D", "solution": "Internet Control Message Protocol (ICMP) is used to send error messages through the network, but ICMP does not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet)", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-110", "type": 1, "question": "An EtherChannel bundle allows for link aggregation for which types of ports? (Choose all that apply.)", "choices": [ "Access", "Trunk", "Routed", "Loopback" ], "answer": "A,B,C", "solution": "An EtherChannel bundle allows for a virtual port channel that acts as a Layer 2 (access or trunk) or Layer 3 routed interface", "topic": [ "VLAN Trunks and EtherChannel Bundles" ] }, { "id": "Wired Network-111", "type": 1, "question": "Which of the following topology terms most closely describe the topology created by a Metro Ethernet Tree (E-Tree) service? (Choose two answers.)", "choices": [ "Full mesh", "Partial mesh", "Hub and spoke", "Point-to-point" ], "answer": "B,C", "solution": "A Metro Ethernet E-Tree service uses a rooted point-to-multipoint Ethernet Virtual Connection (EVC), which means that one site connected to the service (the root) can communicate directly with each of the remote (leaf) sites. However, the leaf sites cannot send frames directly to each other; they can only send frames to the root site. Topology design like this that allows some but not all pairs of devices in the group to communicate is called a partial mesh, or hub and spoke, or in some cases a multipoint or point-to-multipoint topology", "topic": [ "WAN Architecture" ] }, { "id": "Wired Network-112", "type": 1, "question": "Suppose a customer wants potential users to enter a username and password before being granted access to the wireless network. Which of the following items could you add to the list of requirements for your wireless design to meet the customer’s requirement?", "choices": [ "RADIUS servers", "AAA servers", "ISE servers", "AES servers" ], "answer": "A,B,C", "solution": "The customer is wanting user authentication, so you could leverage RADIUS, AAA, or ISE servers to meet that need. AES cannot be used to authenticate users because it is an encryption standard", "topic": [ "Wireless Design Requirements" ] }, { "id": "Wired Network-113", "type": 1, "question": "Which of the following RAID levels provide fault tolerance without using parity data? (Choose all that apply.)", "choices": [ "RAID 0", "RAID 1", "RAID 5", "RAID 10" ], "answer": "B,D", "solution": "Redundant Array of Independent Disks (RAID) is a technology for storing data on multiple hard disk drives, providing fault tolerance, increased performance, or both. The various RAID levels provide different levels of functionality and have different hardware requirements. RAID 1 and RAID 10 both use disk mirroring to provide fault tolerance, which does not require parity data. RAID 0 uses data striping only (blocks written to each disk in turn), which does not provide any form of fault tolerance. RAID 5 combines disk striping with distributed storage of parity information", "topic": [ "Network Operations" ] }, { "id": "Wired Network-114", "type": 1, "question": "Which of the following are examples of logical isolation techniques in which network segments share the same physical infrastructure? (Select all that apply.)", "choices": [ "VRF", "VLAN", "VSAN", "VSS" ], "answer": "A,B,C", "solution": "VRFs, VLANs, and VSANs are examples of network virtualization techniques where logical isolation is used", "topic": [ "Data Center Design" ] }, { "id": "Wired Network-115", "type": 1, "question": "Which of the following administrative distances are correct? (Choose two.)", "choices": [ "20 for eBGP", "20 for iBGP", "200 for eBGP", "200 for iBGP" ], "answer": "A,D", "solution": "eBGP has an AD of 20 and iBGP has an AD of 200", "topic": [ "Troubleshooting BGP" ] }, { "id": "Wired Network-116", "type": 1, "question": "Which of the following is considered a SIP URI? (Choose three.)", "choices": [ "username@domain", "123username", "username @domain.com", "8088675309", "+18088675309", "username@172.16.0.50" ], "answer": "A,C,F", "solution": "A SIP URI address is written in _user_ @ _domain_ format in a similar fashion to an email address. This enables SRV schemes to look up SIP servers associated with the DNS name. If a domain is not found (or undefined) but the name is associated with an IP address, the client directly contacts the SIP server at that IP address on port 5060, using UDP as the default protocol", "topic": [ "Initial Configuration Settings on the Cisco Expressway" ] }, { "id": "Wired Network-117", "type": 1, "question": "Which of the following are valid reasons why the leaf and spine datacenter topology is superior to the standard three-tier topology? (Choose all the apply.)", "choices": [ "The leaf and spine topology is less expensive to implement than the three-tier topology.", "In a leaf and spine topology, all data flows require the same number of hops.", "The leaf and spine arrangement uses a full mesh switching topology.", "The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol." ], "answer": "B,C,D", "solution": "The leaf and spine topology uses a full mesh topology in its two layers of switches. This is more expensive than the three-tier topology, but it reduces latency by requiring the same number of hops in the path between any two routers. The use of software-defined networking provides adaptive path determination without the use of the Spanning Tree Protocol (STP) for layer 2 port blocking", "topic": [] }, { "id": "Wired Network-118", "type": 1, "question": "Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a wireless LAN? (Choose all that apply.)", "choices": [ "The 5 GHz frequency has more channels than the 2.4 GHz frequency.", "The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.", "The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.", "The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency." ], "answer": "A,C,D", "solution": "The 5 GHz frequency has 23 channels available in the United States, while the 2.4 GHz frequency has only 11. Many household devices, such as cordless telephones, use the 2.4 GHz frequency band, but relatively few devices use the 5 GHz band. Higher frequencies typically support faster transmission speeds, because with all other conditions equal, they can carry more data in the same amount of time. The 5 GHz frequency typically has a shorter range than 2.4 GHz, because it is less able to penetrate barriers", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-119", "type": 1, "question": "Which of the following statements about Dynamic Host Configuration Protocol (DHCP) snooping are true? (Choose all that apply.)", "choices": [ "DHCP snooping is implemented in network switches.", "DHCP snooping prevents DNS cache poisoning.", "DHCP snooping detects rogue DHCP servers.", "DHCP snooping drops DHCP messages arriving over the incorrect port." ], "answer": "A,C,D", "solution": "DHCP snooping is a feature found in some network switches that prevents rogue DHCP servers from assigning IP addresses to clients. It can also detect when DHCP release or decline messages arrive over a port other than the one on which the DHCP transaction originated. While DHCP snooping can prevent DHCP clients from being assigned an incorrect IP address, it does not directly prevent the poisoning of Dynamic Name System (DNS) server caches with erroneous information", "topic": [] }, { "id": "Wired Network-120", "type": 1, "question": "Which of the following elements must be identical in both the client and server computers to establish a remote Wide Area Network (WAN) connection? (Choose all that apply.)", "choices": [ "The WAN type", "The data link layer protocol", "The authentication method", "The operating system" ], "answer": "A,B,C", "solution": "Although the computers do not have to use hardware made by the same manufacturer, both must use the same basic type of WAN connection, such as a leased line, a modem and PSTN line, or an Internet connection. Both of the computers must also use the same data link layer protocol, such as PPP, to establish a remote network connection. Most remote network connections use some form of authentication mechanism, even if it is nothing more than the exchange of a username and cleartext password. To establish the remote network connection, both computers must be configured to use the same type of authentication, even if it is no authentication at all. As long as all of the other elements are in place, such as the physical layer connection and the protocols, there is no need for both of the computers involved in a remote network connection to be running the same operating system", "topic": [ "Network Security" ] }, { "id": "Wired Network-121", "type": 1, "question": "Port security can be configured using which of the following methods? (Choose three answers.)", "choices": [ "Manual Database Configuration", "Auto-Learning without CFS Distribution", "Fabric Binding", "Auto-Learning with CFS Distribution" ], "answer": "A,B,D", "solution": "Fabric binding binds the fabric at the switch level, whereas port security binds devices at the interface level", "topic": [ "Storage Security" ] }, { "id": "Wired Network-122", "type": 1, "question": "What are the two categories of IGP protocols? (Choose two.)", "choices": [ "Link state", "Static", "Distance vector", "EGP" ], "answer": "A,C", "solution": "Distance-vector (DV) and link-state (LS) are the two routing protocols to remember", "topic": [ "Introduction to IP Routing" ] }, { "id": "Wired Network-123", "type": 1, "question": "Which probes are used to trigger the SNMPQUERY probe to query a NAD? (Choose two.)", "choices": [ "RADIUS", "SNMPQUERY", "HTTP", "SNMPTRAP" ], "answer": "A,D", "solution": "**Explanation:** The SNMPQUERY probe periodically queries all the NADs configured with SNMP strings, but it is also a reactive probe. The SNMPQUERY probe reactively queries a NAD when the RADIUS probe receives an accounting START message or when an SNMP trap is received", "topic": [ "Profiling" ] }, { "id": "Wired Network-124", "type": 1, "question": "What network access control method helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium? (Choose two.)", "choices": [ "TCP/IP", "CSMA/CD", "HTTPS", "TFTP", "CSMA/CA" ], "answer": "B,E", "solution": "Option B carrier sense multiple access with collision detection (CSMA/CD) helps packets that are transmitted simultaneously from different hosts share bandwidth evenly. You might think that CSMA/CD would be the only correct answer, but always think in terms of what is the best answer out of all the options, and B and E (CSMA/CA) are both correct. The exam will never have cut-and-dry answers", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-125", "type": 1, "question": "You are seeking to upgrade your company's IEEE 802.11b access point to one that provides faster transmission speeds for your newer workstations. Which of the following wireless networking standards are capable of supporting speeds faster than the 11 Mbps of 802.11b but that are still backward compatible with your existing IEEE 802.11b workstations? (Choose all that apply.)", "choices": [ "IEEE 802.11", "Bluetooth", "IEEE 802.11g", "IEEE 802.11a", "IEEE 802.11n" ], "answer": "C,E", "solution": "IEEE 802.11g supports transmission speeds up to 54 Mbps, and it is backward compatible with 802.11b equipment. IEEE 802.11n is also backward compatible with 802.11b, and it can run at speeds up to 600 Mbps. Bluetooth is not compatible with any of the IEEE 802.11 standards. IEEE 802.11 cannot run at 54 Mbps, and though 802.11a can, it is not compatible with 802.11b", "topic": [] }, { "id": "Wired Network-126", "type": 1, "question": "Which of the following configurations can be used to mark VOIP-TELEPHONY classified traffic with a DSCP EF value? (Choose two)", "choices": [ "a.\n\npolicy-map INBOUND-MARKING-POLICY\r\n class VOIP-TELEPHONY\r\n mark dscp ef", "b.\n\npolicy-map INBOUND-MARKING-POLICY\r\n class VOIP-TELEPHONY\r\n set ip dscp ef", "c.\n\npolicy-map INBOUND-MARKING-POLICY\r\n class VOIP-TELEPHONY\r\n set dscp ef" ], "answer": "B,C", "solution": "The commands **set ip dscp** and **set dscp** can be used to mark classified traffic. The command **mark ip dscp** does not exist", "topic": [ "Quality of Service (QoS)" ] }, { "id": "Wired Network-127", "type": 1, "question": "What EIGRP information is held in RAM and maintained through the usage of Hello and update packets? (Select all that apply.)", "choices": [ "DUAL table", "Neighbor table", "Topology table", "Successor route" ], "answer": "B,C", "solution": "EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and also maintained with the use of Hello packets", "topic": [ "Routing Protocols" ] }, { "id": "Wired Network-128", "type": 1, "question": "Which of the following layers of the Open Systems Interconnection (OSI) model typically have dedicated physical hardware devices associated with them? (Choose all that apply.)", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "A,B,C", "solution": "The physical layer of the OSI model is associated with hubs, cables, and network interface adapters. The data link layer is associated with bridges and switches. The network layer is associated with routers. The transport, session, presentation, and application layers are typically not associated with dedicated hardware devices", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-129", "type": 1, "question": "What are the IEEE standards that improve the original STP standard and lower convergence time? (Choose two answers.)", "choices": [ "STP", "RSTP", "Root Guard", "802.1w", "PortFast", "Trunking" ], "answer": "B,D", "solution": "The IEEE 802.1w standard, called Rapid STP or RSTP, provides faster STP", "topic": [ "Implementing Data Center Switching Protocols" ] }, { "id": "Wired Network-130", "type": 1, "question": "A LAN design uses a Layer 3 EtherChannel between two switches SW1 and SW2, with port-channel interface 1 used on both switches. SW1 uses ports G0/1 and G0/2 in the channel. However, only interface G0/1 is bundled into the channel and working. Think about the configuration settings on port G0/2 that could have existed before adding G0/2 to the EtherChannel. Which answers identify a setting that could prevent IOS from adding G0/2 to the Layer 3 EtherChannel? (Choose two answers.)", "choices": [ "A different STP cost (spanning-tree cost _value_ )", "A different speed (speed _value_ )", "A default setting for switchport (switchport)", "A different access VLAN (switchport access vlan _vlan-id_ )" ], "answer": "B,C", "solution": "With a Layer 3 EtherChannel, two configuration settings must be the same on all the physical ports, specifically the speed and duplex as set with the **speed** and **duplex** commands. Additionally, the physical ports and port-channel port must all have the **no switchport** command configured to make each act as a routed port. So, having a different speed setting, or being configured with **switchport** rather than **no switchport** , would prevent IOS from adding interface G0/2 to the Layer 3 EtherChannel", "topic": [ "IP Routing in the LAN" ] }, { "id": "Wired Network-131", "type": 1, "question": "Your Wi-Fi network is experiencing some interference, which is causing poor performance and making it unstable. Which of the following might help? (Choose two.)", "choices": [ "Enable SSID broadcast.", "Disable SSID broadcast.", "Increase the WAP's power setting.", "Choose a different channel." ], "answer": "C,D", "solution": "The answer will depend on the exact situation, but if your WAP is experiencing interference from other WAPs or networks, you may want to lower, rather than raise, the signal strength. You would want to run a network analyzer and choose the channel with the least traffic, or optionally, if the WAP allows, let it choose the best channel for you. Installing an antenna with a lower gain might also work", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-132", "type": 1, "question": "Which of the following are valid forms of Layer 2 extension to outside switches in ACI? (Choose all that apply.)", "choices": [ "Remote Leaf Layer 2 domain extension", "AAEP extension", "BD extension", "EPG extension" ], "answer": "A,C,D", "solution": "There is no such thing as AAEP extension. AAEP EPG is a variant of EPG extension. The other three answers are all correct", "topic": [ "Extending Layer 2 Outside ACI" ] }, { "id": "Wired Network-133", "type": 1, "question": "Which of the following are CFS modes of distribution? (Choose three answers.)", "choices": [ "Coordinated distributions", "Unrestricted coordinated distributions", "Uncoordinated distributions", "Unrestricted uncoordinated distributions" ], "answer": "A,C,D", "solution": "CFS uses three modes of distribution: coordinated distributions, uncoordinated distributions, and unrestricted uncoordinated distributions. Coordinated distributions allow only one distribution in the fabric at any given time. Uncoordinated distributions allow multiple parallel distributions in the fabric except when a coordinated distribution is in progress. Unrestricted uncoordinated distributions allow multiple parallel distributions in the fabric in the presence of an existing coordinated distribution", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-134", "type": 1, "question": "A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.)", "choices": [ "The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode.", "The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode.", "The ip default-gateway 172.16.2.254 command in global configuration mode.", "The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1." ], "answer": "B,C", "solution": "To allow SSH or Telnet access, a switch must have a correct IP configuration. That includes the configuration of a correct IP address and mask on a VLAN interface. That VLAN interface then must have a path out of the switch via ports assigned to that VLAN. In this case, with all ports assigned to VLAN 2, the switch must use interface VLAN 2 (using the **interface vlan 2** configuration command)", "topic": [ "Configuring Basic Switch Management" ] }, { "id": "Wired Network-135", "type": 1, "question": "Ralph is working on his company's perimeter network, which has five web servers running Linux, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, Ralph types the following command on one of the systems: `ping 192.168.1.76` . Which of the following systems might Ralph be working on? (Choose all that apply.)", "choices": [ "The Windows-based firewall", "The Cisco router", "The CSU/DSU console", "One of the Linux web servers" ], "answer": "A,B,D", "solution": "Windows, Linux, and the Cisco IOS operating systems all include the `ping` utility. The CSU/DSU cannot run a `ping` command", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-136", "type": 1, "question": "A switch’s port Gi0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.)", "choices": [ "The switch puts the interface into an err-disabled state when the first frame arrives.", "The switch generates syslog messages about the violating traffic for the first frame.", "The switch increments the violation counter for Gi0/1 by 1.", "The switch discards both the first and second frame." ], "answer": "B,C", "solution": "First, about the two incorrect answers: In restrict mode, the arrival of a frame that violates the port security policy does not cause the switch to put the interface into err-disabled state. It does cause the switch to discard any frames that violate the policy, but it leaves the interface up and does not discard frames that do not violate the security policy, like the second frame that arrives", "topic": [ "Implementing Switch Port Security" ] }, { "id": "Wired Network-137", "type": 1, "question": "Which of the following protocols are responsible for assigning IP addresses to hosts? (Choose all that apply.)", "choices": [ "Dynamic Host Configuration Protocol (DHCP)", "Address Resolution Protocol (ARP)", "Domain Name System (DNS)", "File Transfer Protocol (FTP)", "Bootstrap Protocol (BOOTP)" ], "answer": "A,E", "solution": "DHCP and BOOTP are both designed to allocate IP addresses to hosts. The primary difference between the two is that DHCP is capable of dynamic allocation and BOOTP is not. DNS resolves hostnames into IP addresses, and ARP resolves IP addresses into data link layer hardware (or MAC) addresses. FTP is designed to transfer files between systems and has no role in IP address allocation", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-138", "type": 1, "question": "Which payload types fall within the dynamic range for RTP? (Choose three.)", "choices": [ "0", "18", "96", "114", "127", "151" ], "answer": "C,D,E", "solution": "Dynamic RTP payload types are 96 through 127", "topic": [ "VoIP Protocols: RTP, RTCP, and DTMF Relay" ] }, { "id": "Wired Network-139", "type": 1, "question": "Which of the following are likely reasons you would configure a LAG on a WLC?", "choices": [ "To bind two controllers together into a logical HA pair", "To make client roaming more efficient", "To load-balance traffic across multiple links", "To add redundancy to the WLC’s distribution ports" ], "answer": "C,D", "solution": "The LAG (link aggregation group) bundles multiple physical ports into a single logical one. This is done to add redundancy, in case one or more distribution port links fail, as well as to load-balance traffic across the multiple links", "topic": [ "Designing High Availability" ] }, { "id": "Wired Network-140", "type": 1, "question": "An engineer has successfully configured a Layer 3 switch with SVIs for VLANs 2 and 3. Hosts in the subnets using VLANs 2 and 3 can ping each other with the Layer 3 switch routing the packets. The next week, the network engineer receives a call that those same users can no longer ping each other. If the problem is with the Layer 3 switching function, which of the following could have caused the problem? (Choose two answers.)", "choices": [ "Six (or more) out of 10 working VLAN 2 access ports failing due to physical problems", "A shutdown command issued from interface VLAN 4 configuration mode", "VTP on the switch removing VLAN 3 from the switch’s VLAN list", "A shutdown command issued from VLAN 2 configuration mode" ], "answer": "C,D", "solution": "First, for the correct answers, a Layer 3 switch will not route packets on a VLAN interface unless it is in an up/up state. A VLAN interface will only be up/up if the matching VLAN (with the same VLAN number) exists on the switch. If VTP deletes the VLAN, then the VLAN interface moves to a down/down state, and routing in/out that interface stops. Also, disabling VLAN 2 with the **shutdown** command in VLAN configuration mode also causes the matching VLAN 2 interface to fail, which makes routing on interface VLAN 2 stop as well", "topic": [ "IP Routing in the LAN" ] }, { "id": "Wired Network-141", "type": 1, "question": "VPN implementations are categorized into which of the following two general groups?", "choices": [ "Encrypted VPNs", "Non-encrypted VPNs", "Site-to-site (LAN-to-LAN) VPNs", "Remote-access VPNs" ], "answer": "C,D", "solution": "VPN implementations are categorized into two general groups: Site-to-site VPNs, which enable organizations to establish VPN tunnels between two or more network infrastructure devices in different sites so that they can communicate over a shared medium such as the Internet, and remote-access VPNs, which enable users to work from remote locations such as their homes, hotels, and other premises as if they were directly connected to their corporate network", "topic": [ "Introduction to Virtual Private Networks (VPNs)" ] }, { "id": "Wired Network-142", "type": 1, "question": "Which of the following rule types need to be created for CWA? (Choose two.)", "choices": [ "A WebAuth authentication rule must be created for the authentication through the web portal.", "An authorization rule must be created to redirect the user to the CWA portal.", "An authentication rule must be created to permit access to users who have successfully authorized through the CWA portal.", "An authorization rule must be created to permit access to users who have successfully authenticated through the CWA portal.", "A WebAuth authentication rule must be created to redirect the end user to the CWA portal." ], "answer": "B,D", "solution": "**Explanation:** The first rule should match if no more specific authorization rule is used, and it should redirect the user to the CWA portal. The second rule type should exist above the redirection rule, and it should allow access to the user after the user successfully authenticates to the CWA portal", "topic": [ "Web Authentication" ] }, { "id": "Wired Network-143", "type": 1, "question": "What are the conditions for selecting an outbound dial peer when performing a dial peer match with **dial-peer hunt 0**? (Choose three.)", "choices": [ "Random selection", "Longest match in phone number", "Least recent use", "Explicit preference", "Round-robin selection" ], "answer": "A,B,D", "solution": "dial-peer hunt 0** defines an outbound dial peer match that uses longest match in phone number, explicit preference, and random selection", "topic": [ "CUBE Call Routing and Digit Manipulation" ] }, { "id": "Wired Network-144", "type": 1, "question": "Which of the following are levels of accreditation for Cisco certification? (Choose three.)", "choices": [ "Associate", "Entry", "Authority", "Expert", "Maestro" ], "answer": "A,B,D", "solution": "The five levels of Cisco accreditation are Entry, Associate, Professional, Expert, and Architect", "topic": [ "Introduction to Cisco DevNet Associate Certification" ] }, { "id": "Wired Network-145", "type": 1, "question": "Which of the following statements about POAP are INCORRECT? (Choose two answers.)", "choices": [ "For the POAP feature to function, the switch software image must support POAP.", "Checking for a USB device containing the configuration script file in POAP mode is supported on the Cisco Nexus 9000 Series switches.", "The POAP process requires a minimum DHCP lease period of 1800 seconds (30 minutes).", "POAP does not support provisioning of the switch after it has been configured and is operational." ], "answer": "B,C", "solution": "Checking for a USB device containing the configuration script file in POAP mode is NOT supported on the Cisco Nexus 9000 series switches. POAP requires a minimum DHCP lease period of 3600 seconds (1 hour). POAP checks the DHCP lease period. If the DHCP lease period is set to less than 3600 seconds (1 hour), POAP does not complete the DHCP negotiation", "topic": [ "Evaluate Automation and Orchestration Technologies" ] }, { "id": "Wired Network-146", "type": 1, "question": "The Cisco Application Policy Infrastructure Controller serves as the single point of automation and fabric element management in which environments? (Choose two answers.)", "choices": [ "Cloud-based environment", "Storage environment", "Physical server environment", "Virtual environment" ], "answer": "C,D", "solution": "The Cisco APIC uses the concept of endpoints and policies. The endpoints are virtual machines (VMs) or physical servers", "topic": [ "Describe Cisco Application Centric Infrastructure" ] }, { "id": "Wired Network-147", "type": 1, "question": "Which of the following SNMP messages are typically sent by an SNMP agent?", "choices": [ "Trap", "Get Request", "Inform", "Set Request" ], "answer": "A,C", "solution": "SNMP agents reside on a device being managed. When an event happens about which the device wants to inform the SNMP manager, the agent sends either an SNMP Trap or SNMP Inform to the SNMP manager. The SNMP manager normally sends an SNMP Get Request message to an agent to retrieve MIB variables or an SNMP Set Request to change an MIB variable on the agent", "topic": [ "Miscellaneous IP Services" ] }, { "id": "Wired Network-148", "type": 1, "question": "Which of the following are not valid Class A network IDs? (Choose two answers.)", "choices": [ "0.0.0", "130.0.0.0", "127.0.0.0", "0.0.0" ], "answer": "B,C", "solution": "Class A networks have a first octet in the range of 1–126, inclusive, and their network IDs have a 0 in the last three octets. 130.0.0.0 is actually a Class B network (first octet range 128–191, inclusive). All addresses that begin with 127 are reserved, so 127.0.0.0 is not a Class A network", "topic": [ "Analyzing Classful IPv4 Networks" ] }, { "id": "Wired Network-149", "type": 1, "question": "Which of the following are ways that an SGT can be assigned to network traffic? (Choose three.)", "choices": [ "Through manual binding of the IP address to an SGT", "Through manual configuration on the switch port", "Through dynamic assignment by the network access device", "Through dynamic assignment by the 802.1X authorization result", "Through manual configuration in the NAC Agent profile", "Through dynamic assignment by AnyConnect Network Access Manager" ], "answer": "A,B,D", "solution": "**Explanation:** In order to use a Security Group Tag, the tag needs to be assigned in a process known as classification. Tags can be assigned dynamically and downloaded as a result of an ISE authorization, be assigned manually at the port level, and mapped to IP addresses and downloaded to SGT-capable devices", "topic": [ "TrustSec and MACsec" ] }, { "id": "Wired Network-150", "type": 1, "question": "If you have a server with dual power supplies, each of which is connected to a separate Uninterruptible Power Supply (UPS), with each UPS connected to a separate building power circuit connected to a backup generator, which of the following failures can the server survive and keep running indefinitely? (Choose all that apply.)", "choices": [ "Failure of one server power supply", "Failure of one UPS", "Failure of one building power circuit", "Failure of the building backup generator" ], "answer": "A,B,C,D", "solution": "If one of the server's power supplies fails, the other will continue to function. If one of the UPSs fails, the server will continue to run using the other. If one of the building power circuit breakers trips, the server will continue to run using the other one. If the building's backup generator fails, the server will continue to run as long as the building still has outside power", "topic": [ "Network Operations" ] }, { "id": "Wired Network-151", "type": 1, "question": "Your router is only receiving connected routes and summary routes for a neighboring EIGRP router. What are possible reasons for this? (Choose two.)", "choices": [ "A distribute list has been applied inbound on the interface connected to the neighbor and is filtering out all the routes that are not connected and all the summary routes and preventing them from being learned.", "The wrong interface has been configured to participate in the routing process, and a neighborship has been only partially formed.", "The eigrp stub command has been configured on your router.", "The interface on your router is configured as passive." ], "answer": "A,C", "solution": "If your router is only receiving connected routes and summary routes for a neighboring EIGRP router it is possible that a distribute-list has been applied to an interface or the **eigrp stub** command was configured on the router", "topic": [ "EIGRPv6" ] }, { "id": "Wired Network-152", "type": 0, "question": "Your boss has asked you to maximize the RAM in their laptop computer. You check the specifications and discover that the maximum system RAM is 32 GB of DDR4 RAM. The laptop currently has 16 GB onboard RAM and one empty slot. Which of the following RAM modules will you purchase?", "choices": [ "One 16 GB SODIMM", "One 32 GB SODIMM", "One 16 GB DIMM", "One 32 GB DIMM" ], "answer": "A", "solution": "A: One 16 GB SODIMM - This is a correct choice. SODIMM is the type of RAM used in laptops and 16 GB will bring the total RAM to the maximum of 32 GB.\n\nB: One 32 GB SODIMM - This is not a correct choice. Although SODIMM is the correct type of RAM for a laptop, adding a 32 GB module would exceed the system's maximum RAM capacity.\n\nC: One 16 GB DIMM - This is not a correct choice. DIMM is a type of RAM used in desktop computers, not laptops.\n\nD: One 32 GB DIMM - This is not a correct choice. Not only is DIMM the wrong type of RAM for a laptop, but a 32 GB module would also exceed the system's maximum RAM capacity.", "topic": [ "Mobile Devices" ], "original_solution": "You will always check the device's documentation before purchasing components to ensure compatibility. In a laptop, RAM is often soldered directly onto the motherboard (onboard) and isn't meant to be replaced by most users. Since the maximum system RAM is 32 GB, you would need one 16 GB RAM module to bring it up to that total. The SO in SODIMM stands for Small Outline and is the type of RAM module used in devices like laptops and sometimes printers. DIMMs (Dual Inline Memory Modules) are used in desktop computers" }, { "id": "Wired Network-153", "type": 0, "question": "Your customer brought you a laptop with an internal battery that will no longer charge. You have told them that replacing the battery will be no problem at all. Which of the following will you need to do first?", "choices": [ "Remove the back cover.", "Remove the keyboard.", "Disconnect the external power.", "Disconnect the LCD panel." ], "answer": "C", "solution": "A: Remove the back cover - This could be the first step in some laptop models where the battery is located at the back. However, it's not always the case for all laptops.\n\nB: Remove the keyboard - This is not typically the first step in replacing a laptop battery. In most laptops, the battery is not located under the keyboard.\n\nC: Disconnect the external power - This is the correct first step. Before opening up a laptop for any kind of hardware maintenance or replacement, it's important to disconnect any power sources to avoid electrical shock or damage to the components.\n\nD: Disconnect the LCD panel - This is not typically necessary for replacing a laptop battery. The LCD panel and the battery are usually separate components.", "topic": [ "Mobile Devices" ], "original_solution": "Legacy laptops may have a battery that is removable and replaceable by sliding a connector or removing a few screws from the back of the case, but you might not be able to find a compatible replacement. Modern laptops have internal batteries. Before removing the back (bottom) cover of the laptop to get to the battery, you must disconnect the power to avoid getting shocked or damaging the laptop. You'll also want to be certain that you can purchase a compatible battery both in features and size/shape. Most do not require you to remove the keyboard or LCD panel to reach the battery, but again before doing either of those, the power should be disconnected, and you will have researched the laptop" }, { "id": "Wired Network-154", "type": 0, "question": "What is the highest possible data transfer rate on a Storage Area Network (SAN) using Fibre Channel?", "choices": [ "8 Gbps", "16 Gbps", "32 Gbps", "128 Gbps", "256 Gbps" ], "answer": "D", "solution": "The current Fibre Channel standard calls for a maximum data transfer rate of 128 gigabits per second (Gbps), for a nominal throughput of 12,800 megabytes per second (MBps)", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-155", "type": 0, "question": "You have received the following message while implementing VRF-Lite: % Interface GigabitEthernet0/0 IPv4 disabled and address(es) removed due to enabling VRF GREEN. What is the reason for this?", "choices": [ "You id not issue the vrf GREEN command in global configuration mode.", "You can’t enable VRF-Lite on an IPv4 interface.", "You used the vrf forwarding GREEN command on the interface.", "You issued the shutdown command on GigabitEthernet0/0." ], "answer": "C", "solution": "When you associate an interface with a VRF you will receive a syslog message indicating that IPv4 has been disabled on an interface and any IPv4 addresses have been removed. Therefore, you will need to configure IPv4 addressing on the interface", "topic": [ "VRF, MPLS, and MPLS Layer 3 VPNs" ] }, { "id": "Wired Network-156", "type": 0, "question": "Which TCP/IP protocol uses port 445?", "choices": [ "FTP", "SSH", "SMB", "SNMP" ], "answer": "C", "solution": "Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It originally ran on NetBIOS over UDP using ports 137/138 and over TCP using ports 137 and 139, but it's now part of the TCP/IP stack and uses port 445. Running on NetBIOS allows SMB to facilitate file sharing on a single network, while being part of TCP/IP allows it to facilitate file sharing across the Internet. By itself, SMB is not secure, so it needs other network appliances or software to secure the data being sent over its port(s). File Transfer Protocol (FTP) uses ports 20/21, Secure Shell (SSH) uses port 22, and Simple Network Management Protocol (SNMP) uses ports 161/162", "topic": [ "Networking" ] }, { "id": "Wired Network-157", "type": 0, "question": "If an alarm goes unacknowledged in PI, what will happen to it?", "choices": [ "Nothing; the alarm will be active forever until it is acknowledged.", "After 15 days, the alarm will be automatically acknowledged.", "After 1 hour, the alarm will be automatically acknowledged.", "After 1 day, the AP that is the source of the alarm will be disabled." ], "answer": "B", "solution": "Unacknowledged alarms are automatically acknowledged after 15 days", "topic": [ "Managing Cisco Wireless Networks" ] }, { "id": "Wired Network-158", "type": 0, "question": "Which LSA type describes routes outside the area but still within the OSPF routing domain (inter-area routes)?", "choices": [ "1", "2", "3", "5" ], "answer": "C", "solution": "Type 3 LSAs describe routes outside the area but still within the OSPF routing domain (interarea routes)", "topic": [ "Troubleshooting OSPFv2" ] }, { "id": "Wired Network-159", "type": 0, "question": "Which option describes how a switch in Rapid PVST+ mode responds to a topology change?", "choices": [ "It immediately deletes dynamic MAC addresses that were learned by all ports on the switch.", "It sets a timer to delete all MAC addresses that were learned dynamically by ports in the same STP instance.", "It sets a timer to delete dynamic MAC addresses that were learned by all ports on the switch.", "It immediately deletes all MAC addresses that were learned dynamically by ports in the same STP instance." ], "answer": "B", "solution": "When Rapid PVST+ detects a topology change, the protocol does the following: it starts the topology change (TC) while a timer with a value equal to twice the hello time for all the non-edge root and designated ports, if necessary, then flushes the MAC addresses associated with all these ports", "topic": [ "Implementing Data Center Switching Protocols" ] }, { "id": "Wired Network-160", "type": 0, "question": "You need to crimp on a connector using an RJ-45 connector. Which pin-out configuration would you use to connect a host to a switch?", "choices": [ "UTP", "Straight-through", "Crossover", "Rolled" ], "answer": "B", "solution": "You would use a straight-through cable to connect a host to a switch, and the typical pin-out is called T568A", "topic": [ "Networking Connectors and Wiring Standards" ] }, { "id": "Wired Network-161", "type": 0, "question": "Which of the following routing protocols for the campus has the highest architecture flexibility, proper route summarization, and no limitation to the number of tiers?", "choices": [ "EIGRP", "OSPF", "RIP", "IS-IS" ], "answer": "A", "solution": "Explanation: Enhanced Interior Gateway Routing Protocol (EIGRP) has the highest architecture flexibility without limitations to the number of tiers while including proper route summarization. Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS) have inherent limitations as the number of tiers increases that make them both not as flexible. The most flexible option is not listed, which is Border Gateway Protocol (BGP)", "topic": [ "Scalable Enterprise Campus Architecture Design" ] }, { "id": "Wired Network-162", "type": 0, "question": "A user calls to report that they can't access the Internet or a corporate server. However, they are still able to print to a printer nearby. They have not received any error messages. Other users in the area are also unable to access the Internet. What is most likely the problem?", "choices": [ "IP address conflict", "Default gateway down", "Incorrect subnet mask", "Network card failure" ], "answer": "B", "solution": "You can immediately rule out client-side hardware issues because the user can connect to some resources. You need to figure out why they can't connect to others. This is most likely caused by one of two things: a configuration issue or a connectivity device (such as a router) problem. Since it's affecting multiple people, it's probably something to do with the router (default gateway)", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-163", "type": 0, "question": "What twisted pair connectors are commonly used with telephone wire?", "choices": [ "RJ-45", "Coaxial", "RJ-11", "FC" ], "answer": "C", "solution": "RJ-11 accommodates two pair of wires and is the standard for household or office wired telephone connections. RJ-45 is the four pair connector used for twisted-pair Ethernet. Coaxial is a type of network cable and would have a BNC connector (with a locking mechanism) or an F-type connector. FC is a type of fiber-optic connector", "topic": [ "Hardware" ] }, { "id": "Wired Network-164", "type": 0, "question": "A user on your network complains that they are unable to type a human-friendly name like `[Sybex.com](http://sybex.com)` into their browser to reach a website, but typing an IP address in the browser works. What client network configuration setting do you suspect is the problem?", "choices": [ "Authentication server", "DNS server", "DHCP server", "Proxy server" ], "answer": "B", "solution": "DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. Each DNS server has a database, called a zone file, which maintains records of hostname-to-IP address mappings. If the network settings for DNS server on a client computer are improperly configured and the client can't reach the DNS server, then human-friendly names are not resolved to IP addresses, causing the problem this user is having. Authentication servers are used to verify whether a user has the proper credentials to gain access to resources on a network. A Microsoft domain controller is a type of authentication server. DHCP (Dynamic Host Configuration Protocol) is used to automatically provide an IP address to a client based on a list (scope) of IP addresses made available on the DHCP server. A proxy server sits between the client and the outside world and is used to filter content incoming or outgoing", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-165", "type": 0, "question": "Which of the following statements best describes the MRA solution?", "choices": [ "MRA is a call control solution designed to replace the Cisco Unified CM.", "MRA is a firewall traversal solution that allows the Cisco Unified CM to call outside the network.", "MRA is a VPN solution that allows endpoints outside the network to register to the Cisco Unified CM.", "MRA is a VPN-less solution that allows endpoints outside the network to register to the Cisco Unified CM." ], "answer": "D", "solution": "The Expressway Series also offers a secure VPN-less solution for unified communications, known as Mobile and Remote Access (MRA). MRA allows for endpoints outside the firewall to register to an internal Cisco Unified Communications Manager from anywhere outside the corporate network through a proxied registration rather than through a VPN. This limits the need for small and medium-sized businesses to install complex VPN routers and improves the media flow of calls between internal endpoints and external endpoints", "topic": [ "Introduction to Mobile and Remote Access (MRA)" ] }, { "id": "Wired Network-166", "type": 0, "question": "What address type is the IPv6 address FE80::300:34BC:123F:1010?", "choices": [ "Aggregatable global", "Unique-local", "Link-local", "Multicast" ], "answer": "C", "solution": "The defining first hexadecimal digits for link-local addresses are FE8", "topic": [ "Internet Protocol Version 6 Design" ] }, { "id": "Wired Network-167", "type": 0, "question": "The iSCSI storage area networking protocol uses clients called initiators and servers called targets. However, on many Storage Area Networks (SANs), there needs to be a way for the initiators to locate the targets. Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?", "choices": [ "ICMP", "DNS", "iDNS", "iSNS" ], "answer": "D", "solution": "The Internet Storage Name Service (iSNS) is an application that provides iSCSI initiators with automated discovery of targets located on the network. iSNS can also function as a discovery service for Fibre Channel devices. Internet Control Message Protocol (ICMP) and Domain Name System (DNS) are not capable of registering iSCSI targets. iDNS does not exist", "topic": [] }, { "id": "Wired Network-168", "type": 0, "question": "Users are having trouble connecting to Internet hosts. Alice suspects that there is a problem with the Domain Name System (DNS) server, and she wants to verify this. Which of the following steps can she take to determine whether the DNS server is resolving Internet hostnames?", "choices": [ "Issue the `ipconfig` command from a local workstation", "Try to connect to a host using the IP address instead of the hostname", "Ping the DNS server to see if it is functioning", "Use the `tracert` command to test the functionality of the DNS server" ], "answer": "B", "solution": "If Alice suspects that a DNS server is not resolving hostnames, she should try connecting to a remote host using the Internet Protocol (IP) address instead of the name. If she can connect, she knows that all internal Local Area Network (LAN) components and the Internet gateway are functioning, and the remote host is functioning. The problem most likely lies within the DNS server itself. If Alice cannot connect to a remote host using the IP address, the problem is not the DNS server. She would need to do more testing to isolate the problem device and the affected area. `ipconfig` is a workstation command that enables you to verify the local IP configuration; it is not used to test a DNS server's functionality. Using the `ping` command will only tell you whether the computer hosting the DNS service is functioning at the network layer of the Open Systems Interconnection (OSI) model; it will not test the DNS service functionality. The `tracert` (or `traceroute` ) command is used to identify the hop-by-hop path taken to reach a destination; it does not allow you to test functionality above the network layer of the OSI model", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-169", "type": 0, "question": "What is the average of collected metrics called?", "choices": [ "NetFlow", "SNMPv2c", "Management information base", "Baseline", "Syslog" ], "answer": "D", "solution": "A measurement is taken from network gear and servers to determine what is considered to be normal operations of a system", "topic": [ "Ensuring Network Availability" ] }, { "id": "Wired Network-170", "type": 0, "question": "What command would you enter to set up authentication on your router to query the TACACS+ servers and, if unable to communicate to the servers, authenticate from the local password?", "choices": [ "aaa authentication login default group radius enable", "aaa authentication login default group tacacs+ local", "aaa authentication login default group tacacs+ enable", "aaa authentication login default group tacacs+ none" ], "answer": "B", "solution": "The **aaa authentication login default group tacacs+ local** command uses AAA as a default login and tries the TACACS+ group because it is first in the list; then it tries the local account", "topic": [ "Network Security" ] }, { "id": "Wired Network-171", "type": 0, "question": "Which DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions?", "choices": [ "HDSL", "IDSL", "RADSL", "VDSL" ], "answer": "C", "solution": "Rate-Adaptive Digital Subscriber Line (RADSL) technology can adjust its rate of transmission based on line conditions. High-bit-rate Digital Subscriber Line (HDSL), Very high-rate Digital Subscriber Line (VDSL), and Internet Digital Subscriber Line (IDSL) do not use rate adaptive transmission", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-172", "type": 0, "question": "Which of the following IPv6 address types are routable?", "choices": [ "Global unicast", "Link-local", "Loopback", "Unique local" ], "answer": "A", "solution": "Global unicast addresses are routable, like IPv4 public addresses. That means that a global unicast address can be reached by any other PC on the Internet, unless you put security measures in place like a firewall. You would likely want a global unicast address on a web server, but not on your workstation. Link-local addresses can only be used to communicate with devices that are on the same local link. They will start with fe80 and are assigned in a manner similar to IPv4 APIPA addresses. The IPv6 loopback address is ::1, and is used for testing just like the loopback address in IPv4 (127.0.0.1). A unique local address is akin to an IPv4 private address. Unique local addresses are nonroutable, so a computer with only a unique local address and a link-local address (but no global unicast address) would need a router with IPv6 NAT in order to access the Internet", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-173", "type": 0, "question": "You're troubleshooting a computer that is unable to resolve domain names to IP addresses. What command-line utility can help identify what DNS server the computer relies on?", "choices": [ "`nslookup`", "`netstat`", "`ping`", "`tracert`" ], "answer": "A", "solution": "The `nslookup` utility will query the DNS server the computer is currently configured to use. The utility can be used to perform a variety of DNS queries. The `netstat` command shows what TCP connections exist on a computer and the port number they are using. The `ping` command is used to determine whether there is connectivity with a remote computer. When entered as `ping localhost`, it is used to determine if TCP/IP is running on the local computer. `tracert` displays the path (routers) that a packet took to get to a remote computer", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-174", "type": 0, "question": "Which of the following options is the correct port-based Metro Ethernet transport mode for an E-LAN service type?", "choices": [ "Ethernet private line", "Ethernet virtual private line", "Ethernet private LAN", "Ethernet virtual private LAN" ], "answer": "C", "solution": "Explanation: The correct port-based Metro Ethernet transport mode for an E-LAN service is Ethernet private LAN (EPLAN)", "topic": [ "Transport Technologies" ] }, { "id": "Wired Network-175", "type": 0, "question": "How many hosts on a half-duplex segment can talk at one time?", "choices": [ "Zero", "One", "Two", "Unlimited" ], "answer": "B", "solution": "In half-duplex communication, a device can either send communication or receive communication, but it cannot do both at the same time", "topic": [ "Networking Connectors and Wiring Standards" ] }, { "id": "Wired Network-176", "type": 0, "question": "How many access points are supported by a Cisco WiSM WLC module?", "choices": [ "6", "50", "100", "1000" ], "answer": "D", "solution": "1000. The WiSM WLC module supports up to 1000 access points", "topic": [ "Wireless LAN Design" ] }, { "id": "Wired Network-177", "type": 0, "question": "Which of the following Domain Name System (DNS) resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?", "choices": [ "NS", "PTR", "MX", "SRV", "SOA", "TXT" ], "answer": "A", "solution": "The Name Server (NS) resource record identifies the authoritative name servers for a particular DNS zone. Pointer Records (PTRs) are used to resolve IP addresses into hostnames. Mail Exchange (MX) records identify the mail servers for a particular domain. Service Records (SRVs) identify the designated servers for a particular application. The Start of Authority (SOA) record indicates the delegation of a domain's administrative control from its parent domain. A Text (TXT) record associates administrator-supplied text with a zone but performs no other function", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-178", "type": 0, "question": "When specifying the **timestamp** parameter with the Cisco DNA Center APIs, what format should the time be in?", "choices": [ "UNIX time", "OS/2", "OpenVMS", "SYSTEMTIME" ], "answer": "A", "solution": "The **timestamp** parameter in Cisco DNA Center APIs is in UNIX epoch time, in milliseconds", "topic": [ "Cisco Enterprise Networking Management Platforms and APIs" ] }, { "id": "Wired Network-179", "type": 0, "question": "Which of the following features enables an Intrusion Detection System (IDS) to monitor all of the traffic on a switched network?", "choices": [ "Stateful packet inspection", "Port mirroring", "Trunking", "Service-dependent filtering" ], "answer": "B", "solution": "Port mirroring is a feature found in some switches that takes the form of a special port that runs in promiscuous mode. This means that the switch copies all incoming traffic to that port, as well as to the dedicated destination ports. By connecting an IDS or protocol analyzer to this port, an administrator can access all of the network's traffic. Stateful packet inspection is a firewall feature that enables the device to examine network and transport layer header fields, looking for patterns that indicate damaging behaviors, such as IP spoofing, SYN floods, and teardrop attacks. Trunking is a switch feature that enables administrators to create VLANs that span multiple switches. Service-dependent filtering is a firewall feature that blocks traffic based on transport layer port numbers", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-180", "type": 0, "question": "On a network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?", "choices": [ "/27", "/28", "/29", "/30", "/31" ], "answer": "D", "solution": "A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet", "topic": [ "IP Subnetting, Troubleshooting IP, and Introduction to NAT" ] }, { "id": "Wired Network-181", "type": 0, "question": "Ralph recently bought an old 10Base-T Ethernet hub at a garage sale and wants to use it to connect his various computers into a home network. He plugs three computers into the hub and finds that although two of his older computers can communicate with each other, his newest computer cannot connect to the network. Which of the following tasks will most likely resolve the problem?", "choices": [ "Configure the hub to run at 10 Mbps", "Configure the hub to run at 100 Mbps", "Configure the computer's network adapter to run at 10 Mbps", "Configure the computer's network adapter to run at 100 Mbps" ], "answer": "C", "solution": "Ralph's new computer is probably equipped with a network adapter that supports at least Fast Ethernet (100Base-TX). Fast Ethernet and newer network adapters support autonegotiation of the connection speed, but 10Base-T does not. Therefore, if the computer tries to negotiate a connection speed with the 10Base-T hub, it will fail and run at its default speed, which the hub does not support. By manually configuring the adapter in the computer to run at 10 Mbps, it should be able to communicate with the network. Setting the computer's adapter to run at 100 Mbps will not change anything. It is not possible to change the speed of a 10Base-T hub", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-182", "type": 0, "question": "In order to assist Apple devices to discover online resources with the Bonjour protocol, which one of the following features should be configured?", "choices": [ "IGMP snooping", "Bonjour Direct", "mDNS snooping", "Multicast Direct" ], "answer": "C", "solution": "The Bonjour protocol uses mDNS to discover resources that are available on a network. However, the discovery requests and advertisements must stay within the same IP subnet. You should configure mDNS snooping to enable a controller to intercept Bonjour messages and relay them across subnets and VLANs when necessary", "topic": [ "Implementing Multicast" ] }, { "id": "Wired Network-183", "type": 0, "question": "OSPFv3 uses ___________ packet types for inter-router communication.", "choices": [ "three", "four", "five", "six", "seven" ], "answer": "C", "solution": "OSPFv3 uses five packet types for communication: hello, database description, link-state request, link-state update, and link-state acknowledgment. These packet types have exactly same names and functions as the same packet types in OSPFv2", "topic": [ "OSPFv3" ] }, { "id": "Wired Network-184", "type": 0, "question": "You have finished capturing traffic with a protocol analyzer. The analyzer reports that 2000 frames have been seen, but only 1500 frames have been accepted. What does this mean?", "choices": [ "2000 frames have passed the display filter, but only 1500 meet the criteria for display.", "Only 1500 frames have passed the capture filter and are currently being held in the buffer.", "You lost 500 frames and need to start over—something is obviously wrong.", "500 frames were damaged and never made it into the buffer." ], "answer": "B", "solution": "Protocol analyzers report the total number of frames seen compared to the number of frames that were accepted. If a capture filter is in place, there will be a discrepancy between these two values. Only frames that meet the capture criteria will be accepted by the analyzer and placed in the buffer for later display. Protocol analyzers place good and bad frames into the buffer as long as they meet the capture criteria. If only good frames were placed in the buffer, there would be no way to identify problems", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-185", "type": 0, "question": "When configuring BGP route reflection in ACI, what are the two critical parameters that administrators need to define?", "choices": [ "BGP ASN and cluster ID", "Border leaf switches and L3Outs from which ACI should import routes", "BGP ASN and the spines in each pod that should function as route reflectors", "BGP ASN and border leafs in each pod that should function as a route reflector client" ], "answer": "C", "solution": "The only parameters administrators need to enter for BGP route reflection in ACI are the BGP ASN the fabric should use and the spines in each pod that should function as route reflectors. All other configuration occurs in the background, without user input", "topic": [ "L3Outs" ] }, { "id": "Wired Network-186", "type": 0, "question": "Intent-based networking transforms a hardware-centric network of manually provisioned devices into a controller-centric network that uses ____________ translated into policies that are automated and applied consistently across the network.", "choices": [ "Business requirements", "Software definitions", "Routing protocols", "Artificial intelligence" ], "answer": "A", "solution": "Intent-based networking is aligned to business requirements that are easily translated into policies reflecting native device configurations. All the other options are incorrect; the software image of a device does not make it intent-based; the routing protocols do not make a network intent-based, even if the routing protocols are defined similarly in an IBN; and AI does not intuit business requirements. It may inform you of what is more predominant or what is out of the norm", "topic": [ "Infrastructure" ] }, { "id": "Wired Network-187", "type": 0, "question": "What port does the SSH protocol use?", "choices": [ "21", "22", "23", "25" ], "answer": "B", "solution": "Secure Shell (SSH) can be used to set up a secure session for remote logins or for remotely executing programs and transferring files. SSH uses port 22. SSH has largely replaced the insecure Telnet, which uses port 23. Port 21 is used by File Transfer Protocol (FTP), and port 25 is used by Simple Mail Transfer Protocol (SMTP)", "topic": [ "Networking" ] }, { "id": "Wired Network-188", "type": 0, "question": "Which one of the following is the highest or best modulation scheme that can be used with 802.11ac devices?", "choices": [ "QPSK 3/4", "256-QAM", "128-QAM", "64-QAM", "16-QAM" ], "answer": "B", "solution": "The 802.11ac amendment supports 256-QAM in both Wave 1 and Wave 2", "topic": [ "RF Standards" ] }, { "id": "Wired Network-189", "type": 0, "question": "Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "C", "solution": "Network layer protocols (such as IP) contain headers that specify logical addresses for end system communication and route datagrams across a network. The physical layer defines standards for physical and mechanical characteristics of a network. The data link layer uses media access control (MAC) or hardware addresses, not logical addresses. The transport layer uses port numbers, not logical addresses. Session layer protocols create and maintain a dialogue between end systems. Presentation layer protocols are responsible for the formatting, translation, and presentation of information. The application layer provides an entry point for applications to access the protocol stack and prepare information for transmission across a network", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-190", "type": 0, "question": "Which of the following gathers information about latency, jitter, and packet loss?", "choices": [ "SNMP", "BFD", "IPFIX", "Probes" ], "answer": "B", "solution": "The BFD probes provide information about latency, jitter, and loss on all the transport links", "topic": [ "SD-WAN Design" ] }, { "id": "Wired Network-191", "type": 0, "question": "How wide are the channels used in 802.11n in order to gain the large bandwidth that the specification provides?", "choices": [ "22 MHz", "20 MHz", "40 MHz", "100 MHz" ], "answer": "C", "solution": "802.11n uses two 20 MHz wide channels to create a 40 MHz wide channel, which provides over 100 Mbps wireless", "topic": [ "Wireless Networking" ] }, { "id": "Wired Network-192", "type": 0, "question": "MDT gRPC uses which application protocol?", "choices": [ "HTTP", "HTTP/2", "SPDY", "SCP", "sFTP" ], "answer": "B", "solution": "MDT uses the HTTP/2 application protocol. Answer A is incorrect because MDT uses the more advanced HTTP/2 application protocol rather than HTTP. Answer C is incorrect because SPDY was an original experimental protocol, but HTTP/2 became the final model. Answer D is incorrect because MDT does not use secure copy (SCP). Answer E is incorrect because MDT does not use secure FTP (sFTP)", "topic": [ "Model-Driven Telemetry" ] }, { "id": "Wired Network-193", "type": 0, "question": "What is the minimum number of call legs for a single call that traverses CUBE?", "choices": [ "1", "2", "3", "4", "5" ], "answer": "B", "solution": "CUBE always has an inbound call leg and an outbound call leg when a call traverses the SBC", "topic": [ "CUBE Call Routing and Digit Manipulation" ] }, { "id": "Wired Network-194", "type": 0, "question": "True or false: The Nexus 93180YC-FX leaf switch supports MACsec.", "choices": [ "True", "False" ], "answer": "A", "solution": "All interfaces with speeds of 10 Gbps or higher on leaf switches whose model numbers end with FX support MACsec", "topic": [ "Understanding ACI Hardware and Topologies" ] }, { "id": "Wired Network-195", "type": 0, "question": "What is the protocol of choice for network device access control?", "choices": [ "RADIUS", "SSHv2", "Telnet", "TACACS+" ], "answer": "D", "solution": "TACACS+ is preferred for device access control because it can individually authorize every command that a user tries to execute after logging in to a device. In contrast, RADIUS requires those commands to be sent in the initial authentication response, and because there could be thousands of CLI command combinations, a large authorization result list could trigger memory exhaustion on the network device", "topic": [ "Network Device Access Control and Infrastructure Security" ] }, { "id": "Wired Network-196", "type": 0, "question": "Which multicast switching protocol should be used to limit the flooding of multicast IPv6 packets on a switch?", "choices": [ "MLD snooping", "PIM", "IGMP snooping", "Auto-RP" ], "answer": "A", "solution": "Explanation: Multicast Listener Discovery (MLD) snooping is a Layer 2 multicast protocol running on IPv6 networks that listens on multicast protocol packets between a Layer 3 multicast device and user hosts to maintain outbound interfaces of multicast packets. MLD snooping manages and controls multicast packet forwarding at the data link layer. Think of MLD snooping as IGMP snooping but for IPv6", "topic": [ "Multicast Design" ] }, { "id": "Wired Network-197", "type": 0, "question": "You're about to refer to a vendor's instructions for guidance. What step of the best practice methodology to resolve problems should you be in?", "choices": [ "Establish a theory of probable cause.", "Identify the problem.", "Establish a plan of action to resolve the problem and implement the solution.", "Document the findings, actions, and outcomes." ], "answer": "C", "solution": "Step 4 of the best practice methodology, which is establish a plan of action, includes Refer to the vendor's instructions. CompTIA's best practice methodology to resolve problems consists of the following steps: \n\n 1. Identify the problem.\n 2. Establish a theory of probable cause (question the obvious).\n 3. Test the theory to determine the cause.\n 4. Establish a plan of action to resolve the problem and implement the solution.\n 5. Verify full system functionality, and if applicable, implement preventive measures.\n 6. Document the findings, actions, and outcomes", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-198", "type": 0, "question": "Which one of the following is the default AP priority value?", "choices": [ "Low", "Medium", "High", "Critical" ], "answer": "A", "solution": "Every AP begins with the default Low priority value", "topic": [ "Designing High Availability" ] }, { "id": "Wired Network-199", "type": 0, "question": "Which of the following is a difference between Telnet and SSH as supported by a Cisco switch?", "choices": [ "SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing.", "SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing.", "Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems.", "Telnet encrypts only password exchanges; SSH encrypts all data exchanges." ], "answer": "B", "solution": "SSH provides a secure remote login option, encrypting all data flows, including password exchanges. Telnet sends all data (including passwords) as clear text", "topic": [ "Using the Command-Line Interface" ] }, { "id": "Wired Network-200", "type": 0, "question": "Which of the following mechanisms for prioritizing network traffic uses a 6-bit classification identifier in the Internet Protocol (IP) header?", "choices": [ "Diffserv", "CoS", "Traffic shaping", "QoS", "Administrative distance" ], "answer": "A", "solution": "Differentiated services (Diffserv) is a mechanism that provides Quality of Service (QoS) on a network by classifying traffic types using a 6-bit value in the differentiated services (DS) field of the IP header. Class of Service (CoS) is a similar mechanism that operates at the data link layer by adding a 3-bit Priority Code Point (PCP) value to the Ethernet frame. Traffic shaping is a means of prioritizing network traffic that typically works by delaying packets at the application layer. Quality of Service (QoS) is an umbrella term that encompasses a variety of network traffic prioritization mechanisms. Administrative distance is a value that routers use to select the most efficient route to a destination", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-201", "type": 0, "question": "Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?", "choices": [ "RIP", "STP", "VLAN", "NAT", "ARP" ], "answer": "B", "solution": "The Spanning Tree Protocol (STP) prevents packets from endlessly looping from switch to switch due to redundant links. Creating redundant links is a good preventive against switch failure, but packets transmitted over multiple links can circulate from switch to switch infinitely. STP creates a database of switching links and shuts down the redundant ones until they are needed. Routing Information Protocol (RIP) propagates routing table information. A Virtual Local Area Network (VLAN) is an organizational tool that operates within switches by creating multiple broadcast domains. Network Address Translation (NAT) is a routing method that enables private networks to share registered IP addresses. Address Resolution Protocol (ARP) is a protocol that discovers a system's MAC address by broadcasting its IPv4 address", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-202", "type": 0, "question": "True or false: With hardware proxy configured, a leaf forwards L2 unknown unicast traffic to the spine. If the spine does not know the destination, it drops the traffic and initiates silent host detection.", "choices": [ "True", "False" ], "answer": "A", "solution": "This is a large part of the definition of hardware proxy forwarding", "topic": [ "Implementing Tenant Policies" ] }, { "id": "Wired Network-203", "type": 0, "question": "Suppose you would like to connect to a WLC to configure a new WLAN on it. Which one of the following is a valid method to use?", "choices": [ "SSH", "HTTPS", "HTTP", "All of these answers are correct." ], "answer": "D", "solution": "You can use HTTP and HTTPS to access the GUI of a wireless LAN controller, as well as SSH to access its CLI. While HTTP is a valid management protocol on a WLC, it is usually disabled to make the WLC more secure", "topic": [ "Building a Wireless LAN" ] }, { "id": "Wired Network-204", "type": 0, "question": "What is the primary function of a bridge?", "choices": [ "Breaks up collision domains", "Allows a NIC or other networking device to connect to a different type of media than it was designed for", "Allows mobile users to connect to a wired network wirelessly", "None of the above" ], "answer": "A", "solution": "The primary function of a bridge is to keep traffic separated on both sides of it, breaking up collision domains", "topic": [ "Networking Devices" ] }, { "id": "Wired Network-205", "type": 0, "question": "Microsoft's [Outlook.com](http://Outlook.com) email service is an example of which of the following cloud service models?", "choices": [ "IaaS", "PaaS", "SaaS", "DaaS", "None of the above" ], "answer": "C", "solution": "Software as a Service (SaaS) provides consumers with access to a specific application running on the provider's servers (in this case, an email service). Consumers have control over some of their email functions, but they have no control over the operating system, the servers, or the underlying resources. The Infrastructure as a Service (IaaS) model provides the consumers with access to processing, storage, and networking resources that the consumer can use as needed. Platform as a Service (PaaS) provides consumers with the ability to install applications of their choice on a server furnished by the provider. Desktop as a Service (DaaS) provides remote virtualization of the entire workstation desktop, instead of a single application", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-206", "type": 0, "question": "Which command enables the Bash shell on Nexus 9000 Series switches?", "choices": [ "run bash", "feature bash-shell", "run bash sudo su", "username foo shelltype bash" ], "answer": "B", "solution": "You enable the Bash shell by running the command **feature bash-shell**. The **run bash** command loads Bash and begins at the home directory for the user", "topic": [ "Automation and Scripting Tools" ] }, { "id": "Wired Network-207", "type": 0, "question": "Which International Telecommunication Union (ITU) standard provides a framework for multimedia protocols for the transport of voice, video, and data over packet-switched networks?", "choices": [ "Session Initiation Protocol (SIP)", "Voice over IP (VoIP)", "323", "Weighted fair queuing (WFQ)" ], "answer": "C", "solution": "H.323 is the ITU standard that provides a framework for the transport of voice, video, and data over packet-switched networks", "topic": [ "Voice and Video Design" ] }, { "id": "Wired Network-208", "type": 0, "question": "Which voice over IP (VoIP) protocol is used to form trunks between many of the different collaboration components for call routing and other features?", "choices": [ "931", "Session Initiation Protocol (SIP)", "Real-Time Transport Protocol", "Hypertext Transfer Protocol (HTTP)" ], "answer": "B", "solution": "SIP trunks are leveraged by nearly every device within the Cisco collaboration ecosystem for call routing and supplementary features", "topic": [ "Introduction to Unified Collaboration and Dial Plans" ] }, { "id": "Wired Network-209", "type": 0, "question": "True or false: ACI Multi-Site can enable IP mobility across data centers without the need to flood broadcast, unknown unicast, and multicast traffic.", "choices": [ "True", "False" ], "answer": "A", "solution": "ACI Multi-Site enables IP mobility across sites without the need to carry over performance-limiting and dangerous forwarding methods such as flooding", "topic": [ "ACI Anywhere" ] }, { "id": "Wired Network-210", "type": 0, "question": "How many wire pairs are used with 100BaseTX full-duplex?", "choices": [ "Two", "One", "Four", "A or C" ], "answer": "A", "solution": "Full-duplex Ethernet uses two pairs of wires at the same time", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-211", "type": 0, "question": "Which ASA VPN **show** command shows the most details regarding a live VPN session?", "choices": [ "show vpn-sessiondb detail anyconnect", "show vpn-sessiondb", "debug vpn-sessiondb", "show running-configuration" ], "answer": "A", "solution": "The **show vpn-sessiondb detail anyconnect** command provides the most detail about the VPN session", "topic": [ "Troubleshooting Remote Access VPNs" ] }, { "id": "Wired Network-212", "type": 0, "question": "Which of the following Internet multihoming options should be chosen if a business just wants a backup option in case its primary Internet link suffers an outage?", "choices": [ "Equal and unequal load sharing", "Active/standby", "Equal and unequal load sharing with two edge routers", "Equal and unequal load sharing with four edge routers" ], "answer": "B", "solution": "Explanation: Active/standby is used in a situation where a backup link is needed but only as a requirement to survive an outage on the primary (active) link", "topic": [ "Enterprise Internet Edge Architecture Design" ] }, { "id": "Wired Network-213", "type": 0, "question": "What ports does H.460.18 use for RTP and RTCP packets?", "choices": [ "2776 and 2777", "36,000 and 36,001", "36,000 to 59,999", "1024 to 34,545" ], "answer": "C", "solution": "H.460.18 works just like Assent, except it requires de-multiplexed ports 36,000 to 59,999 to be opened on the firewall. H.460.19 works as a layer on H.460.18 to allow multiplexing the media ports so only two ports need to be opened for RTP and RTCP media streams, 2776 and 2777. However, this question only asked about H.460.18", "topic": [ "Multisite and Business-to-Business (B2B) Collaboration Solutions" ] }, { "id": "Wired Network-214", "type": 0, "question": "Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.", "choices": [ "Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)", "Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)", "Data link layer; CSMA/CD", "Data link layer; CSMA/CA" ], "answer": "C", "solution": "The Ethernet protocol that handles the addressing, transmission, and reception of frames operates at the data link layer. Each frame includes hardware addresses that identify the sending and receiving systems on the local network. Ethernet uses the CSMA/CD media access control method. Physical layer specifications include the transmission of signals in the form of electrical or light pulses to represent binary code, not frames. CSMA/CA is a data link layer media access control method used by wireless LAN protocols, but not Ethernet", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-215", "type": 0, "question": "You are replacing cabling in a network. The existing cable was only capable of 100 Mbps maximum speed. What type of cable are you replacing?", "choices": [ "Cat 5", "Cat 5e", "Cat 6a", "Single mode" ], "answer": "A", "solution": "Cat 5 UTP can transmit data at speeds up to 100 Mbps, for a distance of 100 meters. Cat 5e is capable of 1 Gbps. Cat 6 and newer can support 10 Gbps. Single mode is a type of fiber-optic cable and is very fast", "topic": [ "Hardware" ] }, { "id": "Wired Network-216", "type": 0, "question": "Which statement describes NETCONF/YANG?", "choices": [ "NETCONF/YANG provides a standardized way to programmatically update and modify the configuration of a network device.", "NETCONF/YANG provides a nonstandardized way to programmatically update and modify the configuration of a network device.", "NETCONF/YANG provides a standardized way to programmatically update and modify only the startup configuration of a network device.", "NETCONF/YANG provides an irreplaceable way to programmatically update and modify the configuration of a network device." ], "answer": "A", "solution": "NETCONF/YANG provides a standardized way to programmatically update and modify the configuration of a network device; this makes B incorrect. YANG is the modeling language that describes the configuration changes. NETCONF is the protocol that applies the changes to the relevant datastore (such as running, saved) on the device. Answers C and D are incorrect because NETCONF can also update and modify the running configuration of a network device and does not have an irreplaceable attribute operation", "topic": [ "Network APIs" ] }, { "id": "Wired Network-217", "type": 0, "question": "Which of the following is a Python dictionary?", "choices": [ "a.\n\ndnac = {\r\n \"host\": \"sandboxdnac.cisco.com\",\r\n \"port\": 443,\r\n \"username\": \"devnetuser\",\r\n \"password\": \"Cisco123!\"\r\n }", "b.\n\n[users[root|Jason|Jamie|Luke]]", "c.\n\ndef dnac_login(host, username, password):\r\n url = \"https://{}/api/system/v1/auth/token\".\r\n format(host)\r\n response = requests.request(\"POST\", url, \r\n auth=HTTPBasicAuth(username, password),\r\n headers=headers, verify=False)\r\n return response.json()[\"Token\"]", "d.\n\nprint(dnac_devices)" ], "answer": "A", "solution": "Python uses curly braces ({}) as one way to signify a dictionary", "topic": [ "Foundational Network Programmability Concepts" ] }, { "id": "Wired Network-218", "type": 0, "question": "Which EAP method supports fast roaming?", "choices": [ "PEAP", "EAP-MSCHAPv2", "EAP-FAST", "EAP-GTC" ], "answer": "C", "solution": "EAP-FAST uses Protected Access Credentials (PACs) on the client, which functions as a cookie/token to validate that the client has been authenticated and thus improves roaming performance", "topic": [ "Security for Wireless Client Connectivity" ] }, { "id": "Wired Network-219", "type": 0, "question": "You've moved to a new two-story townhouse and are trying to decide where to put your router. The townhouse is a rather open concept with the dining room near its center. Which of the following options would be best?", "choices": [ "On a stand in the corner of the dining room.", "Next to the metal staircase, so they'll be a good signal upstairs.", "Hide it behind the sofa.", "Set it on a sunny windowsill to reflect the signal back in." ], "answer": "A", "solution": "Wi-Fi signals are radio waves and part of the electromagnetic spectrum. The metal staircase would act like an antenna, absorbing the energy of the signal. Sofas are thick and most have metal in them that will also absorb the signal. The sunny windowsill is out in the open, but sunlight can interfere with radio signals too, and too much heat might damage the router. The best option here is on the stand in the corner of the dining room, which is in the center of the home. While you have chairs and a table there, there would likely not be as much furniture to block the signal as behind the sofa. Placement would, of course, depend on the exact situation", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-220", "type": 0, "question": "Several users can't log in to the server. Which action would help you to narrow the problem down to the workstations, network, or server?", "choices": [ "Run `tracert` from a workstation.", "Check the server console for user connections.", "Run `netstat` on all workstations.", "Check the network diagnostics." ], "answer": "B", "solution": "Although all of these are good tests for network connectivity, checking the server console for user connections will tell you whether other users are able to log into the server. If they can, the problem is most likely related to one of those users' workstations. If they can't, the problem is either the server or network connection. This helps narrow down the problem", "topic": [ "Network Troubleshooting Methodology" ] }, { "id": "Wired Network-221", "type": 0, "question": "Which static route should be used to avoid unintentional forwarding paths with an Ethernet link failure?", "choices": [ "A directly attached static route", "A recursive static route", "A fully specified static route", "A static null route" ], "answer": "C", "solution": "Ethernet links should not use a directly attached static route, and a link failure could result in the resolution of the next-hop IP address resolving to an unintentional link. The fully specified static route ensures that the next hop is resolvable using only the specified interface", "topic": [ "IP Routing Essentials" ] }, { "id": "Wired Network-222", "type": 0, "question": "What H.225 TCP port is used to establish non-secure signaling?", "choices": [ "1719", "1720", "1721", "5060", "5061" ], "answer": "B", "solution": "TCP port 1720 is used for non-secure signaling with the H.225 protocol", "topic": [ "VoIP Protocols: SIP and H.323" ] }, { "id": "Wired Network-223", "type": 0, "question": "Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?", "choices": [ "66 block", "110 block", "Patch panel", "Smartjack" ], "answer": "A", "solution": "A 66 block is a type of punchdown block for telephone systems that was first introduced in 1962. By the year 2000, nearly all commercial telephone installations had begun using 110 blocks instead; 110 blocks are still in use, as are smartjacks and patch panels", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-224", "type": 0, "question": "The Content-Type header attribute specifies the format of data in the request body so that the receiver can parse it into the appropriate format. When you’re specifying the content types of the request body and output, what does using the Content-Type application/x-www-form-urlencoded do?", "choices": [ "It indicates that the request body is encoded in key-value tuples.", "It indicates that the request body format is multipart/form-data.", "It sets the output type to XML.", "It indicates that the request body format is XML." ], "answer": "A", "solution": "With application/x-www-form-urlencoded, the keys and values are encoded in key-value tuples separated by an ampersand (&), with an equal sign (=) between the key and the value. Answer B is incorrect because multipart/form-data is a special type of body whereby each value is sent as a block of data. Answers C and D are incorrect because the request body format is not indicated as XML", "topic": [ "Network APIs" ] }, { "id": "Wired Network-225", "type": 0, "question": "Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?", "choices": [ "Cloud busting", "Cloud bursting", "Cloud splitting", "Cloud migrating" ], "answer": "B", "solution": "_Cloud bursting_ is a common term for the offloading of excess traffic from private to public cloud resources when necessary to maintain satisfactory performance levels", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-226", "type": 0, "question": "Which of the following is true about the CSMA/CD algorithm?", "choices": [ "The algorithm never allows collisions to occur.", "Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.", "The algorithm works with only two devices on the same Ethernet.", "None of the other answers is correct." ], "answer": "B", "solution": "NICs (and switch ports) use the carrier sense multiple access with collision detection (CSMA/CD) algorithm to implement half-duplex logic. CSMA/CD attempts to avoid collisions, but it also notices when collisions do occur, with rules about how the Ethernet nodes should stop sending, wait, and try again later", "topic": [ "Fundamentals of Ethernet LANs" ] }, { "id": "Wired Network-227", "type": 0, "question": "A wireless controller port is used for which one of the following purposes?", "choices": [ "Construct CAPWAP tunnel packets", "Provide a physical connection to a switch port", "Create a logical connection to a WLAN", "Provide a physical connection to an AP" ], "answer": "B", "solution": "Controller ports are physical connections to the switched network infrastructure", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-228", "type": 0, "question": "How do you enable OSPFv3 on an interface?", "choices": [ "Use the command network _prefix/prefix-length_ under the OSPF process.", "Use the command network _interface-id_ under the OSPF process.", "Use the command ospfv3 _process-id_ ipv6 area _area-id_ under the interface.", "Nothing. OSPFv3 is enabled on all IPv6 interfaces upon initialization of the OSPF process." ], "answer": "C", "solution": "Enabling OSPFv3 requires the interface configuration command **ospfv3** _process-id_ **ipv6 area** _area-id_", "topic": [ "OSPFv3" ] }, { "id": "Wired Network-229", "type": 0, "question": "Which of the following is true?", "choices": [ "The EIGRP command distance 165 10.1.1.1 0.0.0.0 changes the AD to 165 for all EIGRP routes learned from neighbor 10.1.1.1.", "The EIGRP command distance 165 10.1.1.1 0.0.0.0 changes the AD to 165 for the EIGRP learned route 10.1.1.0/24.", "The EIGRP command distance 165 10.1.1.1 0.0.0.0 changes the AD to 165 for internal EIGRP routes learned from neighbor 10.1.1.1.", "The EIGRP command distance 165 10.1.1.1 0.0.0.0 changes the AD to 165 for external EIGRP routes learned from neighbor 10.1.1.1." ], "answer": "C", "solution": "The EIGRP command **distance 165 10.1.1.1 0.0.0.0** changes the AD to 165 for internal EIGRP routes learned from neighbor 10.1.1.1", "topic": [ "Troubleshooting Redistribution" ] }, { "id": "Wired Network-230", "type": 0, "question": "What frequency allotment provides 11 channels for unlicensed use for WLANs in North America?", "choices": [ "UNII", "ISM", "Bluetooth", "FM" ], "answer": "B", "solution": "The Industrial, Scientific, and Medical (ISM) band of frequencies provides 11 channels for WLANs", "topic": [ "Wireless LAN Design" ] }, { "id": "Wired Network-231", "type": 0, "question": "You need to manually configure the IP address for a server, so you go to Network and Sharing Center, click Change Adapter Settings, then right-click the connection, choose Properties, and select IPv6. Which of the following pieces of information is not needed to configure IPv6?", "choices": [ "IPv6 address", "Subnet mask", "Subnet prefix length", "Default gateway" ], "answer": "B", "solution": "When configuring a static IP address in IPv6 networking, a subnet mask is not needed, but you do need to know the subnet prefix length. That's the only difference between configuring IPv4 and IPv6. In addition to the IPv6 address and default gateway, you'll need to know the address of the preferred DNS server", "topic": [] }, { "id": "Wired Network-232", "type": 0, "question": "Which layer of the Open Systems Interconnection (OSI) model is responsible for dialogue control between two communicating end systems?", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "E", "solution": "The session layer is responsible for creating and maintaining a dialogue between end systems. This dialogue can be a two-way alternate dialogue that requires end systems to take turns transmitting, or it can be a two-way simultaneous dialogue in which either end system can transmit at will. No other layers of the OSI model perform dialogue control between communicating end systems", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-233", "type": 0, "question": "Which of the following wireless communication standards is often described in terms of a wireless personal area network?", "choices": [ "Bluetooth", "Infrared", "Cellular", "Ethernet" ], "answer": "A", "solution": "Bluetooth networks are often called wireless personal area networks (WPANs)", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-234", "type": 0, "question": "Ed has been hired to design a company's network. The company has an assigned Class C network address of 192.168.30.0. Ed's client wants the network to be configured with 10 subnets, each with 14 hosts. Is this configuration possible with the given address, and if so, how many subnets and hosts can Ed create on the network?", "choices": [ "Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.", "No, this will not work. A Class C address cannot be subnetted to create 8 subnets.", "No, this will not work. Although there are sufficient bits available to create 10 subnets, there are not enough bits left over for Ed to create 14 hosts per subnet.", "Yes, this will work. Ed can create 10 subnets with 14 hosts per subnet. By using 3 subnet bits, he can create 10 subnets, which leaves 5 bits to create up to 30 hosts per subnet." ], "answer": "A", "solution": "In this scenario, the company has a Class C Internet Protocol (IPv4) address, which consists of 24 network bits and 8 host bits. The company wants 10 subnets and 14 hosts per subnet, so Ed must subdivide the 8 host bits into subnet and host bits. He can allocate 4 of the 8 host bits for subnets, enabling him to create up to 16 subnets. This leaves 4 bits for host addresses, enabling Ed to create 14 hosts per subnet", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-235", "type": 0, "question": "Which of the following OSPF neighbor states is expected when the exchange of topology information is complete between two OSPF neighbors?", "choices": [ "2-way", "Full", "Up/up", "Final" ], "answer": "B", "solution": "Neighboring OSPF routers that complete the database exchange are considered fully adjacent and rest in a full neighbor state. The up/up and final states are not OSPF states at all. The 2-way state is either an interim state or a stable state between some routers on the same VLAN", "topic": [ "Understanding OSPF Concepts" ] }, { "id": "Wired Network-236", "type": 0, "question": "Which routing protocol has a maximum hop count of 15?", "choices": [ "RIPv1", "IGRP", "EIGRP", "OSPF" ], "answer": "A", "solution": "The distance-vector protocols RIPv1 and RIPv2 both have a maximum hop count of 15 (remember, 16 is unreachable). IGRP and EIGRP have a hop count of 255, and OSPF doesn't have a maximum hop count", "topic": [ "Routing Protocols" ] }, { "id": "Wired Network-237", "type": 0, "question": "Which of the following correctly identifies the order of BGP attributes for the best-path decision process?", "choices": [ "Weight, local preference, route origin, AS_Path, origin code, MED", "AS_Path, origin code, MED, weight, local preference, route origin", "Local preference, weight, route origin, AS_Path, origin code, MED", "Weight, local preference, route origin, AS_Path, MED, origin code" ], "answer": "A", "solution": "Weight, local preference, route origin, AS_Path, origin code, MED is the correct order for the BGP best-path process", "topic": [ "Troubleshooting BGP" ] }, { "id": "Wired Network-238", "type": 0, "question": "Ralph has been hired by a company to redesign its Local Area Network (LAN). Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected through 3 hubs. The users on the network must be able to share files with one another and also access the shared servers. The users are complaining that the network is too slow. Management states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?", "choices": [ "Split the network into smaller segments with dedicated hubs as opposed to shared hubs.", "Split the network into two routed LANs with 20 users each.", "Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.", "Replace the hubs with a layer 3 switch and define two Virtual LANs (VLANs) with 20 users each." ], "answer": "C", "solution": "The best choice is to replace the hubs with switches, since the network is relatively small, and cost is an issue. On the existing network, all users share the same 100 Mbps communication channel, and each computer must take turns transmitting. By replacing the hubs with switches, you provide each computer with a dedicated 100 Mbps connection to the switch, while reducing unnecessary traffic and collisions on the network. There is no such thing as a dedicated hub. Splitting the network into two routed LANs is not the best solution, because all users must share information on a constant basis. Also, cost is a factor, and routers are more expensive than switches. Replacing the hubs with a layer 3 switch and defining two VLANs with 20 users each is not a reasonable solution, because layer 3 switches are very expensive", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-239", "type": 0, "question": "A CAPWAP tunnel terminates on which one of the following controller interfaces?", "choices": [ "Virtual interface", "Dynamic interface", "Service port interface", "AP-manager interface" ], "answer": "D", "solution": "CAPWAP tunnels always terminate on the AP-manager interface. All the APs discover the controller by that interface and its IP address. The management interface can terminate CAPWAP tunnels if no AP-manager interface exists", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-240", "type": 0, "question": "Which command is used to identify ports in use by applications and the operating system?", "choices": [ "`netstat`", "`ipconfig`", "`pathping`", "`nslookup`" ], "answer": "A", "solution": "The `netstat` command can be used to view ports in use by the operating system and network applications communicating with the network. The `ipconfig` command allows you to see the current IP address and DNS information for the operating system. The `pathping` allows you to view packet loss along the path to a destination IP address. The `nslookup` command is used to resolve DNS records", "topic": [ "Windows Administration" ] }, { "id": "Wired Network-241", "type": 0, "question": "Which one of the following WLC deployment models would be best for a large enterprise with around 4000 lightweight APs?", "choices": [ "Cisco Mobility Express", "Embedded", "Unified", "Cloud-based" ], "answer": "C", "solution": "A unified WLC deployment model is based around locating the WLC in a central location, to support a very large number of APs", "topic": [ "Analyzing Cisco Wireless Architectures" ] }, { "id": "Wired Network-242", "type": 0, "question": "Which protocol is defined in IEEE 802.3ad and provides a method to control the bundling of several physical ports to form a single logical channel?", "choices": [ "PAgP", "VSS", "FHRP", "LACP" ], "answer": "D", "solution": "Explanation: Link Aggregation Control Protocol (LACP) is a protocol defined in IEEE 802.3ad that provides a method to control the bundling of several physical ports to form a single logical channel", "topic": [ "Layer 2 Technologies" ] }, { "id": "Wired Network-243", "type": 0, "question": "With which of the following methods can bandwidth be applied to calls from the Cisco Expressway?", "choices": [ "Total bandwidth only", "Within and total bandwidth", "In and Out and total bandwidth", "Per call and total bandwidth" ], "answer": "D", "solution": "There are two methods for implementing bandwidth restrictions on an Expressway: using Pipes or using Subzones. Using either of these methods, bandwidth restrictions can be applied to the call in two ways: on a per-call basis and on a total-bandwidth basis", "topic": [ "Bandwidth Management" ] }, { "id": "Wired Network-244", "type": 0, "question": "You are the network administrator of your company's network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?", "choices": [ "SNMP management", "Protocol analyzer", "Performance Monitor", "Network traffic monitor" ], "answer": "A", "solution": "The best solution is to implement Simple Network Management Protocol (SNMP). This includes a management console, agents, and Management Information Bases (MIBs). SNMP allows you to track statistical network information (historical and current) and produce reports for baseline analysis and troubleshooting. Some SNMP products also allow you to track software distribution and metering. Protocol analyzers are best used for troubleshooting problems in real time and are not used for software distribution and metering. Performance Monitor is a tool that allows you to track performance statistics for one system at a time and does not include software distribution and metering. There is no such product as a network traffic monitor", "topic": [ "Network Operations" ] }, { "id": "Wired Network-245", "type": 0, "question": "What devices often lack an 802.1X supplicant?", "choices": [ "Printers", "Laptops", "Cell phones", "All of these answers are correct." ], "answer": "A", "solution": "**Explanation:** Oftentimes, “dumb” network devices lack 802.1X supplicants. From this list, a printer would be the most common device to lack 802.1X support. Other examples include IP phones, IP cameras, and badge readers", "topic": [ "Introduction to Advanced Concepts" ] }, { "id": "Wired Network-246", "type": 0, "question": "Which of the following is not a basic physical issue that can occur on a network when a user is connected via cable?", "choices": [ "Crosstalk", "Shorts", "Open impedance mismatch", "DNS configurations" ], "answer": "D", "solution": "Because most of today's networks still consist of large amounts of copper cable, networks can suffer from the physical issues that have plagued all networks since the very beginning of networking (and the answers here are not a complete list). Newer technologies and protocols have lessened these issues but have not resolved them completely", "topic": [ "Network Troubleshooting Methodology" ] }, { "id": "Wired Network-247", "type": 0, "question": "What type of network is used for highly partitioned administrative traffic?", "choices": [ "FWM (firewall management)", "SR (segment routing)", "OOB (out-of-band network)", "VLAN (virtual local-area network)" ], "answer": "C", "solution": "OOB stands for out-of-band networking, which is a way to partition management/administrative traffic from other traffic. Segment routing and VLANs are technologies used to segment or partition traffic, but they are generally or more commonly used with user traffic. Answer A is incorrect because FWM (firewall management) firewalls are useful for restricting traffic, but firewall management is not a type of network for separating administrative traffic from other production traffic", "topic": [ "Infrastructure" ] }, { "id": "Wired Network-248", "type": 0, "question": "What type of network and subnet mask would you use to save address space in a point-to-point WAN link?", "choices": [ "100.100.10.16/26", "100.100.10.16/28", "100.100.10.16/29", "100.100.10.16/30" ], "answer": "D", "solution": "Point-to-point links need only two host addresses. They use a /30 mask, which provides 22 – 2 = 2 host addresses", "topic": [ "Internet Protocol Version 4 Design" ] }, { "id": "Wired Network-249", "type": 0, "question": "What port(s) does DHCP use?", "choices": [ "67/68", "137/139", "80", "445" ], "answer": "A", "solution": "DHCP uses ports 67/68. Ports 137/139 are for NetBIOS/NetBT. Port 80 is for HTTP, and port 445 is for SMB", "topic": [ "Networking" ] }, { "id": "Wired Network-250", "type": 0, "question": "Which tool would be used to connect wire between two punch-down block blades?", "choices": [ "Punch-down tool", "Crimper", "Snips", "Strippers" ], "answer": "A", "solution": "Just as it is named, a punch-down tool is used to “punch” a wire into a cable block. Crimpers are used to put a jack onto the end of a cable, and snips and strippers are used to prepare the cable", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-251", "type": 0, "question": "Which of the following utilities can display the number of packets sent and received for a specific network interface on a Unix, Linux, MacOS or Windows computer?", "choices": [ "Top", "Ifconfig", "Netstat", "Nbtstat" ], "answer": "C", "solution": "The netstat utility can display the incoming and outgoing packets for a specific network interface, as well as other statistics, depending on the operating system. Top and ifconfig are Unix/Linux utilities, and Nbtstat is a Windows tool", "topic": [ "Network Operations" ] }, { "id": "Wired Network-252", "type": 0, "question": "What is the frequency range of the IEEE 802.11g standard?", "choices": [ "4 Gbps", "5 Gbps", "4 GHz", "5 GHz" ], "answer": "C", "solution": "The IEEE 802.11b and IEEE 802.11g both run in the 2.4 GHz RF range", "topic": [ "Wireless Networking" ] }, { "id": "Wired Network-253", "type": 0, "question": "Your network uses 802.11ac for all client computers. Recently, several users moved from one office space to another, increasing the users in the area from 20 to about 50. Now, both new and old users are reporting very slow network transfer speeds. What is most likely the cause of the problem?", "choices": [ "802.11ac can't support that many concurrent users.", "It's too far from the wireless access point.", "There are too many users for one wireless access point.", "The new users all have 802.11n network cards." ], "answer": "C", "solution": "The users are connecting; it's just slower than it should be. This is likely due to too many people accessing the WAP at once. The more devices there are connected, the more likely that their signals will interfere with each other, even if the WAP hasn't reached the theoretical maximum that the manufacturer says it should support. To solve this problem, install a second WAP", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-254", "type": 0, "question": "After switching from a standard public switched telephone network (PSTN) telephone system to a Voice over Internet Protocol (VoIP) system, users are complaining of service interruptions and problems hearing callers at certain times of the day. After examining a network traffic audit and assessment report, you determine that traffic levels on the Internet connection are substantially higher during the first and last hours of the day, the same times when most of the users experienced problems. Which of the following solutions can provide more reliable VoIP service during peak usage times?", "choices": [ "Implement traffic shaping", "Implement load balancing", "Upgrade the Local Area Network (LAN) from Fast Ethernet to Gigabit Ethernet", "Replace the router connecting the LAN to the Internet with a model that supports Simple Network Management Protocol (SNMP)." ], "answer": "A", "solution": "Traffic shaping is a technique for prioritizing packets by buffering packets that are not time sensitive for later transmission. You can use this technique to give VoIP packets priority over other types of traffic. Load balancing can conceivably improve the performance of a server, but it cannot help to relieve traffic congestion on the Internet link. The traffic congestion is on the Internet connection, not the LAN, so upgrading to Gigabit Ethernet will not help. SNMP is a protocol used by network management products; it will not relieve the traffic congestion problem", "topic": [ "Network Operations" ] }, { "id": "Wired Network-255", "type": 0, "question": "You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?", "choices": [ "6", "8", "30", "62", "126" ], "answer": "A", "solution": "A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts is the maximum number of hosts on this LAN, including the router interface", "topic": [ "IP Subnetting, Troubleshooting IP, and Introduction to NAT" ] }, { "id": "Wired Network-256", "type": 0, "question": "A coworker at a satellite office reports that a new replacement shared workgroup printer has arrived. It is the same model as the old one. Your coworker replaced the old printer and connected all the cables to the new printer. Which of the following is the easiest way to ensure that all the client computers can connect to the new printer via IPP?", "choices": [ "Name the new printer with the old printer name.", "Allow the printer to acquire a DHCP address.", "In DHCP, set a reservation by MAC address.", "Have your coworker print the configuration page." ], "answer": "C", "solution": "**Explanation:** In DHCP, set a reservation based on the MAC address. In this scenario, the clients are most likely connecting to the printer by using the IP address. Internet Printing Protocol (IPP) can be used in this manner. By default, the moment the new printer is connected to the network, it acquires an IP address from the DHCP server; this is a new IP address that is different from the one used by the old printer. This causes the clients to fail when attempting to connect and print to the new printer. To prevent this problem, you can go to the router (or another DHCP device) and configure a MAC address reservation. The MAC address of the printer (which might be on a label or might be accessible from the onscreen display) can be plugged into the DHCP server and reserved to a specific IP address. Of course, a better option would be to simply configure the printer to use a static IP address.\n\n **Incorrect answers:** Renaming the printer with the old name doesn’t help because the client computers are most likely connecting via IP address, not via name. Printing the configuration page is great and might help you to figure out what the problem could be, but it doesn’t actually solve the problem!", "topic": [] }, { "id": "Wired Network-257", "type": 0, "question": "The proper shutdown of a system is called which of the following?", "choices": [ "Stateful", "Graceful", "Stateless", "Quick" ], "answer": "B", "solution": "Many of today's enterprise-level UPS systems offer the ability to shut down a server to which they are attached when the power is lost. A proper shutdown is called a graceful shutdown", "topic": [ "Using Statistics and Sensors to Ensure Network Availability" ] }, { "id": "Wired Network-258", "type": 0, "question": "Which is not an advantage of network segmentation?", "choices": [ "Reducing congestion", "Improving security", "Containing network problems", "Preventing broadcast storms" ], "answer": "D", "solution": "Options A and C aid in boosting network performance. Option B is an advantage gained when segmenting the network. So the only option left is broadcast storms. Increased traffic will increase LAN congestion", "topic": [ "Networking Devices" ] }, { "id": "Wired Network-259", "type": 0, "question": "When setting up your network, you configured your clients to obtain IP addressing information automatically from a DHCP server. Which of the following configuration items can the DHCP server provide?", "choices": [ "IP address", "IP address and subnet mask", "IP address, subnet mask, and default gateway", "IP address, subnet mask, default gateway, and DNS server address" ], "answer": "D", "solution": "A DHCP server can be configured to provide all required and optional TCP/IP configuration information to clients. This includes an IP address, subnet mask (for IPv4), default gateway, and DNS server address", "topic": [] }, { "id": "Wired Network-260", "type": 0, "question": "Which of the following components are required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology?", "choices": [ "A router connected to the Internet", "A Wireless Access Point (WAP)", "An external antenna", "None of the above" ], "answer": "D", "solution": "An ad hoc topology describes wireless computers that communicate directly with each other, without the need for any hardware other than their wireless network adapters. The ad hoc topology therefore does not require a router, an Internet connection, an Access Point (AP), or a special antenna", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-261", "type": 0, "question": "Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete?", "choices": [ "SFP", "SFP+", "GBIC", "QSFP", "QSFP+" ], "answer": "C", "solution": "The Gigabit Interface Converter (GBIC) transceiver standard was first published in 1995 and defines a maximum data transfer rate of 1.25 Gbps. It was rendered all but obsolete by the Small Form-factor Pluggable (SFP) standard, introduced in 2001, which ran at the same maximum speed but was smaller in size. Subsequent variations on the standard, such as SFP+, Quad Small Form-factor Pluggable (QSFP), and QSFP+, defined devices with faster transfer rates", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-262", "type": 0, "question": "You've been asked to set up a wireless network for a SOHO that will only allow five specific devices to connect. How do you accomplish this?", "choices": [ "Disable the router's SSID.", "Configure port forwarding.", "Set a DHCP scope with only five addresses.", "Configure MAC address filtering." ], "answer": "D", "solution": "MAC address filtering uses the physical address of a NIC to determine whether or not to allow a device to connect to the router. Disabling the SSID will hide the network from neighbors, but it won't keep them from connecting if they discover the network. Port forwarding redirects requests for a specific port to a specific device on the network. The DHCP scope can be set up to only allow five machines to connect, but it may not be the right five machines", "topic": [ "Networking" ] }, { "id": "Wired Network-263", "type": 0, "question": "When using the Locate tool on the Cisco Expressway, which of the following fields should be used when CPL scripts are used with the Call Policy?", "choices": [ "Alias", "Source", "Source Alias", "Authenticated" ], "answer": "C", "solution": "Typically, the Source Alias optional field is only relevant if the routing process uses Call Processing Language (CPL) that has rules dependent on the source alias. The Alias field is the only field required to use the Locate tool. This provides the destination alias to test the call attempt against. The Source field determines where the simulated search will originate from. The Authenticated field is used to select whether or not the request should be treated as authenticated", "topic": [ "Troubleshooting a Business-to-Business (B2B) Collaboration Solution" ] }, { "id": "Wired Network-264", "type": 0, "question": "Which of the following network overlay technologies allows for a spoke-to-spoke traffic pattern?", "choices": [ "Remote access VPN", "DMVPN", "IPsec", "GRE" ], "answer": "B", "solution": "Explanation: Dynamic multipoint VPN (DMVPN) is the only option that inherently allows for spoke sites to base traffic directly between them, without going to a hub or data center location", "topic": [ "Enterprise WAN Architecture Design" ] }, { "id": "Wired Network-265", "type": 0, "question": "Suppose you need to design a wireless network to support location-based applications. Which one of the following is a correct strategy?", "choices": [ "Tracked devices must be associated to the APs on the same floor.", "Make sure at least one AP can receive a tracked device’s signal at any location.", "Make sure the tracked device can be received at a minimum signal strength of −72 dBm.", "Make sure the tracked device can receive at least one AP’s signal above −72 dBm.\n\nFoundation Topics" ], "answer": "C", "solution": "Multiple APs (at least three, preferably four or more) must be able to receive the tracked device’s signal at a minimum level of −72 dBm. The device does not have to receive the AP signals at all; it can simply send periodic probe requests that are received by any neighboring APs. That also means the device does not have to associate with any AP", "topic": [ "Applying Wireless Design Requirements" ] }, { "id": "Wired Network-266", "type": 0, "question": "Which MDT policy is most frugal with disk space and overhead processing?", "choices": [ "periodic", "data-pump", "on-change", "gzip" ], "answer": "C", "solution": "The on-change MDT policy provides for event-driven telemetry, which pushes metrics only on change. A periodic policy pushes telemetry at a predefined interval and can repeat nonchanging values, which leads to poor disk usage and processing overhead. Answer A is incorrect because periodic frequency is not a frugal deployment policy. Answer B is incorrect because it is a reference to a database export process. Answer D is incorrect because MDT does not use gzip for compression or policy", "topic": [ "Model-Driven Telemetry" ] }, { "id": "Wired Network-267", "type": 0, "question": "Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?", "choices": [ "Class A", "Class B", "Class C", "Class D", "Class E" ], "answer": "D", "solution": "Class D addresses are used for multicast transmissions. Class A, Class B, and Class C addresses are used for unicast transmissions. Class E is for experimental use only", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-268", "type": 0, "question": "What software runs on a machine where data files to be accessed are housed and controls access to those files as requested by a client?", "choices": [ "CAL", "Fileshare server", "Fileshare client", "SAN" ], "answer": "B", "solution": "A fileshare server handles requests from fileshare clients for access to data stored on the server. The fileshare server resides on the same machine as the data. A client access license (CAL) is a license allowing one machine to connect to a server, and SAN is a storage area network, both of which are unrelated to the question", "topic": [ "Networking" ] }, { "id": "Wired Network-269", "type": 0, "question": "What Cisco AV pair authorizes a user to create an EPG in a tenant named Prod?", "choices": [ "shell:domains = all//admin", "shell:domains = all/aaa/tenant-admin", "shell:domains = all/admin/", "domains:shell = admin//all/" ], "answer": "C", "solution": "The first option provides the user administrative access to the entire ACI object hierarchy but with read-only privileges, which is mostly useful for network operator CLI access. The second option provides the user the aaa role with write privileges and the tenant-admin role fabricwide but with read-only privileges. The third option provides full administrative access to the fabric. The fourth option is incorrectly formatted", "topic": [ "Implementing AAA and RBAC" ] }, { "id": "Wired Network-270", "type": 0, "question": "Which one of these protocols requires a connection to be established before transmitting data?", "choices": [ "TCP", "UDP", "IP", "OSPF" ], "answer": "A", "solution": "TCP requires a connection to be established through a three-way handshake before transmitting data", "topic": [ "Fundamentals of Networking Protocols and Networking Devices" ] }, { "id": "Wired Network-271", "type": 0, "question": "Ralph is experiencing long Access Point (AP) association times and generally poor performance on his home 802.11n wireless network. Ralph lives in a large apartment complex, and when he runs a WiFi analyzer, he sees many other nearby networks using the often-recommended channels 1, 6, and 11 on the 2.4 GHz frequency. Using the 5 GHz frequency is not an option for Ralph's equipment. What should Ralph do to improve his network performance?", "choices": [ "Configure his equipment to use channel 2", "Configure his equipment to use channel 5", "Configure his equipment to use channel 9", "Configure his equipment to use channel 10" ], "answer": "C", "solution": "The 2.4 GHz band used by Wireless Local Area Networks (WLANs) consists of channels that are 20 (or 22) MHz wide. However, the channels are only 5 MHz apart, so there is channel overlap that can result in interference, possibly causing long AP association times and degraded performance. Channels 1, 6, and 11 are the only channels that are far enough apart from each other to avoid any overlap with the adjacent channels. This is why they are often recommended. However, in Ralph's case, these channels are too crowded with other networks. Ralph should therefore use a channel that is as far as possible from the crowded ones. Channels 2, 5, and 10 are all immediately adjacent to a crowded channel, but channel 9 is at least two channels away from the nearest crowded channel. Therefore, Ralph should configure his equipment to use channel 9", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-272", "type": 0, "question": "You're installing Bluetooth speakers in a conference room and just entered the pin to connect the two devices. What is your next step?", "choices": [ "Enable pairing.", "Search for the Bluetooth device.", "Enable Bluetooth.", "Test connectivity." ], "answer": "D", "solution": "As with any device installation in IT, the last step is to verify that the device works as intended. The CompTIA A+ objectives list the steps for connecting Bluetooth devices as follows: \n\n 1. Enable Bluetooth.\n 2. Enable pairing.\n 3. Find a device for pairing.\n 4. Enter the appropriate PIN code.\n 5. Test connectivity", "topic": [ "Mobile Devices" ] }, { "id": "Wired Network-273", "type": 0, "question": "Which of the following Ethernet unshielded twisted-pair cabling types is/are commonly used?", "choices": [ "10BaseT", "100BaseTX", "1000BaseTX", "All of the above" ], "answer": "D", "solution": "UTP is commonly used in twisted-pair Ethernet like 10BaseT, 100BaseTX, 1000BaseTX, and so on", "topic": [ "Networking Connectors and Wiring Standards" ] }, { "id": "Wired Network-274", "type": 0, "question": "You are a LAN administrator in charge of printers. Which of the following should you check first when a Windows user is trying to print a document and gets the error message “Print sub-system not available”?", "choices": [ "The correct printer driver is installed.", "The printer has been added.", "The spooler service is running.", "The printer has power from the jack." ], "answer": "C", "solution": "**Explanation:** If a “print sub-system not available” or similar message appears, it most likely means the spooler has stalled. You can turn the spooler back on in the Services section of Computer Management or by issuing the command **net start spooler** in the Command Prompt.\n\n **Incorrect answers:** If the wrong printer driver was installed, either the user would get a message stating that the printer is not available or the document would print but the information would be garbled. If the printer was not added, the user would not be able to print any documents to any printers and therefore should not get an error message. If the printer was not getting power, the user would most likely get a message stating that the printer is not available", "topic": [] }, { "id": "Wired Network-275", "type": 0, "question": "Which of the following allows a server to distinguish among different simultaneous requests from the same host?", "choices": [ "They use different port numbers.", "A NAT server changes the IP address for subsequent requests.", "A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin.", "The MAC address for each one is unique." ], "answer": "A", "solution": "Through the use of port numbers, TCP and UDP can establish multiple sessions between the same two hosts without creating any confusion. The sessions can be between the same or different applications, such as multiple web-browsing sessions or a web-browsing session and an FTP session", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-276", "type": 0, "question": "True or false: PAgP is an industry standard dynamic link aggregation protocol.", "choices": [ "True", "False" ], "answer": "B", "solution": "False. PAgP is a Cisco proprietary link bundling protocol", "topic": [ "VLAN Trunks and EtherChannel Bundles" ] }, { "id": "Wired Network-277", "type": 0, "question": "When a Type 3 LSA is received on a nonbackbone area, what does the ABR do?", "choices": [ "Discards the Type 3 LSA and does not process it", "Installs the Type 3 LSA for only the area for which it was received", "Advertises the Type 3 LSA to the backbone area and displays an error", "Advertises the Type 3 LSA to the backbone area" ], "answer": "B", "solution": "Type 3 LSAs received from a nonbackbone area are inserted into the LSDB only for the source area. ABRs do not create Type 3 LSAs for the other areas", "topic": [ "Advanced OSPF" ] }, { "id": "Wired Network-278", "type": 0, "question": "Which Wi-Fi standard is the fastest, operating in both the 2.4 and 5 GHz frequencies?", "choices": [ "802.11a", "802.11ac", "802.11ax", "802.11n" ], "answer": "C", "solution": "802.11ax (Wi-Fi 6) is considered a replacement for 802.11ac (Wi-Fi 5). 802.11ac operates in the 5 GHz frequency, while 802.11ax can operate between 1 and 7.125 GHz frequencies, encompassing the 2.4 GHz and 5 GHz bands. 802.11ac can send data at over 1 Gbps, while 802.11ax can be several times that. 802.11a was adopted in 1999. It operates at 54 Mbps in the 5 GHz frequency band. 802.11n was adopted in 2008. It operates at 600 Mbps in both the 2.4 GHz and 5 GHz ranges", "topic": [ "Networking" ] }, { "id": "Wired Network-279", "type": 0, "question": "Which of the following provides for a data plane and a control plane?", "choices": [ "SDN", "NIC", "ONT", "MAM" ], "answer": "A", "solution": "**Explanation:** Software-defined networking (SDN) is a technology in which a controlling server defines how data packets are sent through a network. It uses a data plane (for the actual data packets) and a control plane (for the administrative packets). An example of this is OpenFlow.\n\n **Incorrect answers:** NIC stands for network interface card. A NIC is the main networking device in a PC or laptop. ONT stands for optical network terminal; it terminates the signal from a fiber-optic provider. MAM stands for mobile application management, which is a centralized solution that can install and update applications on Android and iOS smartphones and tablets", "topic": [] }, { "id": "Wired Network-280", "type": 0, "question": "What is the best definition of session duration in terms of network profiling?", "choices": [ "The total time the user or device requests services from the network", "The total time the user connects to the network", "The total time a user or device connects to a network and later disconnects from it", "The total time the user logs in to a system and logs out of the system" ], "answer": "C", "solution": "Session is the total time a user or device connects to a network and later disconnects from a network", "topic": [ "Network and Host Profiling" ] }, { "id": "Wired Network-281", "type": 0, "question": "Which of the following is not one of the advantages of iSCSI over Fibre Channel? (Choose all that apply.)", "choices": [ "iSCSI is routable, whereas Fibre Channel is not.", "iSCSI is less expensive to implement than Fibre Channel.", "iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.", "iSCSI can share the same network as standard local area network traffic, whereas Fibre Channel cannot." ], "answer": "C", "solution": "iSCSI does not include its own flow control mechanism. It runs over a TCP connection, which is the protocol responsible for flow control. Because it runs on any IP network, iSCSI traffic is routable, and it is less expensive to implement. Fibre Channel requires a dedicated network using fiber-optic cable. iSCSI traffic can coexist with standard LAN traffic on a single network, although some type of Quality of Service (QoS) mechanism is frequently recommended", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-282", "type": 0, "question": "What protocol provides detailed information on traffic flows between endpoints?", "choices": [ "Syslog", "SNMP", "NetFlow", "SPAN" ], "answer": "C", "solution": "The NetFlow standard provides session information including the source and destination addresses, applications, and traffic volume", "topic": [ "Ensuring Network Availability" ] }, { "id": "Wired Network-283", "type": 0, "question": "You are an IT director, and a fire has broken out in the lower floors of your company's office building. After the personnel are evacuated, the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter, which is threatened by the fire. You direct them to the correct filing cabinet in your office, which contains which of the following document types?", "choices": [ "ESD", "NDA", "BYOD", "MSDS" ], "answer": "D", "solution": "Material Safety Data Sheets (MSDSs) are documents created by manufacturers of chemical, electrical, and mechanical products, which specify the potential risks and dangers associated with them, particularly in regard to flammability and the possibility of toxic outgassing. A properly documented network should have MSDS documents on file for all of the chemical and hardware products used to build and maintain it. MSDSs can be obtained from the manufacturers or the Environmental Protection Agency (EPA). Electrostatic discharges (ESDs), Non-Disclosure Agreements (NDAs), and Bring Your Own Device (BYOD) policies are not concerned with the dangers inherent in building contents", "topic": [ "Network Operations" ] }, { "id": "Wired Network-284", "type": 0, "question": "Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?", "choices": [ "Hub", "Switch", "Bridge", "Router" ], "answer": "D", "solution": "One of the key features of routers is that they break up broadcast domains. Broadcast traffic from one port of the router will not get passed to the other ports, which greatly reduces network traffic. Bridges, hubs, and switches will all forward broadcast packets", "topic": [ "Networking" ] }, { "id": "Wired Network-285", "type": 0, "question": "Which answer describes how a LAN switch dynamically chooses the initial power level to apply to a UTP cable with PoE?", "choices": [ "Autonegotiation", "CDP", "LLDP", "Preconfigured values" ], "answer": "A", "solution": "First, the switch does not supply power based on a configured value to avoid the unfortunate case of supplying power over the cable to a device that does not support the circuitry to receive the power, because doing so will likely harm the electronics on the connected device", "topic": [ "LAN Architecture" ] }, { "id": "Wired Network-286", "type": 0, "question": "What type of link-state advertisement is generated by area border routers, which advertise networks from one area to the another?", "choices": [ "Summary LSA (type 3)", "Network LSA (type 2)", "Summary ASBR (type 4)", "Not-so-stubby area LSA (type 7)" ], "answer": "A", "solution": "Explanation: Type 3 LSAs are generated by area border routers (ABRs) to advertise networks from one area to the rest of the areas in an autonomous system", "topic": [ "Layer 3 Technologies" ] }, { "id": "Wired Network-287", "type": 0, "question": "Which of the following Windows commands enables you to delete the entire ARP cache?", "choices": [ "`arp -c *`", "`arp -d *`", "`arp -a`", "`arp -s`" ], "answer": "B", "solution": "The `arp -d` command is for deleting cache entries, and by running it with the asterisk wildcard, the command deletes all of the entries in the cache. The `arp -a` command displays the entries in the ARP table stored in its cache, and the `arp -s` command is for adding entries. The `arp -c *` command is not a valid option", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-288", "type": 0, "question": "Which IPv6 OSPFv3 command enables you to verify whether an area is a stub area, totally stubby area, NSSA, or totally NSSA?", "choices": [ "show ipv6 protocols", "show ipv6 ospf", "show ipv6 ospf interface", "show ipv6 ospf neighbor" ], "answer": "B", "solution": "The command **show ipv6 ospf** enables you to verify whether an area is a stub area, totally stubby area, NSSA, or totally NSSA", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-289", "type": 0, "question": "How many DNS servers can be added to the Cisco Expressway?", "choices": [ "Four", "Six", "Eight", "Five" ], "answer": "D", "solution": "The Cisco Expressway can contain five DNS servers, although only one is needed for resolutions", "topic": [ "Configure Key Cisco Expressway Settings" ] }, { "id": "Wired Network-290", "type": 0, "question": "Which VPN protocol uses UDP 443 by default?", "choices": [ "TLS", "DTLS", "IKEv2", "IKEv2 with NAT-T" ], "answer": "B", "solution": "DTLS uses UDP 443 by default. TLS uses TCP 443, IKEv2 uses UDP 500, and IKEv2 with NAT-T uses UDP 4500 by default", "topic": [ "AnyConnect VPNs on the ASA and IOS" ] }, { "id": "Wired Network-291", "type": 0, "question": "What is a difference between a LAN and a WAN?", "choices": [ "WANs require a router.", "WANs cover larger geographical areas.", "WANs can utilize either private or public data transport.", "All of the above." ], "answer": "D", "solution": "A typical WAN connects two or more remote LANs together using someone else's network (your ISP's) and a router. Your local host and router see these networks as remote networks and not as local networks or local resources. Routers use proprietary serial connections for WANs", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-292", "type": 0, "question": "The IP address of example.com is 93.184.216.34. You can ping that IP address, but you cannot ping the name example.com. Which of the following statements describes the most likely cause?", "choices": [ "example.com is down.", "The DHCP server is down.", "The DNS server is down.", "The AD DS server is down." ], "answer": "C", "solution": "**Explanation:** The purpose of a DNS server is to resolve (convert) hostnames and domain names to IP addresses. Computers normally communicate via IP addresses, but it is easier for humans to type in names. If example.com is down, you cannot ping the corresponding IP address at all.\n\n **Incorrect answers:** If the DHCP server is down, your workstation will probably not have an IP address on the network and will not ping the corresponding IP address. AD DS stands for Active Directory Domain Services, which is a domain controller and doesn’t have much to do with this scenario except that in many smaller companies, the domain controller and DNS server are one and the same", "topic": [] }, { "id": "Wired Network-293", "type": 0, "question": "What does VRF allow you to do?", "choices": [ "Divide a single physical router into multiple virtual routers.", "Run Spanning Tree Protocol on a router.", "Use BGP on a router that does not support BGP.", "Use a server as a virtual router." ], "answer": "A", "solution": "VRFs divide a single physical router into multiple virtual routers", "topic": [ "VRF, MPLS, and MPLS Layer 3 VPNs" ] }, { "id": "Wired Network-294", "type": 0, "question": "If you are going to run a network cable in the space above the drop ceiling in your office, which type of cable should you use?", "choices": [ "Plenum", "PVC", "Coaxial", "Fiber-optic" ], "answer": "A", "solution": "For areas where a cable must be fire retardant, such as in a drop ceiling, you must run plenum‐grade cable. Plenum refers to the coating on the sleeve of the cable, not the copper or fiber within the cable itself. PVC is the other type of coating typically found on network cables, but it produces poisonous gas when burned", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-295", "type": 0, "question": "Which type of cable is the best solution in terms of cost for connecting an access switch to the distribution layer requiring 140 meters?", "choices": [ "UTP", "Copper", "Multimode fiber", "Single-mode fiber" ], "answer": "C", "solution": "Multimode fiber provides a cost-effective solution for that distance. Single-mode fiber is more expensive. UTP cannot go more than 100 meters", "topic": [ "Enterprise LAN Design" ] }, { "id": "Wired Network-296", "type": 0, "question": "All your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server?", "choices": [ "`192.168.1.1`", "`10.1.1.1`", "`172.16.1.1`", "`169.254.1.1`" ], "answer": "D", "solution": "Automatic Private IP Addressing (APIPA) is a TCP/IP standard used to automatically configure IP-based hosts that are unable to reach a Dynamic Host Configuration Protocol (DHCP) server. APIPA addresses are in the `169.254.0.0/16` range. If you see a computer that has an IP address beginning with 169.254, you know that it has configured itself", "topic": [ "Networking" ] }, { "id": "Wired Network-297", "type": 0, "question": "What configuration settings are commonly used when setting up email from an online provider on a device?", "choices": [ "Active Directory domain name", "Port and TLS settings", "Email server name", "Username and password" ], "answer": "D", "solution": "If you use a common email provider such as Google, Yahoo, Outlook, or iCloud, then setting up email on a device should be simple. Often all you need is your username and password. If setting up a corporate account or if you must manually configure email, then you'll need more information such as the protocol (IMAP [Internet Message Access Protocol] or POP3 [Post Office Protocol version 3]) and the server names for sending and receiving email. You may also need the port number and security settings", "topic": [ "Mobile Devices" ] }, { "id": "Wired Network-298", "type": 0, "question": "Which protocol groups multiple VLANs into a single STP instance?", "choices": [ "GLBP", "STP", "MST", "HSRP" ], "answer": "C", "solution": "Explanation: Multiple Spanning Tree (MST) is a protocol that is used to group multiple VLANs into a single STP instance. This also reduces the total number of spanning-tree instances that match the physical topology of the network, reducing the CPU load", "topic": [ "Layer 2 Technologies" ] }, { "id": "Wired Network-299", "type": 0, "question": "Which of the following is a business network design limitation of a routed access design model?", "choices": [ "More difficult troubleshooting", "Inability to span Layer 2 natively", "Slower convergence time", "Potentially higher costs based on licensed features" ], "answer": "D", "solution": "Explanation: A business network design limitation of the routed access design model is the higher monetary cost for the routing capabilities on the switch infrastructure for the corresponding licensed features required for routing protocols", "topic": [ "Scalable Enterprise Campus Architecture Design" ] }, { "id": "Wired Network-300", "type": 0, "question": "Which are called shortest-path trees (SPTs)?", "choices": [ "Ssource trees", "Shared trees", "Spanning trees", "Routing trees\n\nFoundation Topics\n\nThis chapter covers multicast protocols such as IGMP, CGMP, and PIM. It also covers BIDIR-PIM, SSM, and MSDP.\n\nIn addition, this chapter reviews SNMP characteristics and network management design considerations, such as RMON, NetFlow, LLDP, and syslog." ], "answer": "A", "solution": "Source trees are also called shortest-path trees (SPTs) because they create paths without having to go through a rendezvous point (RP)", "topic": [ "IP Multicast and Network Management" ] }, { "id": "Wired Network-301", "type": 0, "question": "Alice's network has been experiencing intermittent service slowdowns and outages ever since the company moved into their new building. She has tried every troubleshooting procedure she can think of and has not been able to determine the cause. One particular user, hoping to be the squeaky wheel that gets the grease, has taken to calling Alice every time he experiences a problem. One day, as she is working in the datacenter, Alice notices that the user calls her every time she hears an additional humming noise begin. After examining the doors in the hallway, Alice realizes that the racks containing her switches are located right next to the building's elevator machinery room. Which of the following conditions is probably causing the network communication problem?", "choices": [ "EMI", "NEXT", "FEXT", "Attenuation" ], "answer": "A", "solution": "Elevator machinery, fluorescent light fixtures, and other electrical devices in an office environment can generate magnetic fields, resulting in electromagnetic interference (EMI). When copper-based data cables are located too near to such a device, the magnetic fields can generate an electric current on the cable that interferes with the signals exchanged by network devices. If the network users experience a problem every time the elevator machinery switches on, EMI is a likely cause of the problem. Near-end crosstalk (NEXT), far-end crosstalk (FEXT), and attenuation can all cause intermittent network communication problems, but they cannot be caused by elevator machinery", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-302", "type": 0, "question": "Which of the following cable types is not affected by EMI but requires specialized tools for installation?", "choices": [ "Cat 6", "STP", "Fiber optic", "Coaxial" ], "answer": "C", "solution": "**Explanation:** Fiber-optic cable is the only answer listed that is not affected by electromagnetic interference (EMI). Fiber does not use copper wire or electricity but instead uses glass or plastic fibers and light.\n\n **Incorrect answers:** Any copper cable is susceptible to EMI to a certain degree. Regular UTP cable such as Cat 5e or Cat 6 is very susceptible, coaxial slightly less, and shielded twisted pair (STP) even less than that. STP is difficult to install and must be grounded; because of this, it is found less commonly in networks. To truly protect against EMI, fiber optic is the best way to go. Special tools are typically used during installation to splice the fibers properly and test the connection effectively", "topic": [] }, { "id": "Wired Network-303", "type": 0, "question": "Ekahau Site Survey Pro is an example of which one of the following third-party wireless tools?", "choices": [ "Spectrum analyzer", "Packet analyzer", "RF mapping tool", "Wi-Fi scanner" ], "answer": "C", "solution": "ESS Pro is an example of an RF mapping tool, used to measure 802.11 signals over a map of an area", "topic": [ "Troubleshooting WLAN Connectivity" ] }, { "id": "Wired Network-304", "type": 0, "question": "True or false: When hardware proxy is enabled, ACI no longer needs to forward ARP traffic.", "choices": [ "True", "False" ], "answer": "B", "solution": "With hardware proxy, ACI still needs ARP, but it is able to unicast ARP traffic from endpoints unless ARP flooding has been turned on", "topic": [ "Implementing Tenant Policies" ] }, { "id": "Wired Network-305", "type": 0, "question": "Which of the following is a data modeling language used to describe the data for network configuration protocols such as NETCONF and RESTCONF?", "choices": [ "YANG", "SOAP", "Express", "gRPC" ], "answer": "A", "solution": "YANG is a data modeling language used to describe the data for network configuration protocols", "topic": [ "Automation" ] }, { "id": "Wired Network-306", "type": 0, "question": "What are the three primary sources of information in a network audit?", "choices": [ "CIO, network manager, network engineer", "Network manager, management software, CDP", "Network discovery, CDP, SNMP", "Existing documentation, existing management software, new management tools" ], "answer": "D", "solution": "The primary sources of network audits are existing documentation, existing management software, and new management tools", "topic": [ "Network Design Methodology" ] }, { "id": "Wired Network-307", "type": 0, "question": "Which of the following causes system reboots?", "choices": [ "High temperature", "High humidity", "Low temperature", "Low humidity" ], "answer": "A", "solution": "Overheating causes system reboots and failures", "topic": [ "Using Statistics and Sensors to Ensure Network Availability" ] }, { "id": "Wired Network-308", "type": 0, "question": "Which of the following mechanisms enables administrators to maintain current DNS database information on multiple name servers, for fault tolerance and load balancing purposes?", "choices": [ "Multi-master replication", "UDP forwarding", "Iterative query", "Zone transfer" ], "answer": "D", "solution": "A zone transfer is a client/server transaction between two DNS servers in which one server requests a copy of the other server's entire zone database, to update its own. None of the other options are used for DNS database replication. Multi-master replication is a technique that enables two systems to exchange database information as needed to update each other. UDP forwarding is a router mechanism used by DHCP to forward broadcast messages on one subnet to a specific IP address on another subnet. An iterative query is a type of DNS message that transfers responsibility for a name lookup to another server", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-309", "type": 0, "question": "Router R15 has been a working part of a network that uses OSPFv2. An engineer then issues the **shutdown** command in OSPF configuration mode on R15. Which of the following occurs?", "choices": [ "R15 empties its IP routing table of all OSPF routes but keeps its LSDB intact.", "R15 empties its LSDB but keeps OSPF neighbor relationships active.", "R15 keeps OSPF neighbors open but does not accept new OSPF neighbors.", "R15 keeps all OSPF configuration but ceases all OSPF activities (routes, LSDB, neighbors)." ], "answer": "D", "solution": "The OSPF **shutdown** command tells the OSPF process to stop operating. That process includes removing any OSPF-learned routes from the IP routing table, clearing the router’s LSDB, and closing existing OSPF neighbor relationships. In effect, it causes OSPF to stop working on the router, but it does retain the configuration so that a **no shutdown** command will cause the router to start using OSPF again with no changes to the configuration", "topic": [ "OSPF Network Types and Neighbors" ] }, { "id": "Wired Network-310", "type": 0, "question": "Which of the following statements is true about using DNS with an Expressway cluster?", "choices": [ "The DNS server does replicate, so only one cluster member needs to be created in DNS.", "Reverse lookup is not used with clustering, so no PTR records need to be created.", "SRV records are never required when setting up DNS to operate with Expressway clusters.", "The cluster FQDN must be used with the unique IP address of each Expressway when creating the A records." ], "answer": "D", "solution": "To use DNS with a cluster of Expressways, the cluster name must be created in DNS as a fully qualified domain name (FQDN). The DNS server configuration does not replicate, so each cluster member must also be created in DNS with both forward and reverse A records. Reverse lookups are frequently provided through Pointer (PTR) records. SRV records may also be required for the cluster. Multiple entries for each service with equal weights can be entered to cover each peer in the cluster. This configuration is advised for video interoperability and business-to-business (B2B) video calling but is not required for Mobile and Remote Access (MRA). For MRA, create a collab-edge SRV record for each peer in the Expressway Edge cluster. For B2B-only calls the expressway Edge cluster has a DNS SRV record that defines all cluster peers", "topic": [ "Clustering Expressways" ] }, { "id": "Wired Network-311", "type": 0, "question": "To which MSE port does a WLC send AoA messages?", "choices": [ "The WLC does not send AoA messages; APs send them directly to MSE.", "TCP 16113", "UDP 2003", "The WLC does not send AoA messages; MSE pulls them from the WLC using NMSP.\n\nFoundation Topics" ], "answer": "C", "solution": "The WLC receives the AoA messages from the AP and relays them immediately to the MSE, on port UDP 2003. TCP 16113 is used by other Network Mobility Services Protocol (NMSP) messages", "topic": [ "Advanced Location Services Implementation" ] }, { "id": "Wired Network-312", "type": 0, "question": "Which Windows utility can you use to connect to a machine 50 miles away to troubleshoot?", "choices": [ "Remote Desktop", "`netstat`", "`arp`", "Wireshark" ], "answer": "A", "solution": "Microsoft has made what it calls Remote Desktop software available for free with Windows products since Windows NT. When this software is installed (installed by default in later versions) on both source and destination computers, a remote desktop connection can be made", "topic": [ "Network Software Tools and Commands" ] }, { "id": "Wired Network-313", "type": 0, "question": "Which of the following is true of the MONITOR role type?", "choices": [ "All menus and settings are visible to the user, but no changes are authorized.", "You can see only see the Dashboard page and nothing from the Advanced UI.", "All menus and settings are visible to the user, and actions can be taken on the client’s page to disconnect endpoints from the Wi-Fi, but no other configuration changes are authorized.", "No UI access is granted; only SNMP is allowed." ], "answer": "A", "solution": "**Explanation:** MONITOR provides a read-only style of access to the WLC. All pages are visible to the user, but no changes are authorized", "topic": [ "Configuring Device Admin AAA with the Cisco WLC" ] }, { "id": "Wired Network-314", "type": 0, "question": "In the hierarchical network model, at which layer do security filtering, address aggregation, and media translation occur?", "choices": [ "Network layer", "Core layer", "Distribution layer", "Access layer" ], "answer": "C", "solution": "The distribution layer of the hierarchical model is responsible for security filtering, address and area aggregation, and media translation", "topic": [ "Network Design Models" ] }, { "id": "Wired Network-315", "type": 0, "question": "Ralph is a network consultant with a client who wants him to design the Local Area Network (LAN) for his company's new branch office. The site consists of a building with Unshielded Twisted Pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants Ralph to install the fastest possible LAN using the existing cable. After examining the site, Ralph notes that the cable is Category 5 (CAT5), installed using a star topology, and that the individual cable runs are all less than 100 meters long. Which of the following Ethernet physical layer specifications can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?", "choices": [ "10GBase-T", "100Base-TX", "1000Base-T", "1000Base-LX", "1000Base-SX" ], "answer": "C", "solution": "1000Base-T is the fastest Ethernet specification that can run on CAT5 UTP cable. 10GBase-T requires at least Category 5e (CAT5e) or Category 6 (CAT6) UTP cable. 100Base-TX can use CAT5 cable, but it runs at one-tenth the speed of 1000Base-T. 1000Base-LX and 1000Base-SX are fiber-optic specifications that cannot run on CAT5 UTP or any copper cable", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-316", "type": 0, "question": "A router uses _________ as the first criterion for forwarding packets.", "choices": [ "path metric", "administrative distance", "longest match", "hop count" ], "answer": "C", "solution": "The Cisco CEF sorts all network prefixes from shortest match to longest match for programming of the FIB. The path with the longest match is more explicit than a generic path", "topic": [ "IP Routing Essentials" ] }, { "id": "Wired Network-317", "type": 0, "question": "Which protocol maps names to IPv6 addresses?", "choices": [ "Address Resolution Protocol (ARP)", "Network Discovery (ND)", "Domain Name System (DNS)", "DNSv2" ], "answer": "C", "solution": "The DNS maps fully qualified domain names to IPv6 addresses using (AAAA) records", "topic": [ "Internet Protocol Version 6 Design" ] }, { "id": "Wired Network-318", "type": 0, "question": "An engineer types the command **ipv6 route 2001:DB8:8:8::/64 2001:DB8:9:9::9 129** in configuration mode of Router R1 and presses **Enter**. Later, a **show ipv6 route** command does not list any route for subnet 2001:DB8:8:8::/64. Which of the following could have caused the route to not be in the IPv6 routing table?", "choices": [ "The command should be using a next-hop link-local address instead of a global unicast.", "The command is missing an outgoing interface parameter, so IOS rejected the [ipv6 route](vol1_gloss.xhtml#gloss_246) command.", "The router has no routes that match 2001:DB8:9:9::9.", "A route for 2001:DB8:8:8::/64 with administrative distance 110 already exists." ], "answer": "C", "solution": "IOS will add a new static route to the IPv6 routing table if, when using a next-hop global unicast address, the router has a working route to reach that next-hop address and there is no better (lower administrative distance) route for the exact same subnet. So, the correct answer identifies one reason why the route would not appear. The answer that mentions a better route with administrative distance of 110 is a valid reason for the static route to not appear, but the question states that no route for the subnet appears in the routing table, so clearly that competing route does not exist", "topic": [ "Implementing IPv6 Routing" ] }, { "id": "Wired Network-319", "type": 0, "question": "A centralized wireless network is built with 1 WLC and 32 lightweight APs. Which one of the following best describes the resulting architecture?", "choices": [ "A direct Layer 2 path from the WLC to each of the 32 APs, all using the same IP subnet", "A direct Layer 3 path from the WLC to each of the 32 APs, all using the same IP subnet", "32 CAPWAP tunnels daisy-chained between the APs, one CAPWAP tunnel to the WLC", "32 CAPWAP tunnels—1 tunnel from the WLC to each AP, with no IP subnet restrictions" ], "answer": "D", "solution": "Because the network is built with a WLC and APs, CAPWAP tunnels are required. One CAPWAP tunnel connects each AP to the WLC, for a total of 32 tunnels. CAPWAP encapsulates wireless traffic inside an additional IP header, so the tunnel packets are routable across a Layer 3 network. That means the APs and WLC can reside on any IP subnet as long as the subnets are reachable. There are no restrictions for the APs and WLC to live on the same Layer 2 VLAN or Layer 3 IP subnet", "topic": [ "Wireless Infrastructure" ] }, { "id": "Wired Network-320", "type": 0, "question": "Which of the following is a sample use case of a southbound API?", "choices": [ "Pushing network configuration changes down to devices", "Increasing security", "Streaming telemetry", "Sending information to the cloud" ], "answer": "A", "solution": "Southbound APIs send information down to devices within the network", "topic": [ "Application Programming Interfaces (APIs)" ] }, { "id": "Wired Network-321", "type": 0, "question": "A company needs to perform VMM integration, conduct cross-data center vMotion, and leverage vSphere DRS in a multi-data center design. Which solution best fits these requirements?", "choices": [ "ACI Multi-Pod", "ACI Multi-Site", "Remote leaf", "ACI Multi-Tier" ], "answer": "A", "solution": "ACI Multi-Pod is a good fit for a lot of active/active use cases such as DRS. These requirements are not supported with ACI Multi-Site", "topic": [ "ACI Anywhere" ] }, { "id": "Wired Network-322", "type": 0, "question": "To limit the download rate to 5 MB/sec, which value should you enter in a QoS rule?", "choices": [ "4", "5", "40", "50" ], "answer": "C", "solution": "40 Mbps = 5 MB/sec", "topic": [ "Quality of Service (QoS)" ] }, { "id": "Wired Network-323", "type": 0, "question": "Which of the following is the most likely technology used for an access link to a Metro Ethernet service?", "choices": [ "100BASE-LX10", "High-speed TDM (for example, T3, E3)", "MPLS", "100BASE-T" ], "answer": "A", "solution": "Metro Ethernet uses Ethernet access links of various types. Time-division multiplexing (TDM) links such as serial links, even higher-speed links like T3 and E3, do not use Ethernet protocols, and are less likely to be used. MPLS is a WAN technology that creates a Layer 3 service", "topic": [ "WAN Architecture" ] }, { "id": "Wired Network-324", "type": 0, "question": "Which of the following is not a phase in the switched fabric initialization process?", "choices": [ "Fabric reconfiguration", "FCID allocation", "Domain ID distribution", "FCIP allocation", "Principal switch (PS) selection" ], "answer": "D", "solution": "The fabric initialization process consists of four phases: principal switch selection, domain ID distribution, FCID allocation, and fabric reconfiguration", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-325", "type": 0, "question": "Which of the following AAA functions can help log the commands executed by a user on a network device?", "choices": [ "AAA next-generation logging", "Authorization", "Accounting", "Auditing" ], "answer": "C", "solution": "Accounting provides the ability to track and log user access, including user identities, start and stop times, executed commands (that is, CLI commands), and so on. In other words, it maintains a security log of events", "topic": [ "Network Device Access Control and Infrastructure Security" ] }, { "id": "Wired Network-326", "type": 0, "question": "Wavelength division multiplexing is a fiber-optic technique for carrying multiple signals on a single network medium. There are several types of this technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is not one of the ways in which these types of multiplexing differ?", "choices": [ "They use different wavelength spacings.", "They carry different numbers of channels on a single medium.", "They provide different amounts of signal amplification.", "None of the above." ], "answer": "D", "solution": "The types of wavelength division multiplexing use different spacing of the wavelengths they carry, which enables them to fit different numbers of channels on a single medium. WDM (or BWDM) carries two wavelengths for bidirectional communication. CWDM can carry up to 16 channels and DWDM 40 or 80 (depending on the spacing used). Various amplification technologies (including EFDA and Raman) can expand the amounts of usable wavelength in each type", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-327", "type": 0, "question": "You are working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps would you be least likely to perform first when troubleshooting the problem?", "choices": [ "Check the configuration of the router connecting the Local Area Network (LAN) to the Internet.", "Ask the user if she can access resources on the local network.", "Check to see if anyone else is experiencing the same problem.", "Check the user's job title to see if she is an important person in the company." ], "answer": "A", "solution": "There are many possible causes for the problem that are more likely than a router configuration error, so this is not something you should check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and you will know for sure that the problem does not lie in the user's computer. While the user's job title might not be the first thing you check, it is a political reality that higher ranking users get preferential treatment", "topic": [] }, { "id": "Wired Network-328", "type": 0, "question": "A remote workstation can't connect to the network. You want to narrow down the problem to the UTP cable or the network card. Which tool can help you determine whether the cable is causing the problem?", "choices": [ "Multimeter", "OTDR", "Cable tester", "Crimper" ], "answer": "C", "solution": "Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they've been run as well", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-329", "type": 0, "question": "What address type is the IPv6 address FE80::300:34BC:123F:1010?", "choices": [ "Aggregatable global", "Unique-local", "Link-local", "Multicast" ], "answer": "C", "solution": "The defining first hexadecimal digits for link-local addresses are FE8", "topic": [ "Internet Protocol Version 6 (IPv6) Design" ] }, { "id": "Wired Network-330", "type": 0, "question": "What number does the binary value 11000000 represent?", "choices": [ "192", "128", "224", "144" ], "answer": "A", "solution": "A byte is made up of 8 bits, and each bit position in a byte holds a specific numeric value. If the bit is on, then you add the value of that bit to the total for the byte. If the bit is off, then you do not add the value of that bit to the total for the byte. The bit values in an octet, from left to right, are 128, 64, 32, 16, 8, 4, 2, and 1. In this question the bits for 128 and 64 are on while all other bits are off, so the total value of 128 + 64 = 192", "topic": [ "Registration on Cisco Expressway" ] }, { "id": "Wired Network-331", "type": 0, "question": "Which of the following is the term used to describe a wiring nexus—typically housed in a closet—where horizontal networks meet the backbone?", "choices": [ "MDF", "MTBF", "IDF", "SLA", "MOU" ], "answer": "C", "solution": "An Intermediate Distribution Frame (IDF) is the location of localized telecommunications equipment such as the interface between a horizontal network, which connects to workstations and other user devices, and the network backbone. A large enterprise network will typically have demarcation points for telephone services and a connection to an Internet Service Provider's (ISP's) network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. This room is then called the Main Distribution Frame (MDF). Mean Time Between Failure (MTBF), Service Level Agreements (SLAs), and Memoranda of Understanding (MOUs) are not locations of network wiring", "topic": [ "Network Operations" ] }, { "id": "Wired Network-332", "type": 0, "question": "What is the function of a Workgroup Bridge?", "choices": [ "A Mesh AP in Local mode", "A Mesh AP in Bridge mode", "An AP that acts as a client to the mesh network", "An AP that supports daisy chaining\n\nFoundation Topics" ], "answer": "C", "solution": "WGBs function as wireless clients to the mesh network", "topic": [ "Designing Wireless Mesh Networks" ] }, { "id": "Wired Network-333", "type": 0, "question": "What type of network device helps reduce the size of a broadcast domain?", "choices": [ "Hub", "Switch", "Load balancer", "Router" ], "answer": "D", "solution": "Broadcast domains do not cross Layer 3 boundaries. Splitting a Layer 2 topology into multiple subnets and joining them with a router reduces the size of a broadcast domain", "topic": [ "Packet Forwarding" ] }, { "id": "Wired Network-334", "type": 0, "question": "Which OSPF network type is the default on LAN interfaces?", "choices": [ "Broadcast", "NBMA", "Point-to-point", "Point-to-multipoint" ], "answer": "A", "solution": "The broadcast OSPF network type is the default on LAN interfaces", "topic": [ "Troubleshooting OSPFv2" ] }, { "id": "Wired Network-335", "type": 0, "question": "What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?", "choices": [ "Socket", "OUI", "Well-known port", "Network address", "Domain" ], "answer": "A", "solution": "The term for an IPv4 address and port number in combination is _socket_. An Organizationally Unique Identifier (OUI) identifies a manufacturer of networking hardware. A well-known port is a port number assigned to a specific application. A network address is the network identifier part of an IP address. A domain is a group of computers and other resources", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-336", "type": 0, "question": "Which of the following most accurately describes what a PRL is?", "choices": [ "The list of cell phone towers a mobile device should connect with while roaming", "The description of the user and mobile network", "The mobile carrier code", "The configuration settings of the network the mobile device is on" ], "answer": "A", "solution": "The preferred roaming list (PRL) is the list of cell towers a mobile device should connect to while roaming. It is not a description of the user and network, a carrier code, or the configuration settings of the network", "topic": [ "Mobile Connectivity and Application Support" ] }, { "id": "Wired Network-337", "type": 0, "question": "Which network design use case focuses on when a company or business is split into two or more entities?", "choices": [ "Scaling", "Divest", "Design failure", "Merger" ], "answer": "B", "solution": "Explanation: Divest is where you as a network designer are splitting a business or company and the corresponding architecture into two or more functional independent architectures. Scaling is the network design use case that focuses on the scalability of the technology or holistic architecture in question. This could be as simple as a single flat area 0 OSPF design that just doesn’t scale anymore to the business requirements, in which case you could leverage multiple areas, multiple area types, and LSA filtering techniques to help increase the scalability. In a design failure use case, there is a problem, and you have to resolve it. For example, not aligning the critical roles of Spanning Tree Protocol (STP) and First Hop Redundancy Protocol (FHRP). If your STP root bridge and your FHRP default gateways are not aligned to the correct devices, then you would have a suboptimal routing issue that would eventually lead to a design failure. A merger is when two or more different networks are integrated to include their own network design philosophies, to create one single end-to-end architecture", "topic": [ "Network Design" ] }, { "id": "Wired Network-338", "type": 0, "question": "Which of the following network virtualization techniques would be the proper fit if the network design required a high level of scalability?", "choices": [ "VLANs + 802.1Q + VRF", "VLANs + VRFs + GRE tunnels", "VLANs + VRFs + mGRE tunnels", "MPLS with MP-BGP" ], "answer": "D", "solution": "Explanation: The most scalable virtualization option available is MPLS with Multiprotocol Border Gateway Protocol (MP-BGP). With that said, this also comes with a high operational complexity and requires staff to have advanced routing experience", "topic": [ "Scalable Enterprise Campus Architecture Design" ] }, { "id": "Wired Network-339", "type": 0, "question": "Which of the following Windows commands enables you to create a new entry in the Address Resolution Protocol (ARP) cache?", "choices": [ "`arp -N`", "`arp -d`", "`arp -a`", "`arp -s`" ], "answer": "D", "solution": "The `arp -s` command enables you to create a cache record specifying the Media Access Control (MAC) address and its associated Internet Protocol (IP) address. The `arp -N` command enables you to display the ARP cache entries for a specified network interface. The `arp -d` command is for deleting cache entries. The `arp -a` command displays the entries in the ARP table stored in its cache", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-340", "type": 0, "question": "To find a client from a wireless controller GUI, which one of the following should you select?", "choices": [ "Find > Clients", "Monitor > Clients", "Management > Clients", "Monitor > Summary" ], "answer": "B", "solution": "Go to Monitor > Clients, from which you can filter the results based on a client’s MAC address, AP name, and so on", "topic": [ "Troubleshooting WLAN Connectivity" ] }, { "id": "Wired Network-341", "type": 0, "question": "A distribution system port is usually configured in which one of the following modes?", "choices": [ "802.1Q trunk", "Access mode", "LACP trunk negotiation", "Recovery mode" ], "answer": "A", "solution": "The distribution system ports are usually configured as unconditional 802.1Q trunks", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-342", "type": 0, "question": "Which of the following describes the primary function of a Remote Desktop Gateway?", "choices": [ "Provides multiple users with Remote Desktop client access to one workstation", "Provides a single Remote Desktop client with simultaneous access to multiple workstations", "Enables remote users outside the network to access network workstations", "Enables remote users to access workstations without the need for a Remote Desktop client." ], "answer": "C", "solution": "Remote Desktop Gateway is a Windows Server role that enables remote users outside the network to establish a Remote Desktop Protocol (RDP) connection without the need for a Virtual Private Network (VPN) connection. The gateway does not provide multiple Remote Desktop client access to one workstation, Remote Desktop client access to multiple workstations, or access to workstations without a Remote Desktop client", "topic": [ "Network Security" ] }, { "id": "Wired Network-343", "type": 0, "question": "What is the managed object browser called in Cisco UCS Manager?", "choices": [ "Mobrowser", "UCSMobrowser", "Visore", "UCSVisore" ], "answer": "C", "solution": "Cisco UCS Manager provides a managed object browser called Visore. Visore can be accessed by navigating to https:///visore.html", "topic": [ "Cisco Data Center and Compute Management Platforms and APIs" ] }, { "id": "Wired Network-344", "type": 0, "question": "Which of the following are examples of packet- and cell-switched technologies used in the enterprise edge?", "choices": [ "Frame Relay and ATM", "ISDN and T1", "Cable and DSL", "Analog voice and T1" ], "answer": "A", "solution": "Frame Relay and ATM are commonly used to connect to WAN services in the enterprise edge", "topic": [ "WAN Design" ] }, { "id": "Wired Network-345", "type": 0, "question": "Ralph is responsible for the network installation in a new building purchased by his company, and he has elected to have Category 6 (Cat 6) Unshielded Twisted Pair (UTP) cable installed. The company president has asked him if it is possible to run their Gigabit Ethernet network using two of the wire pairs in the cable, while using the other two pairs for telephone connections. Ralph is not sure, so he sets up a lab network using cables with only two pairs connected. When he plugs computers into the switch and turns them on, the Light-Emitting Diodes (LEDs) labeled 1000 light up, indicating that a Gigabit Ethernet connection has been established. Ralph gets excited at the thought of how much money he might save the company by using the same cable for both telephone and data. However, while the LED is lit, he cannot seem to connect to another system over his test network. Which of the following describes what he must do to correct the problem?", "choices": [ "Ralph must manually configure the network adapters to use Gigabit Ethernet, rather than let them autonegotiate.", "Ralph is using the wrong two wire pairs for the Gigabit Ethernet connection. He must rewire the connectors.", "Ralph is using the wrong pinout standard on his lab network. He must use T568A.", "Ralph must use all four wire pairs for a Gigabit Ethernet connection." ], "answer": "D", "solution": "The autonegotiation mechanism is not the problem, nor is the pinout standard or Ralph's wire pair selection. The speed autonegotiation mechanism in Gigabit Ethernet uses only two wire pairs, so although the Light-Emitting Diodes (LEDs) do light up successfully, a functional Gigabit Ethernet data connection requires all four wire pairs", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-346", "type": 0, "question": "True or false: The MST topology can be tuned for root bridge placement, just like PVST+ and RSTP.", "choices": [ "True", "False" ], "answer": "A", "solution": "True. The MST topology can be tuned by setting priority, port cost, and port priority for each MST instance", "topic": [ "Multiple Spanning Tree Protocol" ] }, { "id": "Wired Network-347", "type": 0, "question": "Which device connects to the network and has the sole purpose of providing data to clients?", "choices": [ "NAS", "NAT", "NAC", "IaaS" ], "answer": "A", "solution": "**Explanation:** Network-attached storage (NAS) devices store data for network use. They connect directly to a network.\n\n **Incorrect answers:** Network Address Translation (NAT) is used on routers to connect a group of computers on a private LAN to the Internet by using a single public IP address. NAC, which stands for network access control, is a group of technologies designed to allow or deny access by authenticating users. IaaS, which stands for infrastructure as a service, is a cloud-based technology organizations can use to offload their network infrastructure to a third party. (This is a tougher one to keep you on your toes!)", "topic": [] }, { "id": "Wired Network-348", "type": 0, "question": "Which SIP header field is referenced by CUBE attempting to interwork a SIP REFER when configured for REFER consumption?", "choices": [ "Referred-by", "To", "Request-uri", "Refer-to" ], "answer": "D", "solution": "The Refer-To header is used for dial peer lookups when CUBE has been configured to consume REFER requests", "topic": [ "CUBE Interworking Features" ] }, { "id": "Wired Network-349", "type": 0, "question": "You have redistributed the 10.0.0.0/24 network from RIP into EIGRP and then from EIGRP into OSPF. What will the administrative distance and source routing protocol code be for the 10.0.0.0/24 in the routing table of an EIGRP router in the EIGRP AS?", "choices": [ "Administrative Distance will be 170 and code will be D EX.", "Administrative Distance will be 90 and code will be D.", "Administrative Distance will be 110 and code will be O.", "Administrative Distance will be 110 and code will be O E2.", "Administrative Distance will be 120 and code will be R." ], "answer": "A", "solution": "When redistributing into EIGRP routes will get an AD of 170 and a code of D EX", "topic": [ "Troubleshooting Redistribution" ] }, { "id": "Wired Network-350", "type": 0, "question": "Which protocol and port are used in SNMP polling by default?", "choices": [ "TCP 161", "UDP 161", "TCP 163", "UDP 163" ], "answer": "B", "solution": "The default NTP port is UDP 161", "topic": [ "Data Center Network Management and Monitoring" ] }, { "id": "Wired Network-351", "type": 0, "question": "Which of the following network interface occurrences is considered to be a malfunction on a full-duplex Ethernet network but is not a malfunction on a half-duplex Ethernet network?", "choices": [ "Runts", "Late collisions", "Giants", "Collisions" ], "answer": "D", "solution": "All of these occurrences are malfunctions on a full-duplex Ethernet network, but collisions are normal and expected on a half-duplex network. Runt frames occur when a network interface generates packets that are smaller than the 64-byte minimum allowable length. Giants occur when frames are larger than the 1518-byte maximum allowable length. Late collisions occur when network cables are too long, and frames collide after leaving the sending system", "topic": [] }, { "id": "Wired Network-352", "type": 0, "question": "Which of the following datacenter disaster recovery mechanisms is the least expensive to implement?", "choices": [ "A cold site", "A warm site", "A hot site", "A cloud site" ], "answer": "D", "solution": "A cloud site is the least expensive to implement. Cold, warm, and hot backup sites differ in the hardware and software they have installed, but they all require the maintenance of a facility for a new datacenter. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive of the cold, warm, and hot options and takes the most time. A warm site has hardware in place that must be installed and configured. A hot site has all of the necessary hardware already installed, configured, and ready to go in the event of a disaster. A warm site is more expensive than a cold site, and a hot site is the most expensive and takes the least amount of time to be made operational. A cloud site is a virtual facility maintained with a cloud service provider. The cloud site does not require physical space or physical hardware, so it is therefore the least expensive", "topic": [ "Network Operations" ] }, { "id": "Wired Network-353", "type": 0, "question": "Which device monitors incoming voltage levels and overvoltage thresholds?", "choices": [ "Repeater", "Toner probe", "VOM", "Surge protector" ], "answer": "D", "solution": "To measure AC power levels to make sure they are within specifications, a surge protector is used. They can also mitigate overvoltage conditions to protect the connected equipment", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-354", "type": 0, "question": "Which of the following versions of NFS supports only TCP as its transport protocol?", "choices": [ "NFS version 1", "NFS version 2", "NFS version 3", "NFS version 4" ], "answer": "D", "solution": "NFS versions 2 and 3 support both TCP and UDP. NFS version 4 supports only TCP as its transport protocol", "topic": [ "Describe NFS and NAS Concepts" ] }, { "id": "Wired Network-355", "type": 0, "question": "A laptop with an integrated 802.11 WLAN card is unable to connect to any wireless networks. Just yesterday the laptop was able to connect to wireless networks. Which of the following statements describes the most likely cause?", "choices": [ "The wireless card drivers are not installed.", "The wireless card is disabled in BIOS.", "The wireless card firmware requires an update.", "The wireless hardware button is turned off." ], "answer": "D", "solution": "**Explanation:** The wireless hardware button is disabled. Always check whether Wi-Fi is enabled. Often this occurs via a key that shares one of the function keys of a laptop. To enable it, press the Fn key and the appropriate function key (such as F12) at the same time. If Wi-Fi is already enabled, make sure that the wireless adapter is enabled in Windows. Also, check whether the laptop is within range of the wireless access point.\n\n **Incorrect answers:** The drivers and the firmware should not be an issue because the laptop was able to connect yesterday. However, you never know what might have happened, so check those later on in your troubleshooting process", "topic": [] }, { "id": "Wired Network-356", "type": 0, "question": "An access point has been deployed with full features, including dual radios and hyperlocation. The AP requires 38W of power. Which of the following Power over Ethernet capabilities should you recommend be used?", "choices": [ "PoE", "PoE+", "UPOE", "UPOE+" ], "answer": "C", "solution": "UPOE is capable of 60W per port, with a maximum of 51W to the PD. PoE+ is limited to 30W per port and only 25.5W maximum to the PD", "topic": [ "Physical and Logical Infrastructure Requirements" ] }, { "id": "Wired Network-357", "type": 0, "question": "When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?", "choices": [ "IaaS", "PaaS", "SaaS", "DaaS", "None of the above" ], "answer": "C", "solution": "The Software as a Service (SaaS) model provides consumers with access to a specific application running on the provider's servers. Infrastructure as a Service (IaaS) provides the consumers with processing, storage, and networking resources that they can use to install and run operating systems and other software of their choice. Platform as a Service (PaaS) provides consumers with the ability to install applications of their choice on a server installed by the provider. Desktop as a Service (DaaS) provides remote virtualization of the entire workstation desktop, instead of a single application", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-358", "type": 0, "question": "True or false: The VTP summary advertisement includes the VLANs that were recently added, deleted, or modified.", "choices": [ "True", "False" ], "answer": "B", "solution": "False. The VTP summary includes the VTP version, domain, configuration revision, and time stamp", "topic": [ "VLAN Trunks and EtherChannel Bundles" ] }, { "id": "Wired Network-359", "type": 0, "question": "Which of the following is the best definition of a subinterface?", "choices": [ "A logical network interface created from a physical network interface", "One of the ports on a physical network interface adapter with multiple ports", "A physical network interface connected to a subnet", "One of the IP addresses associated with a network interface that has multiple IP addresses" ], "answer": "A", "solution": "A subinterface is a logical (or virtual) network interface associated with a specific physical network interface. Devices (such as routers) can use multiple subinterfaces to connect to different subnets using a single physical network interface adapter. A subinterface is a logical device, so it is not one port on a physical network interface adapter or a physical adapter connected to a subnet. A subinterface is a complete logical interface, not just an IP address", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-360", "type": 0, "question": "Which of the following can run full-duplex and achieve 200 Mbps with Cat 5e cable?", "choices": [ "100BaseF", "100BaseTX", "1000BaseF", "1000BaseT" ], "answer": "B", "solution": "100BaseTX uses CAT 5e and can run 200 Mbps when using full-duplex", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-361", "type": 0, "question": "You've been asked to replace some UTP network cable with other UTP cable that is capable of 10 Gbps. The longest drop is 75 meters from the network rack. What is the lowest category of cable that can meet your needs?", "choices": [ "Cat 5", "Cat 5e", "Cat 6", "Cat 6a" ], "answer": "D", "solution": "Cat 6 and newer can support 10 Gbps, but Cat 6 can only go 55 meters at 10 Gbps. To go 100 meters you'll need Cat 6a. Cat 5e's top speed is 1 Gbps, and Cat 5 is only 100 Mbps", "topic": [ "Hardware" ] }, { "id": "Wired Network-362", "type": 0, "question": "You are experiencing poor performance on your home 802.11n wireless network. You live in a large apartment complex, and when you run a WiFi analyzer, you see many other nearby networks using the often-recommended channels 1, 6, and 11 on the 2.4 GHz frequency. Using the 5 GHz frequency is not an option for your equipment. What should you do to improve the network's performance?", "choices": [ "Configure your equipment to use channel 10.", "Configure your equipment to use channel 9.", "Configure your equipment to use channel 5.", "Configure your equipment to use channel 2." ], "answer": "B", "solution": "The 2.4 GHz band used by Wireless Local Area Networks (WLANs) consists of channels that are 20 (or 22) MHz wide. However, the channels are only 5 MHz apart, so there is channel overlap that can result in interference. Channels 1, 6, and 11 are the only channels that are far enough apart from each other to avoid any overlap with the adjacent channels. This is why they are often recommended. However, in this scenario, these channels are too crowded with other networks. You should therefore use a channel that is as far as possible from the crowded ones. Channels 2, 5, and 10 are all immediately adjacent to a crowded channel, but channel 9 is at least two channels away from the nearest crowded channel. Therefore, you should configure your equipment to use channel 9", "topic": [] }, { "id": "Wired Network-363", "type": 0, "question": "You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?", "choices": [ "SMTP", "SNMP", "DHCP", "ARP" ], "answer": "C", "solution": "Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your network. DHCP can provide a lot of information, but the most common is IP address, subnet mask, default gateway, and DNS information", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-364", "type": 0, "question": "Which of the following indicates that a printer is network ready?", "choices": [ "An RJ11 jack", "A USB connector", "An RJ45 jack", "An SCSI connector" ], "answer": "C", "solution": "**Explanation:** The RJ45 jack enables a connection to a twisted-pair (most likely Ethernet) network. A printer with a built-in RJ45 connector is network ready; so is a printer that is Wi-Fi enabled.\n\n **Incorrect answers:** RJ11 ports are used by modems and dial-up Internet connections. If a printer has an RJ11 port, it is a multifunction printer acting as a fax machine. USB is the standard port for a printer; it allows the printer to connect to a PC or to a print server. SCSI connectors are not often found on today’s printers; such a connector indicates a local connection, not a network connection", "topic": [] }, { "id": "Wired Network-365", "type": 0, "question": "One of your customers cannot access any websites but can access the company FTP site and can access internal email within Outlook. Which of the following will fix the problem?", "choices": [ "Reconfigure the proxy settings.", "Disable the firewall.", "Deactivate and reactivate the network interface card.", "Remove and reinstall the web browser." ], "answer": "A", "solution": "**Explanation:** The best listed answer is to reconfigure the proxy settings for the customer. Chances are that the customer uses a proxy server for HTTP and HTTPS website connections. Without the properly configured proxy settings, the user might not be able to access the websites but would be able to access other networking services, such as FTP and email.\n\nNote\n\nAnother thing to check is whether the user is working on the correct web browser. Perhaps Edge has the properly configured proxy settings, but the user is working in Firefox, and that is what is causing the problem", "topic": [] }, { "id": "Wired Network-366", "type": 0, "question": "The first 24 bits of a multicast MAC address always start with ______.", "choices": [ "01:5E:00", "01:00:53", "01:00:5E", "01:05:E0", "none of the above" ], "answer": "C", "solution": "The first 24 bits of a multicast MAC address always start with 01:00:5E. The low-order bit of the first byte is the individual/group bit (I/G) bit, also known as the unicast/multicast bit, and when it is set to 1, it indicates that the frame is a multicast frame and the 25th bit is always 0", "topic": [ "Multicast" ] }, { "id": "Wired Network-367", "type": 0, "question": "What is the main difference between IGMPv2 and IGMPv3?", "choices": [ "IGMPv3’s max response time is 10 seconds by default.", "IGMPv3 sends periodic IGMP membership queries.", "IGMPv3 introduced a new IGMP membership report with source filtering support.", "IGMPv3 can only work with SSM, while IGMPv2 can only work with PIM-SM/DM." ], "answer": "C", "solution": "IGMPv3 supports all IGMPv2’s IGMP message types and is backward compatible with it. The differences between the two are that IGMPv3 added new fields to the IGMP membership query and introduced a new IGMP message type called a Version 3 membership report to support source filtering", "topic": [ "Multicast" ] }, { "id": "Wired Network-368", "type": 0, "question": "What is the destination UDP port used by the LISP data plane?", "choices": [ "4341", "4143", "4342", "4142" ], "answer": "A", "solution": "The destination UDP port used by the LISP data plane is 4341. UDP port 4342 is used for LISP’s control plane messages", "topic": [ "Overlay Tunnels" ] }, { "id": "Wired Network-369", "type": 0, "question": "Ed is working the help desk at a local computer store, and he receives a call from a customer trying to set up a home network using Windows 10 and wired Ethernet equipment. The customer reports that, from her computer, she can see the two other computers in the house, but she cannot access the Internet. Ed asks her to run the `ipconfig /all` command and read the results to him. She says that her IP address is 172.16.41.2, her subnet mask is 255.255.255.0, and her default gateway is 172.16.43.1. Which of the following is most likely the cause of the customer's problem?", "choices": [ "The customer's network cable is unplugged.", "The customer has an incorrect subnet mask.", "The customer has an incorrect default gateway address.", "The computer's DNS record contains the wrong information.", "The computer is inhibited by a switching loop." ], "answer": "C", "solution": "Because the customer can access the other two computers in the house, Ed knows that her Internet Protocol (IP) address and subnet mask are properly configured, that the network cable is plugged in and functional, and that a switching loop is not preventing access to the Internet. Ed also knows that the computer's Domain Name System (DNS) record does not play a role in outgoing connections. The problem is most likely in the default gateway because the gateway address the customer specified is on another network, 172.16.43.0, rather than on her own network, 172.16.41.0", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-370", "type": 0, "question": "What port does the RDP protocol work on?", "choices": [ "53", "143", "389", "3389" ], "answer": "D", "solution": "Remote Desktop Protocol (RDP) works on port 3389. DNS works on port 53, IMAP4 works on port 143, and LDAP works on port 389", "topic": [ "Introduction to TCP/IP" ] }, { "id": "Wired Network-371", "type": 0, "question": "Which of the following cable installation tools is likely to be the most expensive?", "choices": [ "A crimper", "A cable certifier", "A punchdown tool", "A wiremap tester" ], "answer": "B", "solution": "Crimpers and punchdown tools are relatively simple and inexpensive mechanical devices that cable installers use to connect bulk cable to connectors. A wiremap tester is an electronic device for cable testing, but it is still relatively simple. A cable certifier is a complex electronic device that can perform a battery of tests on a cable run, confirm that the cable conforms to the required wiring standards, and maintain records of the testing procedure. Cable certifiers are by far the most expensive of the devices listed", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-372", "type": 0, "question": "You are upgrading a wireless network from Wi-Fi 5 over to Wi-Fi 6. Which of the following statements is _not_ correct?", "choices": [ "Users should get faster speeds.", "Network range will be similar.", "Fewer users will be able to use each access point.", "Devices may have lower power usage while connecting to the network." ], "answer": "C", "solution": "Wi‐Fi 6 is faster than Wi‐Fi 5, and the network range is similar. More users should be able to access each access point, not fewer. Devices may have lower power usage in Wi‐Fi 6 due to a new sleep feature", "topic": [ "Wireless and SOHO Networks" ] }, { "id": "Wired Network-373", "type": 0, "question": "What type of subscription is useful for situations in which a data value changes occasionally but the information needs to be sent in a timely manner?", "choices": [ "On-change publication", "Dial-out", "Periodic publication", "Dial-in\n\nFoundation Topics\n\nThis chapter covers automation, data models, and protocol information that you need to master for the ENSLD 300-420 exam. It covers the YANG data models with IETF and OpenConfig, along with NETCONF and RESTCONF protocols. In addition, this chapter describes model-driven telemetry and how it can be used to gather information from network devices." ], "answer": "A", "solution": "On-change publication is a subscription that is useful for when a data value changes occasionally but the information needs to be sent in a timely manner", "topic": [ "Automation" ] }, { "id": "Wired Network-374", "type": 0, "question": "Why is a rogue client something you would want to get alarms about?", "choices": [ "Because the fact that one of your clients has decided to leave your network for an AP you do not manage is suspicious", "Because a rogue client is sending invalid frames to your network and is a likely sign of an ongoing attack", "Because a rogue client offers AP service, which is not normal when a wireless infrastructure is available", "Because a rogue client establishes direct communication with other clients, thus avoiding the infrastructure, which is suspicious" ], "answer": "A", "solution": "A rogue client is one of your clients that is connecting to a rogue AP instead of your wireless infrastructure. The reason why one of your clients made this decision might need to be investigated. A rogue client does not offer AP services (otherwise, it would be classified as a rogue AP) and does not send invalid frames (it just associates to a rogue). A client that establishes direct connection to other clients is called an ad hoc rogue", "topic": [ "Monitoring and Troubleshooting WLAN Components" ] }, { "id": "Wired Network-375", "type": 0, "question": "Which of the following objects is used when attaching a bare-metal server to an ACI fabric?", "choices": [ "External bridge domain", "VMM domain", "Routed domain", "Physical domain" ], "answer": "D", "solution": "A physical domain governs the attachment of bare-metal servers and appliances that need static VLAN allocations", "topic": [ "Access Policies" ] }, { "id": "Wired Network-376", "type": 0, "question": "Which of the following terms describes the progressive weakening of transmitted signals as they travel along a network medium?", "choices": [ "Absorption", "Latency", "Attenuation", "Crosstalk" ], "answer": "C", "solution": "Attenuation is the weakening of a signal as it travels long distances, whether on a wired or wireless medium. The longer the transmission distance, the more the signal weakens. Absorption is the tendency of a wireless signal to change as it passes through different materials. Latency is a measurement of the time it takes for a signal to travel from its source to its destination. Crosstalk is a type of interference that occurs on wired networks when a signal bleeds over to an adjacent wire", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-377", "type": 0, "question": "Which of the following is a group of network operators working on developing programmable interfaces and tools for managing networks in a vendor-neutral way?", "choices": [ "IETF", "IANA", "ARIN", "OpenConfig" ], "answer": "D", "solution": "OpenConfig is a group of network operators working on developing programmable interfaces and tools for managing networks in a vendor-neutral way", "topic": [ "Automation" ] }, { "id": "Wired Network-378", "type": 0, "question": "Which of the following options is the correct VLAN-based Metro Ethernet transport mode for an E-LAN service type?", "choices": [ "Ethernet private line", "Ethernet virtual private line", "Ethernet private LAN", "Ethernet virtual private LAN" ], "answer": "D", "solution": "Explanation: The correct VLAN-based Metro Ethernet transport mode for an E-LAN service is Ethernet virtual private LAN (EVPLAN)", "topic": [ "Transport Technologies" ] }, { "id": "Wired Network-379", "type": 0, "question": "Using the T568B wiring standard on both ends of a cable would produce what type of network cable?", "choices": [ "T568B on both ends is not a working network cable.", "T568B is a telephone wiring standard.", "T568B on both ends is a crossover network cable.", "T568B on both ends is a straight-through network cable." ], "answer": "D", "solution": "A cable with the same T568 standard on both ends is a straight-through network cable. These are used for patch cables and network drops. If you have a T568A on one end and a T568B on the other, that's a crossover cable", "topic": [ "Hardware" ] }, { "id": "Wired Network-380", "type": 0, "question": "Which of the following terms describes a leased line subscription that provides access to only part of a T-1?", "choices": [ "E-1", "B channel", "OC-1", "Fractional T-1" ], "answer": "D", "solution": "A subscription to part of the T-1 leased line is called a fractional T-1 service. This service enables you to purchase some of the 24 DS0 channels in a T-1 connection. An E-1 is the European version of a T-1. A B channel is part of an Integrated Services Digital Network (ISDN) service, not a T-1. An OC-1 is a fiber-optic connection on the Synchronous Optical Network (SONET) service", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-381", "type": 0, "question": "Which IPv6 OSPFv3 command enables you to verify which routers the local router has formed neighbor adjacencies with?", "choices": [ "show ipv6 protocols", "show ipv6 ospf", "show ipv6 ospf interface", "show ipv6 ospf neighbor" ], "answer": "D", "solution": "The **show ip** **v6 ospf neighbor** command enables you to verify which routers the local router has formed neighbor adjacencies with", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-382", "type": 0, "question": "Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph's proposed Internet access solution is true?", "choices": [ "The proposal fails to satisfy both the primary and secondary objectives.", "The proposal satisfies the primary objective but neither of the secondary objectives.", "The proposal satisfies the primary objective and one of the secondary objectives.", "The proposal satisfies the primary objective and both of the secondary objectives." ], "answer": "C", "solution": "Proxy servers provide network users with access to Internet services, and the unregistered IP addresses on the client computers protect them from unauthorized access by users on the Internet, which satisfies the first objective. The proxy servers also make it possible for network administrators to regulate users' access to the Internet, which satisfies one of the two secondary objectives. However, the proxy servers cannot assign IP addresses to the client computers, and the plan makes no mention of DHCP or another automatic TCP/IP configuration mechanism. Therefore, the plan does not satisfy the other secondary objective", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-383", "type": 0, "question": "In a Layer 2 roam, what mechanism is used to tunnel client data between the two controllers?", "choices": [ "GRE tunnel", "EoIP tunnel", "CAPWAP tunnel", "None of these answers" ], "answer": "D", "solution": "In a Layer 2 roam, the client’s IP subnet does not change as it moves between controllers. Therefore, there is no need to tunnel the client data between the controllers; instead, the client simply gets handed off to the new controller", "topic": [ "Understanding Wireless Roaming and Location Services" ] }, { "id": "Wired Network-384", "type": 0, "question": "Which topology would allow customers to roll out new transport services such as IPv6 or multicast most rapidly?", "choices": [ "MPLS L2VPN WAN", "MPLS L3VPN WAN", "Internet as WAN", "Internet as transport" ], "answer": "A", "solution": "Explanation: An MPLS L2VPN WAN allows a customer to roll out new transport technologies and services, like IPv6 or multicast, rapidly without having to wait on the provider to make any changes", "topic": [ "Enterprise WAN Architecture Design" ] }, { "id": "Wired Network-385", "type": 0, "question": "Which method will _not_ help you determine whether the ASA WebVPN service is running?", "choices": [ "Run the show vpn sessiondb command.", "Run the show ipsec crypto sa command.", "View the client TLS event under Monitoring > Logging > Real-time Log Viewer > View.", "Use the show logging command with logging buffered enabled." ], "answer": "B", "solution": "The **show ipsec crypto sa** command does not show details about the status of the WebVPN service", "topic": [ "Troubleshooting Remote Access VPNs" ] }, { "id": "Wired Network-386", "type": 0, "question": "What is the correct order of operations for an IPv4 ACL?", "choices": [ "Top-down processing, execute upon the longest match, implicit deny all", "Execute upon the longest match, top-down processing, implicit deny all", "Implicit deny all, immediate execution upon a match, top-down processing", "Top-down processing, immediate execution upon a match, implicit deny all" ], "answer": "D", "solution": "The correct order of operations for an IPv4 ACL is top-down processing, immediate execution upon a match, implicit deny all", "topic": [ "Troubleshooting ACLs and Prefix Lists" ] }, { "id": "Wired Network-387", "type": 0, "question": "Which of the following statements is true?", "choices": [ "Threat defense in transparent mode cannot be configured by a management center.", "You can change the firewall deployment mode by using the management center.", "You cannot change the firewall mode until you unregister the threat defense from the management center.", "When you change the firewall mode, the threat defense saves the running configurations." ], "answer": "C", "solution": "You cannot change the firewall mode until you unregister the desired threat defense from the management center", "topic": [ "Firewall Deployment in Routed Mode" ] }, { "id": "Wired Network-388", "type": 0, "question": "Which of the following Wide Area Network (WAN) technologies uses broadband signaling?", "choices": [ "Digital Subscriber Line (DSL)", "Synchronous Optical Network (SONET)", "Integrated Services Digital Network (ISDN)", "Cable television (CATV)" ], "answer": "D", "solution": "CATV networks use broadband signaling, which enables many signals to occupy the same channel. DSL and ISDN do not use broadband signaling. SONET is a physical layer standard that defines fiber-optic connections", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-389", "type": 0, "question": "You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?", "choices": [ "SLA", "MTBF", "AUP", "MTTR" ], "answer": "A", "solution": "A Service Level Agreement (SLA) is a contract between a provider and a subscriber that specifies the percentage of time that the contracted services are available. Mean Time Between Failure (MTBF) is a hardware specification that estimates how long a particular component can be expected to function. Acceptable Use Policies (AUPs) specify whether and how employees can utilize company-owned hardware and software resources. Mean Time to Repair (MTTR) specifies the average time it will take to repair a specific hardware company when it malfunctions", "topic": [ "Network Operations" ] }, { "id": "Wired Network-390", "type": 0, "question": "Which of the following statements about TACACS profiles is accurate?", "choices": [ "Switching between the Raw view and the Task Attribute view requires you to reenter the values.", "You can switch seamlessly between the Task Attribute view and the Raw view without losing your configuration.", "TACACS profiles are used for per-command authorization.", "RADIUS profiles are used for per-command authorization." ], "answer": "B", "solution": "**Explanation:** The Task Attribute view is a graphical front end for creating the raw TACACS values. You can create a result in either view and seamlessly switch between the views without losing your work", "topic": [ "Configuring Device Admin AAA with the Cisco WLC" ] }, { "id": "Wired Network-391", "type": 0, "question": "You are configuring a router for a small office network. The network users should be able to access regular and secure websites and send and receive email. Those are the only connections allowed to the Internet. Which security feature should you configure to prevent additional traffic from coming through the router?", "choices": [ "MAC filtering", "Content filtering", "Port forwarding/mapping", "Port security/disabling unused ports" ], "answer": "D", "solution": "Port security involves disabling all unneeded protocols/ports. In this case, ports 80 and 443 are needed for HTTP and HTTPS access, and ports 25, 110, 143, 465 or 587 may be needed for email. That's it. If you don't need them, remove the additional protocols, software, or services, or prevent them (disable them, or block them, as the setting is typically called on a router) from loading. Ports left open but not in use present an open door for an attacker to enter. MAC filtering is an option on most routers that will only allow devices with specific MAC addresses to access the router. Content filtering blocks undesirable traffic such as social media or hate sites on a corporate network. Port forwarding/mapping will send all traffic that comes in on a specified port number to a specific node on the network", "topic": [ "Security" ] }, { "id": "Wired Network-392", "type": 0, "question": "What type of entry in a DNS record can be used for load balancing of incoming mail?", "choices": [ "MX", "DX", "AAAA", "TXT" ], "answer": "A", "solution": "Multiple Mail Exchanger (MX) records can be set up for a domain that specify different mail servers for load balancing. Direct Connect (DX) is an Amazon Web Services dedicated connection between client and AWS. AAAA signifies an IPv6 address in a DNS record, and TXT DNS records let an administrator specify text in their DNS record. These text records can be used to prevent email spam", "topic": [ "Networking" ] }, { "id": "Wired Network-393", "type": 0, "question": "You are testing a twisted-pair cable run using a tone generator and locator. When you apply the tone generator to a particular pin at one end of the cable, you detect a tone on two pins at the other end. Which of the following faults have you discovered?", "choices": [ "Split pair", "Open", "Short", "Crosstalk" ], "answer": "C", "solution": "A short is when a wire is connected to two or more pins at one end of the cable or when the conductors of two or more wires are touching inside the cable. This would cause a tone applied to a single pin at one end to be heard on multiple pins at the other end. The other three options would not cause this to occur. An open circuit would manifest as a failure to detect a tone on a wire, indicating that there is either a break in the wire somewhere inside the cable or a bad connection with the pin in one or both connectors. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires", "topic": [] }, { "id": "Wired Network-394", "type": 0, "question": "Which of the following **access-list** commands permits packets going to any web client from all web servers whose IP addresses begin with 172.16.5?", "choices": [ "access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www", "access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www", "access-list 2523 permit tcp any eq www 172.16.5.0 0.0.0.255", "access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www 172.16.5.0 0.0.0.255", "access-list 2523 permit tcp 172.16.5.0 0.0.0.255 eq www any" ], "answer": "E", "solution": "Because the packet is going toward any web client, you need to check for the web server’s port number as a source port. The client IP address range is not specified in the question, but the servers are, so the source address beginning with 172.16.5 is the correct answer", "topic": [ "Advanced IPv4 Access Control Lists" ] }, { "id": "Wired Network-395", "type": 0, "question": "What is an ASBR?", "choices": [ "Area Border Router", "Autonomous System Boundary Router", "Auxiliary System Border Router", "Area System Border Router" ], "answer": "B", "solution": "OSPF defines the ASBR as the router that injects external routes into the OSPF autonomous system", "topic": [ "OSPF, BGP, Route Manipulation, and IP Multicast" ] }, { "id": "Wired Network-396", "type": 0, "question": "What is the LSA age field in the LSDB used for?", "choices": [ "For version control—to ensure that the most recent LSA is present", "To age out old LSAs by removing an LSA when its age reaches zero", "For troubleshooting—to identify exactly when the LSA was advertised", "To age out old LSAs by removing an LSA when it reaches 3600 seconds" ], "answer": "D", "solution": "LSAs are deemed invalid when they reach 3600 seconds and are purged from the LSDB", "topic": [ "Advanced OSPF" ] }, { "id": "Wired Network-397", "type": 0, "question": "Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use TCP/IP?", "choices": [ "0", "1", "2", "3", "You cannot tell from the information provided." ], "answer": "D", "solution": "Although a subnet and a VLAN are not equivalent concepts, the devices in one VLAN are typically in the same IP subnet and vice versa", "topic": [ "Implementing Ethernet Virtual LANs" ] }, { "id": "Wired Network-398", "type": 0, "question": "You are responsible for an internetwork that consists of four internal Local Area Networks (LANs) with 50 users each. Each internal LAN uses twisted-pair Gigabit Ethernet links that connect the users to a switch. Each of the four switches is connected to a separate router. All four routers connect to the same backbone network, which has a single additional router to connect the company's network to the Internet, using a T-1 Wide Area Network (WAN) link. Today, users on one of the four internal LANs are reporting that when they came in this morning, they could not access the Internet or resources on the other three internal LANs. However, they could access resources on their own LAN with no problems. Which network component is the likeliest source of the problem in this scenario?", "choices": [ "The switch on the problem LAN", "The Internet router", "The router connecting the problem LAN to the backbone", "The cable on the backbone network" ], "answer": "C", "solution": "In this scenario, only the users on one LAN are experiencing problems connecting to the Internet and the other internal LANs. This isolates the problem to a component within that LAN only. Since users can connect successfully to local resources, the problem does not lie within the individual computers, the switch that connects the users to the network, or the backbone network cable. The likeliest problem is therefore in the router connecting the problem LAN to the backbone network. Since users on the other internal LANs are not reporting problems connecting to the Internet, the problem most likely does not involve the Internet router", "topic": [] }, { "id": "Wired Network-399", "type": 0, "question": "Which command displays the advanced settings of an inline interface set?", "choices": [ "show interface ip brief", "show inline-set", "show interface detail", "show interface inline detail" ], "answer": "B", "solution": "The **show inline-set** command displays the advanced settings of an inline interface set", "topic": [ "IPS-Only Deployment in Inline Mode" ] }, { "id": "Wired Network-400", "type": 0, "question": "Imagine that you have configured the **enable secret** command, followed by the **enable password** command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?", "choices": [ "enable password", "enable secret", "Neither", "The password command, if it is configured" ], "answer": "B", "solution": "If both commands are configured, IOS accepts only the password as configured in the **enable secret** command", "topic": [ "Configuring Basic Switch Management" ] }, { "id": "Wired Network-401", "type": 0, "question": "What is the default administrative distance of an OSPF intra-area route?", "choices": [ "90", "110", "115", "120" ], "answer": "B", "solution": "OSPF has a default AD of 110", "topic": [ "IPv4/IPv6 Addressing and Routing Review" ] }, { "id": "Wired Network-402", "type": 0, "question": "To get PI or a wireless controller to display information about a specific wireless client, you go to the **Monitor > Clients** page. Which one of the following pieces of information should you input to obtain the best troubleshooting data?", "choices": [ "WLC IP address", "SSID", "Client’s MAC address", "AP name" ], "answer": "C", "solution": "By entering the client’s MAC address, the controller can display information about it straightaway. The other answers might also lead to useful information, but only after you spend more time sifting through the data", "topic": [ "Troubleshooting WLAN Connectivity" ] }, { "id": "Wired Network-403", "type": 0, "question": "With which of the following is H.245 negotiated before the call connects?", "choices": [ "Slow start", "Fast start", "Early offer", "Delayed offer" ], "answer": "B", "solution": "When fast start is utilized, H.245 signaling is tunneled within the H.225 signaling and completes before the call connects", "topic": [ "VoIP Protocols: SIP and H.323" ] }, { "id": "Wired Network-404", "type": 0, "question": "The Cisco Meraki cloud-based APs are most accurately described by which one of the following statements?", "choices": [ "Autonomous APs joined to a WLC", "Autonomous APs centrally managed", "Lightweight APs joined to a WLC", "Lightweight APs centrally managed" ], "answer": "B", "solution": "The Cisco Meraki APs are autonomous APs that are managed through a centralized platform in the Meraki cloud", "topic": [ "Analyzing Cisco Wireless Architectures" ] }, { "id": "Wired Network-405", "type": 0, "question": "Which one of the following is the common standard that defines wireless LAN operation?", "choices": [ "IEEE 802.1", "IEEE 802.1x", "IEEE 802.11", "IEEE 802.3" ], "answer": "C", "solution": "The IEEE 802.11 standard focuses on wireless LAN definitions, methods, and operation. It is made up of many pieces, as described inChapter 2, “RF Standards.” Sometimes you might see IEEE 802.11x, which refers to the many subparts of 802.11. Be aware of the subtle difference between that and 802.1x, which defines port-based network access control", "topic": [ "RF Signals and Modulation" ] }, { "id": "Wired Network-406", "type": 0, "question": "You configure a new vEdge manually with IP address, gateway, and vBond IP address. What method of onboarding are you using?", "choices": [ "Bootstrapping", "Manual configuration", "ZTP", "PnP" ], "answer": "B", "solution": "With manual configuration, a site network administrator manually configures minimal information that allows a vEdge device to connect with the vBond orchestrator", "topic": [ "SD-WAN Design" ] }, { "id": "Wired Network-407", "type": 0, "question": "A user with an 802.11ac network adapter is trying to join your 802.11ax network. Their laptop is next to yours, which is connected to the network. However, they are unable to locate the SSID. What is the most likely cause of the problem?", "choices": [ "802.11g is not compatible with 802.11n.", "SSID broadcasting is disabled on the wireless access point.", "The user is out of range of the wireless access point.", "The SSID has been changed." ], "answer": "B", "solution": "The most likely cause is that the router is configured to not broadcast SSIDs. 802.11ac and 802.11ax are compatible, and they are certainly within range if your computer is connected right next to theirs. Provide the user the SSID and password so that they can connect", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-408", "type": 0, "question": "What VPN technology uses a combination of IPsec and GRE?", "choices": [ "DMVPN", "GETVPN", "MPLS Layer 3 VPN", "IKE" ], "answer": "A", "solution": "Dynamic Multipoint VPN (DMVPN) is a Cisco IOS solution for building IPsec over GRE VPNs in a dynamic and scalable manner", "topic": [ "WAN for the Enterprise" ] }, { "id": "Wired Network-409", "type": 0, "question": "In a data-only wireless deployment (non-real-time traffic), which one of the following statements is true?", "choices": [ "Strict jitter requirements must be met.", "Strict latency requirements must be met.", "Strict packet loss requirements must be met.", "No specific requirements must be met." ], "answer": "D", "solution": "Explanation: A data-only wireless deployment without any additional real-time applications being leveraged is usually used when clients use normal applications that have no specific performance requirements; thus, there is no need to account for jitter, latency, or packet loss", "topic": [ "Wireless" ] }, { "id": "Wired Network-410", "type": 0, "question": "Which of the following routing protocols has a default seed metric of 20?", "choices": [ "RIPng", "EIGRP for IPv6", "OSPFv3", "eBGP." ], "answer": "D", "solution": "OSPFv3 has a default seed metric of 20", "topic": [ "Troubleshooting Redistribution" ] }, { "id": "Wired Network-411", "type": 0, "question": "Which of the following is the subnet broadcast address for the subnet in which IP address 172.31.77.201/27 resides?", "choices": [ "172.31.201.255", "172.31.255.255", "172.31.77.223", "172.31.77.207" ], "answer": "C", "solution": "The resident subnet ID in this case is 172.31.77.192. You can find the subnet broadcast address based on the subnet ID and mask using several methods. Following the decimal process in the book, the mask converts to 255.255.255.224, making the interesting octet be octet 4, with magic number 256 – 224 = 32. For the three octets where the mask = 255, copy the subnet ID (172.31.77). For the interesting octet, take the subnet ID value (192), add magic (32), and subtract 1, for 223. That makes the subnet broadcast address 172.31.77.223", "topic": [ "Analyzing Existing Subnets" ] }, { "id": "Wired Network-412", "type": 0, "question": "Which of the following enterprise network architectures is also known as the collapsed core?", "choices": [ "Three-tier design", "Simplified campus design", "Two-tier design", "Leaf–spine design" ], "answer": "C", "solution": "Small campus networks that don’t require an independent core can collapse the core function into the distribution layer. This is known as a two-tier, or collapsed core, design", "topic": [ "Enterprise Network Architecture" ] }, { "id": "Wired Network-413", "type": 0, "question": "What subnet mask should you use in loopback addresses?", "choices": [ "255.255.255.252", "255.255.255.254", "255.255.255.0", "255.255.255.255" ], "answer": "D", "solution": "Loopback addresses should have a /32 mask so that address space is not wasted", "topic": [ "Internet Protocol Version 4 (IPv4) Design" ] }, { "id": "Wired Network-414", "type": 0, "question": "Which type of WAN technology uses labels, which enables priority of voice through the network?", "choices": [ "VPN", "T1", "MPLS", "LAN", "Bus" ], "answer": "C", "solution": "Multiprotocol Label Switching has as many advantages as a LAN protocol. When labels are used, voice can have priority over basic data, for example", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-415", "type": 0, "question": "What does the acronym EIGRP stand for?", "choices": [ "Enhanced Interior Gateway Routing Protocol", "Enhanced Inside Gateway Redundancy Protocol", "Enhanced Interior Group Reliability Protocol", "Enhanced Interior Gateway Redundancy Protocol" ], "answer": "A", "solution": "Interior Gateway Routing Protocol is a distance-vector (DV) interior gateway protocol", "topic": [ "Introduction to IP Routing" ] }, { "id": "Wired Network-416", "type": 0, "question": "The typical data rates of 1, 2, 5.5, and 11 Mbps can be supported by which one of the following modulation types?", "choices": [ "OFDM", "FHSS", "DSSS", "QAM" ], "answer": "C", "solution": "DSSS supports 1-, 2-, 5.5-, and 11-Mbps data rates through different combinations of coding and modulation schemes. FHSS is locked to 1 or 2 Mbps. With the exception of 6 and 9 Mbps, only OFDM supports the highest data rates of all the modulation types", "topic": [ "RF Signals and Modulation" ] }, { "id": "Wired Network-417", "type": 0, "question": "What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "F", "solution": "The presentation layer implements functions that provide formatting, translation, and presentation of information. No other layers of the OSI model translate and format application data", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-418", "type": 0, "question": "Which SIP message is used to instruct SIP IP phones to join a specific multicast paging IP address and port in order to receive an inbound page?", "choices": [ "INVITE", "NOTIFY", "REFER", "UPDATE" ], "answer": "C", "solution": "Unified CME sends an out-of-dialog SIP REFER to the IP phone with a multipart/mixed message body that contains information about the multicast paging IP address and port the phone should join", "topic": [ "Unified CME and SRST" ] }, { "id": "Wired Network-419", "type": 0, "question": "Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?", "choices": [ "Hub", "Bridge", "Switch", "Router" ], "answer": "A", "solution": "A hub functions only at the physical layer by forwarding all incoming signals out through all of its ports. Bridges and switches operate at the data link layer by selectively propagating incoming data. Routers operate at the network layer by connecting local area networks (LANs) and propagating only the traffic intended for another network, based on IP addresses", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-420", "type": 0, "question": "Megan’s laptop runs perfectly when she is at work, but when she takes it on the road, it cannot get on the Internet. Internally, the company uses static IP addresses for all computers. What should you do to fix the problem?", "choices": [ "Tell Megan to get a wireless cellular card and service.", "Tell Megan to use DHCP.", "Tell Megan to configure the Alternate Configuration tab of TCP/IP properties.", "Configure a static IP address in the Alternate Configuration tab of the user’s TCP/IP properties and enable DHCP in the General tab." ], "answer": "D", "solution": "**Explanation:** The issue is that Megan needs to obtain an IP address through DHCP when on the road. But setting the network adapter to obtain an IP address automatically is not enough. To connect to the internal company network, the Alternate Configuration tab must be configured as a user-configured static IP address. This solution enables Megan to connect to networks while on the road by obtaining IP addresses automatically and allows her to connect to the internal company network with the static IP address.\n\n **Incorrect answers:** Megan shouldn’t do anything. As a technician, you should fix the problem, so the other options, where Megan is doing her own troubleshooting, are incorrect", "topic": [] }, { "id": "Wired Network-421", "type": 0, "question": "NTP uses the concept of ________ to calculate the accuracy of the time source.", "choices": [ "administrative distance", "stratum", "atomic half-life", "deviation time" ], "answer": "B", "solution": "NTP uses the stratum to measure the number of hops a device is from a time source to provide a sense of time accuracy", "topic": [ "IP Services" ] }, { "id": "Wired Network-422", "type": 0, "question": "True or false: _Virtual link_ is another term for an OSPF-enabled GRE tunnel.", "choices": [ "True", "False" ], "answer": "B", "solution": "A virtual link is an OSPF mechanism that connects an ABR and another multi-area router to extend the backbone and enable proper LSA propagation", "topic": [ "Advanced OSPF" ] }, { "id": "Wired Network-423", "type": 0, "question": "Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?", "choices": [ "Active Directory", "ICMP", "DNS", "iWINS", "iSNS" ], "answer": "E", "solution": "The Internet Storage Name Service (iSNS) is an application that provides iSCSI initiators with automated discovery of targets located on the network. iSNS can also function as a discovery service for Fibre Channel devices. Active Directory, Internet Control Message Protocol (ICMP), and Domain Name System (DNS) are not capable of registering iSCSI targets. iWINS does not exist", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-424", "type": 0, "question": "A user on your network has a laser printer that is several years old with no Ethernet connection. It's connected to their computer and shared on the network for others to use. Now, the user no longer wants the printer, but others still need to use it on the network. What would be the best upgrade to install in this printer to allow others to send print jobs to it directly over the network?", "choices": [ "A network card", "A print server", "TCP/IP printing", "AirPrint" ], "answer": "B", "solution": "To get this printer off of the original user's desk, it probably needs to be its own print server. Installing an integrated (or stand-alone) print server with a network connection should work well in this situation. Installing a network card wouldn't take care of the sharing aspect of the problem. You need a network connection before you can use TCP/IP settings to connect to it. AirPrint is Apple's wireless printing, which would also need to have the printer connected to a wireless network", "topic": [ "Hardware" ] }, { "id": "Wired Network-425", "type": 0, "question": "Which of the following statements about hubs is not true?", "choices": [ "Hubs are data link layer devices that connect network devices in a star or ring topology.", "Hubs amplify and repeat signals received through one port out all other ports regardless of the destination.", "Hubs are physical layer devices that connect network devices in a star topology.", "Hubs provide internal crossover circuits and use uplink ports to form a hierarchical star." ], "answer": "A", "solution": "Hubs are physical layer devices that amplify and repeat signals out all ports except the one through which the data was received, regardless of the destination. Hubs are used to physically connect end systems to a star topology. Hubs typically provide an internal crossover circuit connection. Uplink ports are used to extend the distance of a star network, forming a hierarchical star", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-426", "type": 0, "question": "Which of the following is not a distance-vector protocol?", "choices": [ "RIPv1", "RIPv2", "OSPF", "IGRP" ], "answer": "C", "solution": "RIPv1 and 2 and IGRP are all distance-vector (DV) protocols. Routers using a DV protocol send all or parts of their routing table in a routing-update message at a regular interval to each of their neighbor routers", "topic": [ "Introduction to IP Routing" ] }, { "id": "Wired Network-427", "type": 0, "question": "What is the purpose of configuring fallback in a AAA method list?", "choices": [ "To provide a fallback ISE PSN in the event that the first one fails", "To provide a fallback password to use as a TACACS shared secret", "To provide a fallback AAA method in the event that the first method is unavailable", "To provide a fallback TACACS configuration for troubleshooting" ], "answer": "C", "solution": "**Explanation:** When creating AAA method lists, you can define the primary AAA method as well as fallback methods. For example, you might configure a AAA authentication method list to first attempt to use the TACACS+ server group and, if it is unreachable, use the local account store on the IOS device", "topic": [ "Configuring Device Administration AAA with Cisco IOS" ] }, { "id": "Wired Network-428", "type": 0, "question": "The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what?", "choices": [ "Data encapsulation", "Same-layer interaction", "Adjacent-layer interaction", "OSI model", "All of these answers are correct." ], "answer": "B", "solution": "Same-layer interaction occurs on multiple computers. The functions defined by that layer typically need to be accomplished by multiple computers—for example, the sender setting a sequence number for a segment and the receiver acknowledging receipt of that segment. A single layer defines that process, but the implementation of that layer on multiple devices is required to accomplish the function", "topic": [ "Introduction to TCP/IP Networking" ] }, { "id": "Wired Network-429", "type": 0, "question": "Two vEdge routers are used at a branch site. If Layer 2 redundancy is implemented on the LAN, which of the following will take care of failover?", "choices": [ "BGP", "OSPF", "Static", "VRRP" ], "answer": "D", "solution": "VRRP is used for Layer 2 redundancy", "topic": [ "SD-WAN Design" ] }, { "id": "Wired Network-430", "type": 0, "question": "Which condition leads to shorts?", "choices": [ "High temperature", "High humidity", "Low temperature", "Low humidity" ], "answer": "B", "solution": "High humidity cannot be tolerated because it leads to corrosion of electrical parts followed by shorts and other failures", "topic": [ "Using Statistics and Sensors to Ensure Network Availability" ] }, { "id": "Wired Network-431", "type": 0, "question": "Which of the following routing protocols is classified as an EGP?", "choices": [ "RIPv2", "EIGRP", "OSPF", "IS-IS", "BGP" ], "answer": "E", "solution": "BGP is the only Exterior Gateway Protocol listed here", "topic": [ "IP Routing Essentials" ] }, { "id": "Wired Network-432", "type": 0, "question": "Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address?", "choices": [ "It compares the unicast destination address to the bridging, or MAC address, table.", "It compares the unicast source address to the bridging, or MAC address, table.", "It forwards the frame out all interfaces in the same VLAN except for the incoming interface.", "It compares the destination IP address to the destination MAC address.", "It compares the frame’s incoming interface to the source MAC entry in the MAC address table." ], "answer": "C", "solution": "A switch floods broadcast frames, multicast frames (if no multicast optimizations are enabled), and unknown unicast destination frames (frames whose destination MAC address is not in the MAC address table)", "topic": [ "Analyzing Ethernet LAN Switching" ] }, { "id": "Wired Network-433", "type": 0, "question": "Which EDCA metric defines how long a station may continue transmitting?", "choices": [ "AIFSN", "CWmin", "CWmax", "TXOP", "TSpec" ], "answer": "D", "solution": "The TXOP (Transmission Opportunity) is the metric defined that allows a station to continually transmit until the timer expires. The TXOP interval is unique per AC", "topic": [ "Implementing Quality of Service on a Wireless Network" ] }, { "id": "Wired Network-434", "type": 0, "question": "Which WLAN controller interface is used for out-of-band management?", "choices": [ "Management interface", "Service-port interface", "AP manager interface", "Virtual interface" ], "answer": "B", "solution": "The service-port interface is an optional interface that is statically configured for out-of-band management", "topic": [ "Wireless LAN Design" ] }, { "id": "Wired Network-435", "type": 0, "question": "When redistributing, you have four options for the seed metric: accepting the default value, specifying it with the **default-metric** command, using the metric option with the **redistribute** command, and using a route map. If all four of these are configured with different values, which will be preferred?", "choices": [ "Default values", "default-metric command", "Metric option with the redistribute command", "Route map attached to the redistribute command." ], "answer": "D", "solution": "Route-Maps attached to the **redistribute** command are preferred over all the other options", "topic": [ "Troubleshooting Redistribution" ] }, { "id": "Wired Network-436", "type": 0, "question": "Of the following, which is the highest layer in the OSI model?", "choices": [ "Transport", "Session", "Network", "Presentation" ], "answer": "D", "solution": "The Presentation layer is the sixth layer of the model. Only the Application layer is higher, but it is not listed. Session is layer 5, Transport is layer 4, and Network is layer 3", "topic": [ "The Open Systems Interconnection Specifications" ] }, { "id": "Wired Network-437", "type": 0, "question": "Which of the following is the term used to describe the logical distance of a Network Time Protocol (NTP) server from the time source to which it is synchronized?", "choices": [ "Layer", "Path", "Iteration", "Stratum" ], "answer": "D", "solution": "The term _stratum_ , plus an integer, describes the distance in time of an NTP server from its time source in terms of the NTP server hierarchy. Stratum 0 represents an atomic clock or other precision timekeeping device. Stratum 1 represents an NTP server synchronized to within a few milliseconds of its Stratum 0 time source. Stratum 2 is a server synchronized to a Stratum 1 server, and so on. _Layer_ , _path_ , and _iteration_ are not technical terms used by the NTP", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-438", "type": 0, "question": "What type of server provides Internet access to company-provided information such as how to contact a company, products or services for sale, and other information?", "choices": [ "FTP server", "Proxy server", "File server", "Web server" ], "answer": "D", "solution": "A web server consists of hardware and software used to provide information to remote clients via the Internet. The main protocols for web servers are HTTP and HTTPS, but they can use other protocols as well. File Transfer Protocol (FTP) servers are used for downloading files quickly, and while they may have a graphical user interface (GUI), they have much less overhead than a web server. Proxy servers are a security measure between an internal user and the web and are used to monitor and filter information going into or out of a network. File servers are often used on a LAN to provide access to the same files by multiple users", "topic": [ "Networking" ] }, { "id": "Wired Network-439", "type": 0, "question": "Alice is attempting to troubleshoot a communication problem between two hosts on the same network. She decides to use a protocol analyzer to capture traffic on the network. After finishing the capture, Alice notices that there are over 15,000 frames in the protocol analyzer's capture buffer. She is having a difficult time identifying the frames that relate to the problem because there are so many in the buffer. She wants to eliminate the extraneous frames from her view, enabling her to view only the frames transmitted by these two hosts. What does Alice have to do to accomplish this?", "choices": [ "Configure a display filter", "Configure a capture filter", "Delete the extraneous frames from the buffer", "Configure a capture and display filter" ], "answer": "A", "solution": "Once the frames are in the buffer, Alice can configure a display filter to block the unwanted frames from view. This does not delete them from the buffer. Since the capture was already performed, there is no need to restart the capture. Configuring a capture filter will not meet the requirements, because the filter will eliminate the other frames completely from the buffer. It is not possible to delete specific frames from an analyzer buffer", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-440", "type": 0, "question": "Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "A", "solution": "The physical layer of the OSI model defines the standards for the physical and mechanical characteristics of a network, such as cabling (copper and fiber), connecting hardware (hubs and switches), and signaling methods (analog and digital). All of the other layers are not involved in the mechanical characteristics of the network", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-441", "type": 0, "question": "Which command enables you to define which protocols will be used for remote access to a Cisco device using vty lines?", "choices": [ "transport input", "login", "login local", "exec" ], "answer": "A", "solution": "The command **transport input** enables you to define which protocols will be used for remote access to a Cisco device using vty lines", "topic": [ "Device Management and Management Tools Troubleshooting" ] }, { "id": "Wired Network-442", "type": 0, "question": "You are installing an 802.11n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?", "choices": [ "Configure all access points to use the same channel.", "Configure all access points to use adjacent channels.", "Configure all access points to use nonoverlapping channels.", "Channel configuration will not cause communications issues." ], "answer": "C", "solution": "When setting up wireless access points, it's good practice to have their ranges overlap to ensure that there is no loss of communication when roaming in the network's area. However, to avoid problems, it's best to set up the access points with nonoverlapping channels; in this way, the overlapping ranges ensure continuous signal coverage while the nonoverlapping channels avoid interference from one WAP to another in the overlapping areas", "topic": [ "Networking" ] }, { "id": "Wired Network-443", "type": 0, "question": "Once the NPV edge switch registers itself with the NPV core switch (NPIV), the NPV edge switch converts all subsequent FLOGIs from end devices to which message type?", "choices": [ "NPV FLOGI", "FDISCs", "PLOGI", "PLRI" ], "answer": "B", "solution": "When an NP uplink is established, the edge switch sends a fabric login message (FLOGI) to the core switch, and then (if the FLOGI is successful) it registers itself with the name server on the core switch. Subsequent FLOGIs from end devices connected to this NP uplink are converted to fabric discovery messages (FDISCs)", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-444", "type": 0, "question": "Which of the following is the first thing you should check when a computer cannot get on the Internet?", "choices": [ "NIC driver", "Disk defrag", "Patch cable", "Firewall settings" ], "answer": "C", "solution": "**Explanation:** The simplest solution is often the most common. Check cables and see whether the power is on for your devices and computers.\n\n **Incorrect answers:** After checking cables and power, you can check the driver (for example, within Device Manager in Windows) and check the firewall settings. Whether a hard disk drive (HDD) is fragmented should not affect the Internet connection", "topic": [] }, { "id": "Wired Network-445", "type": 0, "question": "What are the three main locations to troubleshoot network access authentication?", "choices": [ "ISE, firewall, NAD", "ISE, endpoint, firewall", "ISE, endpoint, NAD", "Endpoint, firewall, NAD" ], "answer": "C", "solution": "**Explanation:** While a firewall can sometimes be a good place to determine why communication is not successful, the three main locations to troubleshoot network access are ISE, the endpoint, and the NAD", "topic": [ "Troubleshooting Tools" ] }, { "id": "Wired Network-446", "type": 0, "question": "Which service model is best used when a business requires full control of all components within an application?", "choices": [ "PaaS", "IaaS", "SaaS", "On-premises" ], "answer": "D", "solution": "Explanation: On-premises is the service model where a business owns and manages the infrastructure. A business will procure all of the infrastructure required to run the service and then fully manage, maintain, and operate it. In some situations, the management is outsourced but the infrastructure is procured and owned by the business", "topic": [ "What’s the Purpose of the Network?" ] }, { "id": "Wired Network-447", "type": 0, "question": "Which of the following IP addresses does a technician see if a computer running Windows is connected to a multifunction network device and is attempting to obtain an IP address automatically but is not receiving an IP address from the DHCP server?", "choices": [ "172.16.10.10", "192.168.0.10", "169.254.10.10", "192.168.10.10" ], "answer": "C", "solution": "**Explanation:** If the computer fails to obtain an IP address from a DHCP server, Windows takes over and uses Automatic Private IP Addressing (APIPA). This address will be on the 169.254.0.0 network. APIPA is a type of link-local addressing.\n\n **Incorrect answers:** All of the other addresses could possibly be obtained from a DHCP server. 172.16.10.10, 192.168.0.10, and 192.168.10.10 are all private IP addresses that could typically be obtained through DHCP", "topic": [] }, { "id": "Wired Network-448", "type": 0, "question": "After connecting a tone generator to the green wire at one end of a twisted-pair cable run, Ralph proceeds to the other end of the cable and touches the locator to each of the eight pins in turn. The green wire and the green striped wire both produce a tone. What type of wiring fault has Ralph discovered?", "choices": [ "Split pair", "Far end crosstalk", "Transposed wires", "Short circuit", "Delay skew" ], "answer": "D", "solution": "The first and most essential test that installers must perform on every cable run is a continuity test, which ensures that each wire on both ends of the cable is connected to the correct pin and only the correct pin. If a pin on one end of a cable run is connected to two or more pins on the other end, the cable has a short circuit", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-449", "type": 0, "question": "Which of the following criteria does a firewall capable of service-dependent filtering use to block traffic?", "choices": [ "Hardware addresses", "Protocol identifiers", "IP addresses", "Port numbers" ], "answer": "D", "solution": "Service-dependent filtering blocks traffic based on the port numbers specified in the transport layer header fields. Because port numbers represent specific applications, you can use them to prevent traffic generated by these applications from reaching a network. IP address filtering enables you to limit network access to specific computers; it is not service dependent. Filtering based on hardware addresses provides the same basic functionality as IP address filtering, but it is more difficult to spoof hardware addresses than IP addresses. Filtering by protocol identifier enables you to block all traffic using TCP or UDP; it is not service dependent", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-450", "type": 0, "question": "Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured?", "choices": [ "Identify symptoms", "Establish a theory of probable cause", "Establish a plan of action to resolve the problem and identify potential effects", "Determine if anything has changed.", "Test the theory to determine cause", "Document findings, actions, and outcomes" ], "answer": "D", "solution": "During the troubleshooting process, you must establish whether anything has changed. This typically involves asking the user whether any new or existing hardware or software has been installed or reconfigured", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-451", "type": 0, "question": "What is the maximum number of VSANs that can be configured on a switch?", "choices": [ "128", "256", "512", "1024" ], "answer": "B", "solution": "Theoretically, up to 256 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-452", "type": 0, "question": "Which BGP command advertises a summary route to prevent link-flap processing by downstream BGP routers?", "choices": [ "aggregate-address _network subnet-mask_ as-set", "aggregate-address _network subnet-mask_ summary-only", "summary-address _network subnet-mask_", "summary-address _network_ mask _subnet-mask_" ], "answer": "B", "solution": "The command **aggregate-address** _network subnet-mask_ **summary-only** creates a BGP aggregate and suppresses the component routes", "topic": [ "BGP" ] }, { "id": "Wired Network-453", "type": 0, "question": "A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB?", "choices": [ "0 dB", "2 dB", "3 dB", "17 dB", "None of these answers are correct; you need a calculator to figure this out." ], "answer": "C", "solution": "At first glance, 17 mW and 34 mW might seem like odd numbers to work with. Notice that if you double 17, you get 34. The second handy dB fact says that doubling a power level will increase the dB value by 3", "topic": [ "RF Signals and Modulation" ] }, { "id": "Wired Network-454", "type": 0, "question": "What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end?", "choices": [ "Fox and hound tester", "Wiremap tester", "Time-domain reflectometer", "Voltage event recorder", "Butt set", "Spectrum analyzer" ], "answer": "C", "solution": "The technique that provides this capability is called time-domain reflectometry (TDR). The tester transmits a signal over the cable and measures how long it takes for a reflection of the signal to return from the other end. Using this information and the cable's nominal velocity of propagation (NVP)—a specification supplied by the cable manufacturer—the device can calculate the length of a cable run. The other devices listed do not work in this way", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-455", "type": 0, "question": "What is a logical grouping of network users and resources called?", "choices": [ "WAN", "LAN", "MPLS", "Host" ], "answer": "B", "solution": "A logical grouping of hosts is called a LAN, and you typically group them by connecting them to a hub or switch", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-456", "type": 0, "question": "Which of the following is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?", "choices": [ "VNF", "NFV", "NFVI", "NFVIS" ], "answer": "B", "solution": "Network functions virtualization (NFV) is an architectural framework created by the European Telecommunications Standards Institute (ETSI) that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers. It also defines how to manage and orchestrate the network functions", "topic": [ "Virtualization" ] }, { "id": "Wired Network-457", "type": 0, "question": "If you have a duplex mismatch, which counter will increment?", "choices": [ "Late collisions", "Babbles", "Watchdog", "Unknown protocol drops" ], "answer": "A", "solution": "If you have a duplex mismatch, a telling sign is that the late collision counter will increment", "topic": [ "Using Statistics and Sensors to Ensure Network Availability" ] }, { "id": "Wired Network-458", "type": 0, "question": "True or false: An EIGRP stub router will respond to queries and is a transit router.", "choices": [ "True", "False" ], "answer": "B", "solution": "Explanation: An EIGRP stub router will inform neighbors via the hello packet that it’s a stub; by doing so, neighbors will not send queries to the router. EIGRP stubs are typically used at spoke locations, as stubs cannot be used as transient routers", "topic": [ "Layer 3 Technologies" ] }, { "id": "Wired Network-459", "type": 0, "question": "For the IPv6 address FD00:1234:5678:9ABC:DEF1:2345:6789:ABCD, which part of the address is considered the global ID of the unique local address?", "choices": [ "None; this address has no global ID.", "00:1234:5678:9ABC", "DEF1:2345:6789:ABCD", "00:1234:5678", "FD00" ], "answer": "D", "solution": "Unique local addresses begin with a 2-hex-digit prefix of FD, followed by the 10-hex-digit global ID", "topic": [ "IPv6 Addressing and Subnetting" ] }, { "id": "Wired Network-460", "type": 0, "question": "A network interface adapter in a workstation has a hexadecimal MAC address of 001F9EFC7AD0. Which of the following would be the adapter's IPv6 link local address based on its EUI-64 value?", "choices": [ "FE80::001F:9EFF:FEFC:7AD0", "FE80::FFFE:021F:9EFC:7AD0", "FE80::FF00:1F9E:FC7A:D0FE", "FE80::021F:9EFF:FEFC:7AD0" ], "answer": "D", "solution": "To convert a MAC address to an Extended Unique Identifier (EUI-64), you split the 6-byte MAC address into two 3-byte halves and insert the 2-byte value FFFE in between, as follows: \n\n001F9E FFFE FC7AD0\n\nThen, you change the seventh bit in the first byte, the universal/local bit, from 0 to 1, indicating that this is a locally created address. This results in a binary first byte value of 00000010, which converts to 02 in hexadecimal.\n\nFinally, you add the IPv6 link local prefix FE80::/10, resulting in the following complete address:\n\nFE80::021F:9EFF:FEFC:7AD0\n\nAll of the other answers either insert the FFFE bytes in the wrong place or fail to change the universal/local bit", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-461", "type": 0, "question": "Budget and personnel limitations are examples of what?", "choices": [ "Organization requirements", "Organization constraints", "Technical goals", "Technical constraints" ], "answer": "B", "solution": "These are examples of organization constraints", "topic": [ "Network Design Methodology" ] }, { "id": "Wired Network-462", "type": 0, "question": "True or false: To configure a fabric extender (FEX), you first create a FEX profile and then configure an access port selector from the parent leaf down to the FEX with the Connected to FEX checkbox enabled.", "choices": [ "True", "False" ], "answer": "A", "solution": "This is an accurate statement", "topic": [ "Implementing Access Policies" ] }, { "id": "Wired Network-463", "type": 0, "question": "Which of the following is the only IETF service available on the Expressway Edge server for traversal?", "choices": [ "ICE", "TURN", "STUN", "ASSENT", "460.18/19" ], "answer": "B", "solution": "Traversal Using Relays around NAT (TURN) relay services are the only IETF services available on the Expressway-E. Neither ICE nor STUN can be used with the Expressways. ASSENT and H.460.18/19 are not IETF protocols. For more information about TURN, see RFC 8656", "topic": [ "Multisite and Business-to-Business (B2B) Collaboration Solutions" ] }, { "id": "Wired Network-464", "type": 0, "question": "Which MPLS L3VPN topology should be used if an enterprise requires all remote site traffic to be inspected by a firewall in the data center?", "choices": [ "Full mesh", "Hub and spoke", "Multilevel hub and spoke", "Extranet and shared services" ], "answer": "B", "solution": "Explanation: The hub-and-spoke MPLS L3VPN topology sends all remote site traffic (spokes) to a specific hub location, in this case the data center, for a specific reason. In this case, the firewall in the data center must inspect the traffic before allowing spoke traffic to traverse to another spoke", "topic": [ "Network Virtualization" ] }, { "id": "Wired Network-465", "type": 0, "question": "Which of the following is _not_ true about listening ports?", "choices": [ "A listening port is a port held open by a running application in order to accept inbound connections.", "Seeing traffic from a known port will always identify the associated service.", "Listening ports use values that can range between 1 and 65,535.", "TCP port 80 is commonly known for Internet traffic." ], "answer": "B", "solution": "A listening port is a port held open by a running application to accept inbound connections. Listening ports use values that can range between 1 and 65,535. TCP port 80 is commonly known for Internet traffic. Seeing traffic from a known port will not always identify the associated service, because you can configure different services on different ports. For example, you can configure a web service on TCP port 22 and it does not necessarily mean that you are running SSH. At the same time, SSH can be configured to run in any port", "topic": [ "Endpoint Telemetry and Analysis" ] }, { "id": "Wired Network-466", "type": 0, "question": "Ralph is deploying an 802.11n wireless network for a client that calls for the best possible security without deploying additional servers. When setting up the Wireless Access Point (WAP), Ralph disables Service Set Identifier (SSID) broadcasts, selects WiFi Protected Access security with Pre-Shared Keys (WPA-PSKs), and configures Media Access Control (MAC) address filtering. Which of the following statements about the security of this arrangement is true?", "choices": [ "The configuration is as secure as Ralph can make it with the specified equipment.", "Ralph should not disable SSID broadcasts since this prevents users from connecting to the network.", "Ralph should not use MAC address filtering, because it exposes MAC addresses to possible attacks.", "Ralph should use WiFi Protected Access II (WPA2) instead of WPA, because it is more resistant to certain types of attacks." ], "answer": "D", "solution": "WPA has been found to be vulnerable, and WPA2 was designed to address those vulnerabilities, so Ralph should use WPA2 instead of WPA. Suppressing SSID broadcasts does not prevent users from connecting to the network, and MAC filtering strengthens security without exposing MAC addresses to undue risk", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-467", "type": 0, "question": "True or false: ACI uses VLANs internally to segment traffic.", "choices": [ "True", "False" ], "answer": "B", "solution": "Internally, ACI uses VXLAN. VLANs are primarily used to classify inbound traffic into EPGs and also to enable trunking to servers", "topic": [ "Why ACI?" ] }, { "id": "Wired Network-468", "type": 0, "question": "While cleaning out a storage room, a technician finds several rolls of Cat 5e network cable. The technician thinks they might be able to use it to create replacement cables for their network. What is the maximum speed that this cable will support?", "choices": [ "100 Mbps", "1 Gbps", "10 Gbps", "20 Gbps" ], "answer": "B", "solution": "Cat 5e cable can support speeds of 1 Gbps. Cat 5 has a maximum of 100 Mbps. Cat 6 and newer can support 10 Gbps. Cat 8 cabling can support speeds around 40 Gbps, but only for short distances. To run at a given speed, all components of the network must support that speed, including NICs, cable, routers, and switches", "topic": [ "Hardware" ] }, { "id": "Wired Network-469", "type": 0, "question": "What type of network spans multiple buildings or offices, possibly even crossing roads, but is confined to a relatively small geographical area?", "choices": [ "LAN", "WAN", "PAN", "MAN" ], "answer": "D", "solution": "Networks that are larger than a LAN but confined to a relatively small geographical area are metropolitan area networks (MANs). A MAN is generally defined as a network that spans a city or a large campus. LAN stands for local area network. PAN (personal area network) is the smallest of the types of networks, and a WAN is the largest type of network. It could connect faraway cities or even other countries", "topic": [ "Networking" ] }, { "id": "Wired Network-470", "type": 0, "question": "Which of the following protocols are associated with the following TCP or UDP port numbers, in order?", "choices": [ "FTP, Telnet, SMTP, DNS, HTTP, RDP", "FTP, SSH, SMTP, DNS, HTTP, RDP", "FTP, SSH, SMTP, POP3, HTTPS, RDP", "FTP, SSH, SMTP, DNS, HTTPS, RDP" ], "answer": "D", "solution": "**Explanation:** The port numbers 21, 22, 25, 53, 443, and 3389 correspond to the protocols FTP, SSH, SMTP, DNS, HTTPS, and RDP.\n\n **Incorrect answers:** The Telnet protocol uses port 23. Telnet is deprecated, insecure, and outdated; plus, it isn’t even installed or enabled on newer versions of operating systems. Use SSH in its place for a more secure connection. HTTP uses port 80. This also is considered deprecated and is mostly used only for testing purposes as of 2022. It is important to use HTTPS (on port 443), which makes use of Transport Layer Security (TLS). POP3 uses port 110. However, this is considered insecure as well; it is recommended to use port 995 and TLS security instead. Know your port numbers!", "topic": [] }, { "id": "Wired Network-471", "type": 0, "question": "What is the maximum segment distance for Fast Ethernet over UTP?", "choices": [ "100 feet", "500 feet", "100 meters", "285 feet" ], "answer": "C", "solution": "The maximum distance for 100BASE-T is 100 meters", "topic": [ "Enterprise LAN Design and Technologies" ] }, { "id": "Wired Network-472", "type": 0, "question": "Which of the following elements would you typically not expect to find in a Service Level Agreement (SLA) between an Internet Service Provider (ISP) and a subscriber?", "choices": [ "A definition of the services to be provided by the ISP", "A list of specifications for the equipment to be provided by the ISP", "The types and schedule for the technical support to be provided by the ISP", "The types of applications that the subscriber will use when accessing the ISP's services" ], "answer": "D", "solution": "An ISP provides subscribers with access to the Internet. The applications that the subscriber uses on the internet are typically not part of the SLA. An SLA does typically specify exactly what services the ISP will supply, what equipment the ISP will provide, and the technical support services the ISP will furnish as part of the agreement", "topic": [ "Network Operations" ] }, { "id": "Wired Network-473", "type": 0, "question": "How are zones searched on the Cisco Expressway?", "choices": [ "Zones are searched by type. The order in which they are searched is Local Zone first and DNS Zone last.", "Zones are searched by the order in which the Search Rules are listed in the Cisco Expressway.", "Zones are searched by priority, and the higher the number, the higher the priority.", "Zones are searched by priority, and the lower the number, the higher the priority." ], "answer": "D", "solution": "Zones are searched based on the priority of the Search Rules. Priority values can be set between 1 and 65,534. 1 is the highest value, so the higher the number, the lower the value", "topic": [ "Multisite Collaboration Solutions" ] }, { "id": "Wired Network-474", "type": 0, "question": "An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment to end users. The first thing she does is affix a metal tag with a bar code on it to each computer. Which of the following terms best describes the function of this procedure?", "choices": [ "Asset tracking", "Tamper detection", "Device hardening", "Port security" ], "answer": "A", "solution": "Bar coding the new computers enables the IT department to record their locations, status, and conditions throughout their life cycle, a process known as asset tracking. Bar codes are not used for tamper detection and device hardening. Port security refers to switches, not computers", "topic": [ "Network Security" ] }, { "id": "Wired Network-475", "type": 0, "question": "You've been asked to set up a device that will be monitored using an SNMP agent and manager. What port will the SNMP manager use when polling the agent?", "choices": [ "TCP 143", "UDP 143", "TCP 161", "UDP 161" ], "answer": "D", "solution": "Simple Network Management Protocol (SNMP) uses UDP port 161. User Datagram Protocol (UDP) is considered connectionless, so it does not guarantee delivery of data packets and has a lower network overhead than Transmission Control Protocol (TCP), a connection-oriented protocol, does. Port 143 is used for IMAP", "topic": [ "Networking" ] }, { "id": "Wired Network-476", "type": 0, "question": "A VPN headend is an advanced type of which of the following devices?", "choices": [ "Switch", "Router", "Gateway", "Bridge" ], "answer": "B", "solution": "A Virtual Private Network (VPN) headend is a type of router that enables multiple client systems to access a network from remote locations. Because the device provides an interface between networks, it is considered to be a type of router, not a switch, a gateway, or a bridge", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-477", "type": 0, "question": "Which device creates separate collision domains and a single broadcast domain?", "choices": [ "Hub", "Router", "Switch", "Modem" ], "answer": "C", "solution": "Switches create separate collision domains but a single broadcast domain. Remember that routers provide a separate broadcast domain for each interface", "topic": [ "Networking Devices" ] }, { "id": "Wired Network-478", "type": 0, "question": "NAT has been configured to translate source addresses of packets for the inside part of the network, but only for some hosts as identified by an access control list. Which of the following commands indirectly identifies the hosts?", "choices": [ "ip nat inside source list 1 pool barney", "ip nat pool barney 200.1.1.1 200.1.1.254 netmask 255.255.255.0", "ip nat inside", "ip nat inside 200.1.1.1 200.1.1.2" ], "answer": "A", "solution": "The **list 1** parameter references an IP ACL, which matches packets, identifying the inside local addresses", "topic": [ "Network Address Translation" ] }, { "id": "Wired Network-479", "type": 0, "question": "What is the BGP state of a neighbor if a TCP session cannot be formed?", "choices": [ "Open", "Idle", "Active", "Established" ], "answer": "B", "solution": "If a TCP session cannot be formed the BGP state will be Idle", "topic": [ "Troubleshooting BGP" ] }, { "id": "Wired Network-480", "type": 0, "question": "Which of the following statements is NOT CORRECT regarding zones?", "choices": [ "Devices can belong to only one zone at a time.", "Members in a zone can access each other; members in different zones cannot access each other.", "Zones can vary in size.", "If zoning is activated, any device that is not in an active zone (a zone that is part of an active zone set) is a member of the default zone." ], "answer": "A", "solution": "Devices can belong to more than one zone", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-481", "type": 0, "question": "Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?", "choices": [ "The leaf and spine arrangement uses a full mesh switching topology.", "In a leaf and spine topology, all data flows require the same number of hops.", "The leaf and spine topology is less expensive to implement than the three-tier topology.", "The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol." ], "answer": "C", "solution": "The leaf and spine topology uses a full mesh topology in its two layers of switches. This is more expensive than the three-tier topology, but it reduces latency by requiring the same number of hops in the path between any two routers. The use of software-defined networking provides adaptive path determination without the use of the Spanning Tree Protocol (STP) for layer 2 port blocking", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-482", "type": 0, "question": "At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?", "choices": [ "Physical", "Data link", "Network", "Transport", "Session", "Presentation", "Application" ], "answer": "B", "solution": "The only layer with a protocol (such as Ethernet) that adds both a header and a footer is the data link layer. The process of adding the headers and footers is known as data encapsulation. All other protocol layers that encapsulate data add just a header", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-483", "type": 0, "question": "True or false: BGP summarization provides a mechanism for load balancing traffic between service providers.", "choices": [ "True", "False" ], "answer": "A", "solution": "Summarizing prefixes can shorten the prefix length, making a path less desirable compared to a longer prefix length", "topic": [ "BGP Path Selection" ] }, { "id": "Wired Network-484", "type": 0, "question": "Which of the following uses a default port number of 22?", "choices": [ "SSH", "HTTP", "Telnet", "HTTPs" ], "answer": "A", "solution": "SSH uses a default port number of 22", "topic": [ "Troubleshooting ACLs and Prefix Lists" ] }, { "id": "Wired Network-485", "type": 0, "question": "The entire network at Adatum Corp. is unable to access the Internet. All of the users throughout the network are complaining that their browsers are displaying Domain Name System (DNS) failure messages. The company does not have an in-house network administrator, so they call Ralph at his consulting firm. Which of the following should be the first question that Ralph asks in his attempt to pinpoint the location of the malfunction?", "choices": [ "What browser are the users running?", "Where is the DNS server located?", "What technology is used to provide access to the Internet?", "What sites are the users attempting to access?" ], "answer": "B", "solution": "The users' browsers are failing to resolve the hostnames of the requested websites into Internet Protocol (IP) addresses, which they must do before they can connect to the web servers. By asking where the company's DNS server is located, Ralph can determine if the problem is the DNS server itself or the router that provides access to the Internet. If the DNS server is located on Adatum's company network, then the DNS server could be failing to resolve the website names. However, the DNS server could be located on the Internet Service Provider's (ISP's) network, in which case the problem might be in the router that provides access to the ISP's network", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-486", "type": 0, "question": "A user calls Ed at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Ed examines the routing table on the user's workstation and sees the following listing. Which statement explains why the user cannot access the Internet? \n \n \n IPv4 Route Table\r\n ==========================================================================\r\n Active Routes:\r\n Network Destination Netmask Gateway Interface Metric\r\n 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331\r\n 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331\r\n 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331\r\n 192.168.2.0 255.255.255.0 On-link 192.168.2.37 281\r\n 192.168.2.37 255.255.255.255 On-link 192.168.2.37 281\r\n 192.168.2.255 255.255.255.255 On-link 192.168.2.37 281\r\n 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331\r\n 224.0.0.0 240.0.0.0 On-link 192.168.2.37 281\r\n 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331\r\n 255.255.255.255 255.255.255.255 On-link 192.168.2.37 281\r\n ==========================================================================\r\n Persistent Routes:\r\n None", "choices": [ "The routing table does not specify a loopback address.", "The routing table does not specify a DNS server address.", "The routing table does not specify a default gateway address.", "The routing table contains two different routes to the 224.0.0.0 network." ], "answer": "C", "solution": "To access the Internet, the workstation's routing table must include a default gateway entry, which would have a Network Destination value of 0.0.0.0. A workstation's routing table does not have to specify the address of a Domain Name System (DNS) server. The loopback (127.0.0.1) and multicast (224.0.0.0) addresses are normal routing table entries that do not affect Internet access", "topic": [] }, { "id": "Wired Network-487", "type": 0, "question": "Your friend owns a restaurant and provides free Wi-Fi to their clientele. Lately they have been receiving complaints that the Wi-Fi isn't working. It seems to work for customers already connected but not for people trying to connect. What can be configured on the router to release an IP address and make it available for other users after a couple of hours?", "choices": [ "MAC address filtering", "Port forwarding", "DHCP lease duration", "SSID broadcast" ], "answer": "C", "solution": "A DHCP server will “lease” an IP address to a client for a specified period of time. The default is usually 24 hours. In a SOHO where there are few new users, the lease time could be longer, but in a restaurant where many people come and go each hour, the DHCP scope might not have enough addresses to accommodate that many users. Setting the lease time to a shorter duration will release the IP address and make it available for a new user. MAC address filtering only allows connection from computers with specific MAC addresses and would greatly limit connectivity. Port forwarding sends traffic for a specific port to a specified computer on the network. The SSID is the wireless network name and can be broadcast so that it is easily found, or it can be hidden", "topic": [ "Networking" ] }, { "id": "Wired Network-488", "type": 0, "question": "Which of the following is accurate about the NTP client function on a Cisco router?", "choices": [ "The client synchronizes its time-of-day clock based on the NTP server.", "It counts CPU cycles of the local router CPU to more accurately keep time.", "The client synchronizes its serial line clock rate based on the NTP server.", "The client must be connected to the same subnet as an NTP server." ], "answer": "A", "solution": "NTP uses protocol messages between clients and servers so that the clients can adjust their time-of-day clock to match the server. NTP is totally unrelated to serial line clocking. It also does not count CPU cycles, instead relying on messages from the NTP server. Also, the client defines the IP address of the server and does not have to be in the same subnet", "topic": [ "Device Management Protocols" ] }, { "id": "Wired Network-489", "type": 0, "question": "You want to find and download a new application to use for network monitoring on your MacBook. Where can you do this in the macOS?", "choices": [ "Finder", "App Store", "Mission Control", "FileVault" ], "answer": "B", "solution": "The App Store is where you would go to locate and download new programs. Finder enables a user to drill down through folders to find what they are looking for. Mission Control is an easy way to see what is open and to switch between applications, and FileVault provides encryption", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-490", "type": 0, "question": "The only NTP configuration on router R1 is the **ntp server 10.1.1.1** command. Which answers describe how NTP works on the router?", "choices": [ "As an NTP server only", "As an NTP client only", "As an NTP server only after the NTP client synchronizes with NTP server 10.1.1.1", "As an NTP server regardless of whether the NTP client synchronizes with NTP server 10.1.1.1" ], "answer": "C", "solution": "The **ntp server 10.1.1.1** command tells the router to be both an NTP server and client. However, the router first acts as an NTP client to synchronize its time with NTP server 10.1.1.1. Once synchronized, R1 knows the time to supply and can act as an NTP server", "topic": [ "Device Management Protocols" ] }, { "id": "Wired Network-491", "type": 0, "question": "Which of the following is _not_ a deployment model for a site-to-site VPN architecture?", "choices": [ "Full mesh", "Hub-and-spoke", "Mesh-to-spoke", "Spoke-to-spoke" ], "answer": "C", "solution": "Mesh-to-spoke doesn’t make sense and isn’t an official architecture. Full mesh, hub-and-spoke, and spoke-to-spoke networks are all deployment models for a site-to-site VPN architecture", "topic": [ "Introduction to Virtual Private Networks (VPN)" ] }, { "id": "Wired Network-492", "type": 0, "question": "Which of the following is a popular Python library used to interact with NETCONF servers?", "choices": [ "requests", "ncclient", "json", "pyang" ], "answer": "B", "solution": "One popular NETCONF client is the Python 3 ncclient library", "topic": [ "Model-Driven Programmability" ] }, { "id": "Wired Network-493", "type": 0, "question": "An engineer configures a static IPv4 route on Router R1. Which of the following pieces of information should not be listed as a parameter in the configuration command that creates this static IPv4 route?", "choices": [ "The destination subnet’s subnet ID", "The next-hop router’s IP address", "The next-hop router’s neighboring interface", "The subnet mask" ], "answer": "C", "solution": "The **ip route** command can refer to the IP address of the next-hop router or to the local router’s interface. It also refers to the subnet ID and matching subnet mask, defining the range of addresses matched by the route", "topic": [ "Configuring IPv4 Addresses and Static Routes" ] }, { "id": "Wired Network-494", "type": 0, "question": "Which of the following cable types and connectors are used to attach a television set to a cable television (CATV) network?", "choices": [ "A fiber-optic cable and a Straight Tip (ST) connector", "A coaxial cable and a Bayonet-Neill-Concelman (BNC) connector", "A twisted pair cable and an RJ-45 connector", "A coaxial cable and an F-type connector", "An AUI cable and a vampire tap connector", "A twinaxial cable and a Bayonet-Neill-Concelman (BNC) connector" ], "answer": "D", "solution": "The cable type and connector used to attach a television set to a CATV network is a coaxial cable with a screw-on F-type connector. Although CATV networks typically use fiber-optic cables and ST connectors for outdoor connections, they do not use fiber for internal connections to television sets. Coaxial cables with BNC connectors are most commonly used for Thin Ethernet LANs, not CATV network connections. Twisted pair cables and RJ-45 connectors are used for Ethernet LANs and telephone networks, but not CATV networks. AUI cables and vampire tap connectors are used for Thick Ethernet networks. Twinaxial cables are used for SATA 3.0 device and 100 Gbit Ethernet connections, but not for CATV connections", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-495", "type": 0, "question": "True or false: The MST configuration version is locally significant.", "choices": [ "True", "False" ], "answer": "B", "solution": "False. The MST configuration is relevant to the entire MST region and should be the same for all switches in the region", "topic": [ "Multiple Spanning Tree Protocol" ] }, { "id": "Wired Network-496", "type": 0, "question": "You're configuring your phone to download and upload email. What type of server are you configuring your phone to use?", "choices": [ "Web server", "Authentication server", "Mail server", "FTP server" ], "answer": "C", "solution": "Mail servers are used to send, receive, and sometimes store and manage emails. They operate on ports 25, 110, and 143. Often devices will need to be configured with the name or IP of the server and the proper protocol or port for sending and receiving email. Web servers provide web pages over the Internet. Authentication servers verify identify before allowing access to resources, and FTP servers are used to quickly locate, download, and upload files", "topic": [ "Networking" ] }, { "id": "Wired Network-497", "type": 0, "question": "Which is true regarding EIGRP successor routes?", "choices": [ "Successor routes are saved in the neighbor table.", "Successor routes are stored in the DUAL table.", "Successor routes are used only if the primary route fails.", "A successor route is used by EIGRP to forward traffic to a destination." ], "answer": "D", "solution": "A successor route (think “successful” rather than standby or backup) is used by EIGRP to forward traffic to a destination and is stored in the routing table. It is backed up by a feasible successor route that is stored in the topology table—if one is available. Remember that all routes are in the topology table", "topic": [ "Routing Protocols" ] }, { "id": "Wired Network-498", "type": 0, "question": "Devices using a wireless LAN must operate in which one of the following modes?", "choices": [ "Round-robin access", "Half duplex", "Full duplex", "None of these answers" ], "answer": "B", "solution": "WLANs require half-duplex operation because all stations must contend for use of a channel to transmit frames", "topic": [ "Fundamentals of Wireless Networks" ] }, { "id": "Wired Network-499", "type": 0, "question": "Which of the following statements is NOT correct regarding VSANs?", "choices": [ "Multiple VSANs cannot share the same physical topology.", "The same Fibre Channel identifiers (FCIDs) can be assigned to a host in another VSAN.", "Events causing traffic disruptions in one VSAN are contained within that VSAN and are not propagated to other VSANs.", "VSAN 1 cannot be deleted, but it can be suspended." ], "answer": "A", "solution": "Multiple VSANs can share the same physical topology", "topic": [ "Implement Fibre Channel" ] }, { "id": "Wired Network-500", "type": 0, "question": "You connect a new host to your company's wireless network. The host is set to receive a DHCP address and the WPA2 key is entered correctly. However, the host cannot connect to the network. What can the problem be?", "choices": [ "DNS is not configured on the host.", "MAC filtering is enabled on the AP.", "The network has run out of wireless connections.", "The host is enabled to run 802.11b and 802.11g." ], "answer": "B", "solution": "If everything is correctly configured on the host, then MAC filtering would stop the host from connecting to the AP. If you try to connect and can't, check the AP's settings", "topic": [ "Wireless Networking" ] }, { "id": "Wired Network-501", "type": 0, "question": "How many bits is a MAC address?", "choices": [ "16", "32", "48", "64" ], "answer": "C", "solution": "A MAC, or hardware, address is a 48-bit (6-byte) address written in hexadecimal format", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-502", "type": 0, "question": "A customer has deployed a fabric using two ACI switches. Two overlapping VLANs exist in the customer environment in the DMZ and in the Inside network zone. Both need to be moved into the fabric using a vPC to the two switches. Is this possible? If so, what feature enables this capability? If not, why?", "choices": [ "Yes. Use the VLAN scope setting Port Local Scope.", "No. ACI rejects use of an encapsulation for more than a single EPG on a switch.", "Yes. Use a feature called Global Scope.", "No. Spanning Tree Protocol in ACI disables any ports to which overlapping VLAN IDs are deployed." ], "answer": "A", "solution": "Port Local Scope can be used to enable multiple EPGs to use the same encapsulation across different ports on a given leaf switch", "topic": [ "Extending Layer 2 Outside ACI" ] }, { "id": "Wired Network-503", "type": 0, "question": "How are customer routes isolated on PE routers in an MPLS Layer 3 VPN?", "choices": [ "By using VRF", "By using VDCs", "By using MP-BGP", "By using LDP" ], "answer": "A", "solution": "Customer routes are isolated on PE routers using VRFs", "topic": [ "VRF, MPLS, and MPLS Layer 3 VPNs" ] }, { "id": "Wired Network-504", "type": 0, "question": "To save a copy of a controller’s configuration, which of the following methods could you use?", "choices": [ "Use Commands > Upload File", "Use Commands > Download File", "Use Commands > Configuration > TFTP", "Use Commands > Files > Save Configuration" ], "answer": "A", "solution": "To save a copy of the controller’s configuration, you can upload the configuration file to a remotely connected TFTP, FTP, or SFTP server", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-505", "type": 0, "question": "Overdesigning is one of the most common network design pitfalls; what’s another phrase that means the same thing?", "choices": [ "Gold plating", "Preconceived notions", "Best practices", "Overthinking" ], "answer": "A", "solution": "Explanation: Gold plating is the process of adding design elements that are excessive and do not meet any underlying requirement. Preconceived notions is when you as a network designer bring in outside information and assign that information as attributes to make design decisions, even though they do not apply to the situation in question. Best practices are the general list of configurations, features, and functions that should be deployed when there are no requirements governing, limiting, and restricting said item. Overthinking is a distractor option", "topic": [ "Network Design" ] }, { "id": "Wired Network-506", "type": 0, "question": "Ralph is working on a new twisted-pair network cable installation on which the individual cable runs were not properly labeled as they were pulled. Ralph now has to trace each of the cable ends in the office area to the correct cable end in the data center and label them correctly. Which of the following tools should Ralph use to locate the correct cable in a bundle of unlabeled cable ends?", "choices": [ "Cable certifier", "Tone generator and locator", "OTDR", "Multimeter" ], "answer": "B", "solution": "Ralph can use a tone generator and locator to locate the correct cable associated with each office connection. By connecting the tone generator to one end of a cable run, he can use the locator to find the other end. A cable certifier identifies a variety of cable performance characteristics, typically including cabling length, signal attenuation, and crosstalk. An Optical Time Domain Reflectometer (OTDR) is a device for measuring the lengths and other characteristics of fiber-optic cables. A multimeter is a device for measuring the electric current on a copper cable", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-507", "type": 0, "question": "Which level of attenuation would you expect from drywall (or plasterboard wall)?", "choices": [ "About 1 to 2 dB", "About 3 to 4 dB", "About 6 to 8 dB", "About 10 to 12 dB" ], "answer": "B", "solution": "The attenuation depends on the wall structure, but 3 dB is a commonly accepted value", "topic": [ "Conducting an Offsite Site Survey" ] }, { "id": "Wired Network-508", "type": 0, "question": "Which of the following settings is required on the Cisco Unified CM in every MRA deployment?", "choices": [ "Cisco AXL Web Service running on the publisher node", "MRA Access Policy enabled for Jabber users", "OAuth Refresh Logins", "Denial of Service Thresholds" ], "answer": "A", "solution": "Cisco AXL Web Service must be running on the publisher node. If you have Cisco Jabber clients using OAuth authentication over MRA, make sure that your Jabber users’ User Profiles allow MRA. This is not required if OAuth is not being used. If you are using OAuth on the Expressway, you must also enable OAuth Refresh Logins on Unified CM as well. Again, this is not required if OAuth is not being used. High volumes of MRA calls may trigger denial of service thresholds on Unified CM when all calls arrive at the Unified CM from the same Expressway-C (cluster). If necessary (but not required), Cisco recommends that you increase the level of the SIP Station TCP Port Throttle Threshold service parameter to 750 KB/second", "topic": [ "Introduction to Mobile and Remote Access (MRA)" ] }, { "id": "Wired Network-509", "type": 0, "question": "A technician just updated the network card driver for a Windows workstation. Now, the network card does not appear to work. They reboot the computer and log back in, and it still does not work. What should be done next to resolve the issue?", "choices": [ "Reboot into safe mode and uninstall the network card driver.", "Reinstall Windows.", "Open Device Manager, find the network card, and roll back the driver.", "Replace the malfunctioning network card." ], "answer": "C", "solution": "Since you just updated the driver, it's most likely that the driver is the problem. Go to Device Manager (`devmgmt.msc`), find the network card and roll back the driver to the previous one, then reboot the system. It's not necessary to uninstall the card driver. It's highly unlikely that the card is malfunctioning. The problem is the driver the technician just installed", "topic": [ "Software Troubleshooting" ] }, { "id": "Wired Network-510", "type": 0, "question": "What network devices should be included in a Layer 3 diagram?", "choices": [ "Switches, routers, and firewalls", "Routers, firewalls, and load balancers", "Switches, firewalls, and load balancers", "Bridges, switches, and hubs" ], "answer": "B", "solution": "Layer 3 network diagrams capture all the network information available at Layer 3. All devices that operate at Layer 3—routers, firewalls, load balancers, and so on—and how they are interconnected should be included in these diagrams", "topic": [ "IP Services" ] }, { "id": "Wired Network-511", "type": 0, "question": "Which of the following describes the logical mapping and resolution of the endpoint ID to its location in the SD-Access control plane?", "choices": [ "VXLAN", "SGT", "Scalable groups", "LISP" ], "answer": "D", "solution": "The two main things that LISP keeps track of are the routing locator (RLOC) or router location and the endpoint identifier (EID), which is the IP address or MAC address", "topic": [ "SD-Access Design" ] }, { "id": "Wired Network-512", "type": 0, "question": "Which of the following statements about a wired Local Area Network (LAN) is true?", "choices": [ "Wired LANs support only the star topology.", "Wired LANs support only the star and bus topologies.", "Wired LANs support only the star and ring topologies.", "Wired LANs can support ring, bus, or star topologies." ], "answer": "D", "solution": "A wired LAN is a group of computers within a small area, connected by a common network medium. A wired LAN can be configured using a ring, bus, or star topology", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-513", "type": 0, "question": "A receiver picks up an RF signal from a distant transmitter. Which one of the following represents the best signal quality received? Example values are given in parentheses.", "choices": [ "Low SNR (10 dB), low RSSI (–75 dBm)", "High SNR (30 dB), low RSSI (–75 dBm)", "Low SNR (10 dB), high RSSI (–55 dBm)", "High SNR (30 dB), high RSSI (–55 dBm)" ], "answer": "D", "solution": "A high SNR is best, where the received signal strength is more elevated above the noise floor. A 30 dBm SNR separates the signal from the noise more than a 10 dBm SNR does. Likewise, a higher RSSI value means that the signal strength alone is higher. When RSSI values are presented in dBm, remember that 0 dBm is high, while 100 dBm is very low", "topic": [ "Wireless Signals and Modulation" ] }, { "id": "Wired Network-514", "type": 0, "question": "Which of the following statements about RADIUS and TACACS+ are correct?", "choices": [ "By default, RADIUS uses UDP, and TACACS+ uses TCP.", "By default, RADIUS uses TCP, and TACACS+ uses UDP.", "By default, both RADIUS and TACACS+ use TCP.", "By default, both RADIUS and TACACS+ use UDP." ], "answer": "A", "solution": "Remote Authentication Dial-In User Service (RADIUS) uses User Datagram Protocol (UDP) ports 1812 and 1813 or 1645 and 1646 for authentication, whereas Terminal Access Controller Access Control System Plus (TACACS+) uses Transmission Control Protocol (TCP) port 49", "topic": [ "Network Security" ] }, { "id": "Wired Network-515", "type": 0, "question": "What occurs when the next hop of a BGP-learned route is not reachable?", "choices": [ "The route is discarded.", "The route is placed in the BGP table and advertised to other neighbors.", "The route is placed in the BGP table and not marked as valid.", "The route is placed in the BGP table and in the routing table." ], "answer": "C", "solution": "When the next hop of a BGP-learned route is not reachable the route is placed in the BGP table and not marked as valid", "topic": [ "Troubleshooting BGP" ] }, { "id": "Wired Network-516", "type": 0, "question": "Which TCP/IP utility should you use to most easily identify a malfunctioning router on your network?", "choices": [ "`ifconfig`", "`ping`", "`traceroute`", "`netstat`" ], "answer": "C", "solution": "The `traceroute` (or `tracert` ) utility can locate a malfunctioning router by using an Echo Request messages with incrementing Time to Live (TTL) values. `ifconfig` is a network configuration utility for Unix and Linux systems; `ping` can test connectivity to another Transmission Control Protocol/Internet Protocol (TCP/IP) system, but it cannot locate a malfunctioning router; and `netstat` displays information about network connections and traffic but cannot locate a malfunctioning router", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-517", "type": 0, "question": "Which IPv6 OSPFv3 command enables you to verify the configured hello interval and the dead interval?", "choices": [ "show ipv6 protocols", "show ipv6 ospf interface", "show ipv6 ospf neighbor", "show ipv6 ospf database" ], "answer": "B", "solution": "You can verify the configured hello and dead interval with the command **show ipv6 ospf interface", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-518", "type": 0, "question": "Which of the following protocols does Internet Protocol Security (IPSec) use to provide data origin authentication by digitally signing packets before transmitting them over the network?", "choices": [ "AH", "SSL", "ESP", "RDP" ], "answer": "A", "solution": "Authentication Header (AH) is a protocol in the TCP/IP suite that provides digital integrity services, in the form of a digital signature, which ensures that an incoming packet actually originated from its stated source. Encapsulating Security Protocol (ESP) provides encryption services for IPSec. Secure Sockets Layer (SSL) is a security protocol that provides encrypted communications between web browsers and servers. Remote Desktop Protocol (RDP) is a component of Remote Desktop Services, a Windows mechanism that enables a client program to connect to a server and control it remotely", "topic": [] }, { "id": "Wired Network-519", "type": 0, "question": "Ralph is designing the HVAC implementation for his company's new central datacenter, which will house all of the equipment for the corporate headquarters and the company's manufacturing facility. The datacenter must adhere to the Tier III standard defined by the Uptime Institute, which calls for at least 99.9 percent uptime. As part of the environmental infrastructure for the datacenter, Ralph plans to install sensors to monitor environmental factors that can affect computer equipment and generate alerts when conditions exceed accepted thresholds. Which of the following environmental factors is not one of those that Ralph should arrange to monitor to protect the equipment specific to a datacenter?", "choices": [ "Flood", "Humidity", "Radon", "Static electricity", "Temperature" ], "answer": "C", "solution": "Unless there is a specific known threat at the datacenter location, radon is not one of the environmental factors that typically can affect equipment uptime and that needs to be monitored. Temperature, humidity, flooding, and static electricity, however, are factors that should be monitored in a datacenter, as variations of these elements can result in equipment damage and downtime", "topic": [ "Network Operations" ] }, { "id": "Wired Network-520", "type": 0, "question": "The 802.11r amendment is also known as which one of the following?", "choices": [ "Fast secure roaming", "[Opportunistic Key Caching (OKC)](glo.xhtml#glo127)", "Fast BSS Transition (FT)", "Fast Key Caching (FKC)" ], "answer": "C", "solution": "802.11r is known as Fast BSS Transition, or FT. The term “fast secure roaming” does not refer to a specific technique; rather, it is a general term used to describe any method of making roaming more efficient in a secure WLAN", "topic": [ "Designing for Client Mobility" ] }, { "id": "Wired Network-521", "type": 0, "question": "Which of the following uses HTTP operations to provide create, retrieve, update, and delete (CRUD) operations on a NETCONF data store containing YANG data?", "choices": [ "XML", "JSON", "NETCONF", "RESTCONF" ], "answer": "D", "solution": "RESTCONF uses HTTP operations to provide create, retrieve, update, and delete (CRUD) operations on a NETCONF data store", "topic": [ "Automation" ] }, { "id": "Wired Network-522", "type": 0, "question": "What is the maximum data rate for the 802.11a standard?", "choices": [ "6 Mbps", "11 Mbps", "22 Mbps", "54 Mbps" ], "answer": "D", "solution": "The IEEE 802.11a standard provides a maximum data rate of up to 54 Mbps", "topic": [ "Wireless Networking" ] }, { "id": "Wired Network-523", "type": 0, "question": "Top-of-rack switches most commonly form which layer of the datacenter topology?", "choices": [ "Leaf", "Backbone", "Spine", "Core" ], "answer": "A", "solution": "In a typical datacenter topology, racks contain servers that implement applications. A leaf switch at the top of the rack connects the servers in the rack together and also connects to a spine switch that links to the rest of the datacenter. The top-of-rack switches are not classified as backbone, spine, or core devices", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-524", "type": 0, "question": "One of your management employees works from home most days, but they need to have access to the server as if they were sitting there in the office, and the connection must be secure. What technology will you employ to do this?", "choices": [ "RMM", "VPN", "RDP", "VNC" ], "answer": "B", "solution": "A virtual private network (VPN) allows a user to be away from their office, such as a remote worker or traveling salesperson, and connect to the company server or other resources with their laptop or other mobile computer as if they were in the company offices. This is accomplished using tunneling protocols. It differs from a virtual network computer (VNC) in that the VNC allows a user to manipulate a computer remotely. Some VNC systems allow a smartphone to control a computer remotely. Remote monitoring and management (RMM) is a category of software used by managed service providers to remotely manage, configure, and control the resources of many different it networks, and Remote Desktop, which uses the Remote Desktop Protocol (RDP), is a type of VNC that is part of the Windows operating system", "topic": [ "Operational Procedures" ] }, { "id": "Wired Network-525", "type": 0, "question": "Which of the following options can expedite the enforcement of a new DNS policy?", "choices": [ "Clearing the DNS cache of the client and server manually.", "Disabling the DNS caching on the local workstations by the system administrator.", "Positioning a threat defense between the local-area network (LAN) and the DNS server.", "All of these answers are correct." ], "answer": "D", "solution": "All of these answers are correct. These options can help expedite the enforcement of a new DNS policy", "topic": [ "Domain Name System (DNS) Policy" ] }, { "id": "Wired Network-526", "type": 0, "question": "EIGRP uses the protocol number _______ to identify its packets.", "choices": [ "87", "88", "89", "90" ], "answer": "B", "solution": "EIGRP uses protocol number 88", "topic": [ "EIGRP" ] }, { "id": "Wired Network-527", "type": 0, "question": "Which of the following is the primary design concern for a Loop-Free U Topology?", "choices": [ "Introduces a single point of failure to the design if one distribution switch or uplink fails.", "A significant amount of access layer traffic might cross the interswitch link to reach the active FHRP.", "Inability to extend the same VLANs over more than a pair of access switches.", "STP limits the ability to utilize all the available uplinks within a VLAN or STP instance." ], "answer": "C", "solution": "Explanation: The primary design concern for Loop-Free U Topology is the inability to extend the same VLANs over more than a pair of access switches", "topic": [ "Layer 2 Technologies" ] }, { "id": "Wired Network-528", "type": 0, "question": "What characteristic differentiates STP from UTP?", "choices": [ "STP uses RJ-45s connectors instead of RJ-45.", "STP follows the T568A wiring standard.", "STP does not produce poisonous gas when burned.", "STP has a layer of foil shielding inside the cable insulation." ], "answer": "D", "solution": "Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned", "topic": [ "Hardware" ] }, { "id": "Wired Network-529", "type": 0, "question": "A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in the Transmission Control Protocol (TCP) session establishment messages?", "choices": [ "SYN, ACK, SYN, ACK", "SYN, SYN, ACK, ACK", "SYN/ACK, SYN/ACK", "SYN, SYN/ACK, ACK" ], "answer": "D", "solution": "The TCP connection establishment exchange is a three-way handshake that uses TCP flags to specify the message type for each frame. The first frame contains a SYN flag from the client; the second frame contains the SYN and ACK flags from the server; and the last frame contains an ACK flag from the client", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-530", "type": 0, "question": "How long is the default NHRP cache timer?", "choices": [ "2 hours", "1 hour", "30 minutes", "15 minutes" ], "answer": "A", "solution": "The default NHRP cache defaults to 2 hours (7200 seconds)", "topic": [ "DMVPN Tunnels" ] }, { "id": "Wired Network-531", "type": 0, "question": "What is unique about Cisco’s downloadable access control lists (dACLs)?", "choices": [ "Cisco dACLs allow the RADIUS server to apply ACLs that exist on the switch simply by sending the name of the ACL in the RADIUS AV pairs, and non-Cisco network devices cannot apply ACLs.", "Cisco dACLs are created by experts at Cisco and published to [Cisco.com](http://Cisco.com), where Cisco ISE can download the ACLs.", "Cisco dACLs are created entirely on the RADIUS server, and a full ACL is sent down to the network device within RADIUS AV pairs. Non-Cisco network devices must create ACLs on individual local network devices if they do not support the NAS-Filter-Rule RADIUS attribute.", "Cisco dACLs are unique because they are downloaded from ISE and applied to the Cisco ASA that is in the network path, relieving the network device of the burden of traffic control." ], "answer": "C", "solution": "**Explanation:** Cisco dACLs are created entirely on the RADIUS server, and a full ACL is sent down to the network device within RADIUS AV pairs. Non-Cisco network devices must create ACLs on individual local network devices. This allows a Cisco administrator to create and maintain the access lists in a central place and have any changes applied nearly instantly", "topic": [ "Authorization Policies" ] }, { "id": "Wired Network-532", "type": 0, "question": "Suppose AP-1 is joined to WLC-1 and AP-2 is joined to WLC-2. Both APs offer the SSID “Wi-Fi,” but each offers a different IP subnet. A client undergoes a roam from AP-1 to AP-2 and is able to keep using its original IP address. For this client roam, which of the following correctly identifies the roles played by WLC-2?", "choices": [ "[Anchor controller](glo.xhtml#glo009), POA", "Anchor controller, POP", "[Foreign controller](glo.xhtml#glo077), POA", "Foreign controller, POP" ], "answer": "C", "solution": "AP-2 is joined to WLC-2. The client initially associated with AP-1, so WLC-1 is the anchor controller and WLC-2 is the foreign controller. The client is currently associated with AP-2, so WLC-2 is its point of attachment (POA). WLC-1 would be the client’s point of presence (POP), marking the location where the client appears to be connected", "topic": [ "Designing for Client Mobility" ] }, { "id": "Wired Network-533", "type": 0, "question": "Which of the following components does the port number in a transport layer protocol header identify?", "choices": [ "A transport layer protocol", "An application", "A gateway", "A proxy server" ], "answer": "B", "solution": "The port numbers specified in a transport layer protocol header identify the application that generated the data in the packet or the application that will receive the data. Port numbers do not identify transport layer protocols, gateways, or proxy servers", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-534", "type": 0, "question": "Which of the following topologies enables wireless devices to access resources on a wired network?", "choices": [ "Ad hoc", "Star", "Infrastructure", "Bus" ], "answer": "C", "solution": "An infrastructure topology uses a Wireless Access Point (WAP) to connect wireless devices to a wired network. An ad hoc topology connects wireless devices to each other, without connecting to a wired network. The star and bus topologies do not support wireless devices", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-535", "type": 0, "question": "Which of the following types of cable, when installed, sometimes employed a device called a vampire tap?", "choices": [ "Unshielded twisted pair", "Shielded twisted pair", "Multimode fiber optic", "Single-mode fiber optic", "Coaxial" ], "answer": "E", "solution": "Thick Ethernet installations used a type of coaxial cable called RG-8. To connect a node to the network, installers ran a separate cable called an Attachment Unit Interface (AUI) cable from the computer to the RG-8 and connected it using a device called a vampire tap that pierced the sheathing to make contact with the conductors within. All of the other cable types listed use different types of connectors", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-536", "type": 0, "question": "Several users on your network are reporting that a network printer, which is controlled by a print server, is not printing. What is the first action you should take to fix the problem?", "choices": [ "Have the affected users restart their computers.", "Replace the USB cable.", "Clear the print queue.", "Reinstall the printer drivers on the affected users’ computers." ], "answer": "C", "solution": "**Explanation:** The first thing you should try (of the listed answers) is to clear the print queue. How this is done will vary depending on the type of print server being used. For example, if the printer is being controlled by a Windows Server machine, that server will have the Print Management role installed. From the Print Management console window, you can access the printer in question and locate the queue. In most client Windows operating systems (such as Windows 10 or 11), you can find the queue simply by double-clicking the printer. Regardless of the OS, it is where you would normally go to manage print jobs. Then, after you have found the queue, delete any pending or stalled jobs. One of those print jobs might have been causing a delay, possibly if the print job was too big or was corrupted. Of course, you will have to notify users that any jobs as of _x_ time frame have been deleted and will need to be printed again. On some printers, you can clear the print queue from the onscreen display (OSD) directly on the printer; an OSD is also known as an OCP (operator control panel). Or, if the print server is built into a SOHO router or similar device, you have to access it from a browser.\n\n **Incorrect answers:** If at all possible, try to solve problems centrally, without getting users involved. Having the affected users restart their computers is probably a waste of time in this case. If only one user were affected, restarting could be a viable solution, but when multiple users are affected, the problem is more likely located centrally—at a server or a network device. You don’t even know if the printer is connected with a USB cable. It might be if it is connected directly to the server, but it could be wired to the network with a twisted-pair patch cable. Either way, cables don’t usually fail out of nowhere. This potential solution should be further down your list. Reinstalling the print drivers is not the best answer because several users were affected. Again, if only one user were affected, this might be a valid option, but if several were affected, the problem is probably more centralized", "topic": [] }, { "id": "Wired Network-537", "type": 0, "question": "Which protocol is used for MPLS-TE?", "choices": [ "MP-BGP", "RSVP", "LDP", "CDP" ], "answer": "B", "solution": "MPLS-TE uses RSVP", "topic": [ "VRF, MPLS, and MPLS Layer 3 VPNs" ] }, { "id": "Wired Network-538", "type": 0, "question": "You are troubleshooting network connectivity issues in one section of the building. After a few hours, you come to the conclusion that the network cables in the wiring closet must be mislabeled. Which tool is most appropriate to test your theory?", "choices": [ "Multimeter", "Cable tester", "Punchdown tool", "Tone generator and probe" ], "answer": "D", "solution": "If you need to trace a wire in a wall from one location to another, a tone generator and probe (or toner probe) is the tool for you. It consists of two pieces: a tone generator and a probe. Because it's so good at tracking, you will sometimes hear this referred to as a “fox and hound.”", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-539", "type": 0, "question": "Which of the following allows you to tunnel directly to the remote server with no VPN?", "choices": [ "Split tunnel", "RDP Gateway", "Full tunnel", "VNC" ], "answer": "B", "solution": "You don't need to use a VPN. Using the SSL channel, RDP Gateway can tunnel directly to the remote server to increase the security of RDS", "topic": [ "Remote Access Security" ] }, { "id": "Wired Network-540", "type": 0, "question": "Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?", "choices": [ "RG-8", "Twisted pair", "RG-58", "Fiber optic" ], "answer": "B", "solution": "There are two main types of twisted pair wiring used for data communications: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP). Both types can be used in a star topology. UTP and STP cables contain eight copper conductors twisted in four pairs. UTP and STP cables use RJ-45 connectors to connect end systems to switches, patch panels, and wall plates. RG-8 and RG-58 coaxial cable can only be used in a bus topology. Fiber-optic cable can be used in a star topology, but it uses either glass or plastic conductors and does not use RJ-45 connectors", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-541", "type": 0, "question": "You have been given the job of devising a plan to provide a 500-node private internetwork with access to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized Internet users. There are two secondary objectives for the project: one is to provide a means of monitoring and regulating the users' Internet activities, and the other is to avoid having to manually configure IP addresses on each one of the client computers. You submit a proposal that calls for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, which are connected to the Internet. Which of the following statements about your proposed Internet access solution is true?", "choices": [ "The proposal satisfies the primary objective and both of the secondary objectives.", "The proposal satisfies the primary objective and one of the secondary objectives.", "The proposal satisfies the primary objective but neither of the secondary objectives.", "The proposal fails to satisfy both the primary and secondary objectives." ], "answer": "B", "solution": "Proxy servers provide network users with access to Internet services, and the unregistered IP addresses on the client computers protect them from unauthorized access by users on the Internet, which satisfies the primary objective. The proxy servers also make it possible for network administrators to monitor and regulate users' access to the Internet, which satisfies one of the two secondary objectives. However, proxy servers are not capable of assigning IP addresses to the client computers, and the proposal makes no mention of a Dynamic Host Configuration Protocol (DHCP) server or any another automatic TCP/IP configuration mechanism. Therefore, the proposal does not satisfy the other secondary objective", "topic": [] }, { "id": "Wired Network-542", "type": 0, "question": "Which of the following commands displays the routing table on the local computer?", "choices": [ "`arp –r`", "`netstat –r`", "`ifconfig –r`", "`telnet –r`" ], "answer": "B", "solution": "The netstat utility can display the routing table, along with other types of network traffic and port information. The arp utility is for adding addresses to the Address Resolution Protocol (ARP) cache; it cannot display the routing table. The `ifconfig` command displays Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information on Unix and Linux systems; it cannot display the routing table. Telnet is a terminal emulation program; it cannot display the routing table", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-543", "type": 0, "question": "Which port and protocol are used by SNMP?", "choices": [ "TCP/161", "UDP/161", "TCP/520", "UDP/520", "TCP/514", "UDP/514" ], "answer": "B", "solution": "SNMP uses UDP port 161 by default", "topic": [ "Troubleshooting ACLs and Prefix Lists" ] }, { "id": "Wired Network-544", "type": 0, "question": "Which of the following is not true about DNS servers?", "choices": [ "They translate IP addresses to domain names like `[Sybex.com](http://sybex.com)`.", "AAAA DNS records identify IPv6 addresses.", "A records identify IPv4 addresses.", "There is a setting in IP configuration to identify the DNS server to use." ], "answer": "A", "solution": "Domain Name Service (DNS) servers reconcile human friendly names like `Sybex.com` to IP addresses so that a browser can find them (not IP address to domain name). A DNS server can be configured on a client computer automatically by a DHCP server, or manually on the Networking tab of a network connection by clicking on either IPv4 or IPv6 properties. DNS differentiates between IPv4 and IPv6 by identifying IPv6 addresses as AAAA records and IPv4 addresses as A records", "topic": [] }, { "id": "Wired Network-545", "type": 0, "question": "You have upgraded the firmware on your switches and access points. What documentation do you need to update?", "choices": [ "Baselines and configuration documentation", "Physical network diagram", "Logical network diagram", "Wiring schematics" ], "answer": "B", "solution": "A physical network diagram contains all the physical devices and connectivity paths on your network and should accurately picture how your network physically fits together in detail. This document will also have the firmware revisions on all the switches and access points in your network", "topic": [ "Data Center Architecture and Cloud Concepts" ] }, { "id": "Wired Network-546", "type": 0, "question": "Which of the following protocols can be used to configure and monitor network printer device status?", "choices": [ "SMTP", "SNMP", "TCP/IP", "IPP", "DNS" ], "answer": "B", "solution": "**Explanation:** Simple Network Management Protocol (SNMP) can be used to monitor remote computers and printers. This requires the installation of SNMP on the appropriate hosts. Be sure to use the latest version of SNMP across all devices!\n\n **Incorrect answers:** SMTP, which stands for Simple Mail Transfer Protocol, deals with the sending of email. TCP/IP is the entire suite of protocols that you use when you connect to an IP network. IPP, which stands for Internet Printing Protocol, allows hosts to print documents to a remote printer without the need for UNC paths. It is the basis for Apple’s AirPrint technology and is supported by most printers. DNS, which stands for Domain Name System, resolves domain names to their corresponding IP addresses", "topic": [] }, { "id": "Wired Network-547", "type": 0, "question": "Which command is used to measure packet loss as a packet travels to a destination address?", "choices": [ "`ping`", "`nslookup`", "`pathping`", "`tracert`" ], "answer": "C", "solution": "The `pathping` command measures the packet loss at each router as the packet travels to the destination address; it combines the `ping` and `tracert` commands. The `ping` command returns a single destination’s response time. The `nslookup` command is used to resolve DNS addresses. The `tracert` command allows you to see how a packet travels to its destination", "topic": [ "Windows Administration" ] }, { "id": "Wired Network-548", "type": 0, "question": "Which switching technology reduces the size of a broadcast domain?", "choices": [ "ISL", "802.1Q", "VLANs", "STP" ], "answer": "C", "solution": "Virtual LANs break up broadcast domains in layer 2 switched internetworks", "topic": [ "Switching and Virtual LANs" ] }, { "id": "Wired Network-549", "type": 0, "question": "Several users who access the network through the same WAP are complaining that they have limited connectivity. They can see each other on the network but not any network resources like printers and servers. Everything was working fine yesterday, and network users in other parts of the building are not having problems. What should you troubleshoot first?", "choices": [ "The power of the radio signal from the WAP", "The connection between the WAP and the router", "Their IP configuration", "The default gateway" ], "answer": "B", "solution": "When a Wi-Fi user is getting limited connectivity messages, it means that they are able to connect to the wireless access point but not the Internet. Since other people are getting this error message, we can assume it's the connection between the wireless access point they're connecting to and the wired network", "topic": [] }, { "id": "Wired Network-550", "type": 0, "question": "Which of the following is not a term used when making SOHO Internet connections?", "choices": [ "Hub", "Router", "NIC", "Switch", "IDS/IPS" ], "answer": "E", "solution": "Intrusion detection and prevention systems are not a requirement for a SOHO Internet connection", "topic": [ "Networking Devices" ] }, { "id": "Wired Network-551", "type": 0, "question": "Which of the words in the fully qualified domain name (FQDN) `[www.paris.mydomain.org](http://www.paris.mydomain.org)` represents the topmost layer in the DNS namespace hierarchy?", "choices": [ "`www`", "`paris`", "`mydomain`", "`org`" ], "answer": "D", "solution": "The topmost layer in the DNS hierarchy is represented by `org`, which is a top-level domain. `mydomain` is a second-level domain registered by a particular organization, `paris` is a subdomain within `mydomain`, and `www` is the name of a particular host in the `paris.mydomain.org` domain", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-552", "type": 0, "question": "You are troubleshooting a desktop computer that is exhibiting erratic behavior. As part of establishing a theory of probable cause, what step should you take, as part of the best practice methodology to resolve problems?", "choices": [ "Question the user and identify user changes to the computer.", "Determine next steps to resolve the problem.", "Establish a plan of action to resolve the problem.", "If necessary, conduct external or internal research based on symptoms." ], "answer": "D", "solution": "Part of establishing a theory of probable cause is to perform external or internal research based on symptoms. CompTIA's best practice methodology to resolve problems consists of the following steps: \n\n 1. Identify the problem.\n 2. Establish a theory of probable cause (question the obvious).\n 3. Test the theory to determine the cause.\n 4. Establish a plan of action to resolve the problem and implement the solution.\n 5. Verify full system functionality, and if applicable, implement preventive measures.\n 6. Document the findings, actions, and outcomes", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-553", "type": 0, "question": "When using non-PBR service graphs to deploy a transparent firewall that bridges traffic between endpoints in a single subnet, which deployment mode should be used, and how many bridge domains are needed?", "choices": [ "One-arm mode and one bridge domain", "GoTo mode and two bridge domains", "GoThrough mode and two bridge domains", "GoThrough mode and one bridge domain" ], "answer": "C", "solution": "Go-through mode relates to deployment of transparent mode firewalls. Bridging between a single subnet with this deployment mode requires at least two bridge domains", "topic": [ "Implementing Service Graphs" ] }, { "id": "Wired Network-554", "type": 0, "question": "What is a valid use of a network device group?", "choices": [ "As the condition by which to build different policy sets for the staged deployment of ISE", "As the condition to process the incoming authentication protocol type", "As the condition by which to determine which ISE policy node to route the authentication request to", "As the condition to allow the user to log in and control devices in the assigned network device group" ], "answer": "A", "solution": "**Explanation:** Use an NDG as the condition by which to build different policy sets for the staged deployment of ISE", "topic": [ "Initial Configuration of Cisco ISE" ] }, { "id": "Wired Network-555", "type": 0, "question": "Which of the following is among the benefits of a switch?", "choices": [ "Protects LAN resources from attackers on the Internet", "Provides extra bandwidth", "Reduces throughput", "Allows access to all computers on a LAN" ], "answer": "B", "solution": "By allowing full-duplex operation on each port, a switch provides extra bandwidth to each port", "topic": [ "Networking Devices" ] }, { "id": "Wired Network-556", "type": 0, "question": "You have five web servers that manage requests for online purchases. An administrator notices that one of the servers is always busy while another is idle, and the company is getting some online complaints about the slow website. Which of the following servers will help fix this?", "choices": [ "DNS", "DHCP", "Proxy", "Load balancer" ], "answer": "D", "solution": "A load balancer can spread the work around to multiple servers. It accepts the inbound request and then sends it to the most appropriate web server. DNS resolves hostnames to IP addresses. DHCP provides IP configuration information. A proxy makes requests (usually outbound) on behalf of clients", "topic": [ "Network Services, Virtualization, and Cloud Computing" ] }, { "id": "Wired Network-557", "type": 0, "question": "How can Unified CM determine if the remote peer defined on a SIP trunk is available to receive calls?", "choices": [ "Check the Dialed Number Analyzer (DNA) tool in Unified CM.", "SIP is a peer-to-peer protocol, so this is not possible.", "Use SIP OPTIONS ping.", "Perform a TCP handshake to see if it succeeds." ], "answer": "C", "solution": "SIP OPTIONS ping can be used to monitor the reachability status of a remote device", "topic": [ "Unified CM SIP Trunk Configuration" ] }, { "id": "Wired Network-558", "type": 0, "question": "Which Layer 2 VPN technology provides a point-to-point WAN link between two sites over an MPLS backbone?", "choices": [ "DWDM", "GRE", "VPLS", "VPWS" ], "answer": "D", "solution": "VPWS provides a point-to-point WAN link between two sites over an MPLS provider backbone", "topic": [ "WAN for the Enterprise" ] }, { "id": "Wired Network-559", "type": 0, "question": "Which of the following is a TACACS+ message that is sent from the AAA client to the AAA server?", "choices": [ "START", "REPLY", "CHALLENGE", "REQUEST" ], "answer": "A", "solution": "**Explanation:** TACACS+ clients send only two message types: START and CONTINUE. REPLY is sent from the AAA server to the AAA client", "topic": [ "Fundamentals of AAA" ] }, { "id": "Wired Network-560", "type": 0, "question": "What are the three elements in the Grandfather-Father-Son media rotation system for network backups?", "choices": [ "Hard disk drives, optical drives, and magnetic tape drives", "Incremental, differential, and full backup jobs", "Monthly, weekly, and daily backup jobs", "QIC, DAT, and DLT tape drives" ], "answer": "C", "solution": "The generational media rotation system uses the terms _grandfather_ , _father_ , and _son_ to refer to backup jobs that are run monthly, weekly, and daily. The jobs can be full, incremental, or differential, and the terms have nothing to do with whether the backup medium is a hard disk, optical, or any type of tape drive", "topic": [ "Network Operations" ] }, { "id": "Wired Network-561", "type": 0, "question": "What type of address does a router use to get data to its destination?", "choices": [ "IP", "MAC", "Memory", "Loopback" ], "answer": "A", "solution": "Routers are OSI model Layer 3 devices. They keep a chart containing the IP address of the device connected to each port, whether that device is a computer or another router's external address. A media access control (MAC) address is the address of a network interface card (NIC). Memory addresses identify where information is stored, and a loopback address is used to test TCP/IP on the local host. The loopback address for IPv4 is 127.0.0.1, and for IPv6 it is ::1", "topic": [ "Networking" ] }, { "id": "Wired Network-562", "type": 0, "question": "In a client-to-site Virtual Private Network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?", "choices": [ "Two workstations", "A workstation and a server", "A workstation and a VPN concentrator", "Two VPN concentrators" ], "answer": "C", "solution": "A client-to-site VPN connection connects a single workstation to a remote Local Area Network (LAN), enabling the workstation user to access the remote network's resources. The typical configuration would consist of a standalone workstation and a VPN concentrator at the network site functioning as the endpoints of the connection", "topic": [ "Network Security" ] }, { "id": "Wired Network-563", "type": 0, "question": "Which protocol is used to request a host MAC address given a known IP address?", "choices": [ "ARP", "DHCP", "ARPv6", "DNS" ], "answer": "A", "solution": "Address Resolution Protocol (ARP) is used to request a MAC address given a known IP address", "topic": [ "Fundamentals of Networking Protocols and Networking Devices" ] }, { "id": "Wired Network-564", "type": 0, "question": "Where does the SDN controller interface with the switching fabric?", "choices": [ "Spine", "Control plane", "Forwarding plane", "P Core" ], "answer": "B", "solution": "The software-defined networking controller provides the control plane for a SDN-based switching fabric", "topic": [ "Data Center Architecture and Cloud Concepts" ] }, { "id": "Wired Network-565", "type": 0, "question": "UDLD solves the problem of ______.", "choices": [ "Time for Layer 2 convergence.", "A cable that sends traffic in only one direction.", "Corrupt BPDU packets.", "Flapping network links." ], "answer": "B", "solution": "Unidirectional Link Detection (UDLD) solves the problem when a cable sends traffic on only one direction", "topic": [ "Advanced STP Tuning" ] }, { "id": "Wired Network-566", "type": 0, "question": "Which of the following network devices are “dumb”—that is, purely electrical devices with no electronic intelligence?", "choices": [ "Hubs", "Switches", "Routers", "Bridges" ], "answer": "A", "solution": "Hubs are network devices that simply receive signals through one port, electrically enhance them, and transmit them out through another port. Routers, switches, and bridges are capable of reading the signals and processing them, which classifies them as intelligent", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-567", "type": 0, "question": "What is the maximum distance of 10GBaseSR?", "choices": [ "100 meters (328 feet)", "302 meters (990 feet)", "305 meters (1,000 feet)", "1,593 km (990 miles)" ], "answer": "B", "solution": "A 10GBaseSR cable can have a maximum distance of 990 feet (302 meters)", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-568", "type": 0, "question": "Which of the following physical topologies has the most connections and is the least popular for LANs?", "choices": [ "Bus", "Star", "Ring", "Mesh" ], "answer": "D", "solution": "Only a mesh physical topology has point-to-point connections to every device, so it has more connections and is not a popular LAN technology", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-569", "type": 0, "question": "Which subnetworks are summarized by the following summary route: 150.10.192.0/21?", "choices": [ "150.10.192.0/24, 150.10.193.0/24", "150.10.192.0/22, 150.10.196.0/23, 150.10.197.0/24", "150.10.192.0/22, 150.10.199.0/22", "150.10.192.0/23, 150.10.194.0/23, 150.10.196.0/23, 150.10.199.0/24, 150.10.198.0/24" ], "answer": "D", "solution": "The summary route summarizes subnetworks from 150.10.192.0/24 to 150.10.199.0/24. Answer D is the only one that includes them", "topic": [ "Internet Protocol Version 4 Design" ] }, { "id": "Wired Network-570", "type": 0, "question": "What is the ending sequence for a NETCONF RPC hello exchange over an SSH session?", "choices": [ "..END..", "]]>]]>", ">>]>>]", "" ], "answer": "B", "solution": "The end-of-message framing sequence for a NETCONF RPC over an SSH session is ]]>]]>, as defined in RFC 6242, Section 4.3. The other options are incorrect; they are not the ending sequences for a hello exchange", "topic": [ "NETCONF and RESTCONF" ] }, { "id": "Wired Network-571", "type": 0, "question": "When an internal Windows user logs on to an Active Directory domain, which of the following protocols authenticates the user?", "choices": [ "Kerberos", "WPA2", "RADIUS", "EAP-TLS" ], "answer": "A", "solution": "Windows networks that use Active Directory Domain Services (AD DS) authenticate clients using the Kerberos protocol, in part because it never transmits passwords over the network, even in encrypted form. Remote Authentication Dial-In User Service (RADIUS) is an authentication, authorization, and accounting service for remote users connecting to a network. Windows does not use it for internal clients. WiFi Protected Access II (WPA2) is a security protocol used by Wireless Local Area Networks (WLANs). It is not used for AD DS authentication. Extensible Authentication Protocol - Transport Layer Security (EAP-TLS) is a remote authentication protocol that AD DS networks do not use for internal clients", "topic": [] }, { "id": "Wired Network-572", "type": 0, "question": "You're troubleshooting a PC and want to see what ports TCP is connected on and the IP addresses of those connections. What command-line utility can you use to see statistics on network interfaces?", "choices": [ "`ping`", "`nbtstat`", "`nslookup`", "`netstat`" ], "answer": "D", "solution": "The `netstat` command-line utility presents statistics related to the installed network interfaces. By default, on a Windows machine, running the command will display a list of connections and the associated protocol, the source and target address, and the current state of the connection. `Ping` is used to test connectivity between two computers, `nbtstat` is used for troubleshooting NetBIOS over TCP/IP, and `nslookup` is used to query a DNS server", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-573", "type": 0, "question": "Ralph has been asked to create some new patch cables that will be used to connect patch panel ports to the network switches. He has been told to use the T568B pinout standard for all of the cable connectors. Ralph gathers the materials and the tools needed to complete the task, but he is not sure about the T568B pinout. Which of the following pinouts must Ralph use when creating the patch cables?", "choices": [ "White/orange, orange, white/green, blue, white/blue, green, white/brown, brown", "White/green, green, white/orange, blue, white/blue, orange, white/brown, brown", "White/orange, orange, white/green, green, white/blue, blue, white/brown, brown", "White/brown, white/green, white/orange, blue, white/blue, orange, green, brown" ], "answer": "A", "solution": "Option A is the T568B pinout that Ralph should use when attaching connectors to the cables. Option B is the T568A pinout, which would also work but that Ralph has been instructed not to use. Options C and D are both incorrect and can result in excessive amounts of crosstalk", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-574", "type": 0, "question": "Which of the following are not valid Class B network IDs?", "choices": [ "130.0.0.0", "191.255.0.0", "128.0.0.0", "150.255.0.0", "All are valid Class B network IDs." ], "answer": "E", "solution": "All Class B networks begin with values between 128 and 191, inclusive, in their first octets. The network ID has any value in the 128–191 range in the first octet, and any value from 0 to 255 inclusive in the second octet, with decimal 0s in the final two octets. Two of the answers show a 255 in the second octet, which is acceptable. Two of the answers show a 0 in the second octet, which is also acceptable", "topic": [ "Analyzing Classful IPv4 Networks" ] }, { "id": "Wired Network-575", "type": 0, "question": "Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?", "choices": [ "110 and 25", "143 and 25", "110 and 143", "80 and 110", "25 and 80" ], "answer": "A", "solution": "The default port for the Post Office Protocol (POP3) is 110. The default port for the Simple Mail Transfer Protocol (SMTP), the other protocol used by email clients, is 25. Port 143 is the default for the Internet Message Access Protocol (IMAP), a different email mailbox protocol that clients never use with POP3. Port 80 is the default for the Hypertext Transfer Protocol (HTTP), which is not used by POP3 email clients", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-576", "type": 0, "question": "What type of router is responsible for adding MPLS labels to a packet?", "choices": [ "Ingress edge LSR", "Egress edge LSR", "Intermediate LSR", "P router" ], "answer": "A", "solution": "An ingress edge LSR is responsible for adding MPLS labels to a packet", "topic": [ "VRF, MPLS, and MPLS Layer 3 VPNs" ] }, { "id": "Wired Network-577", "type": 0, "question": "When designing a wireless LAN installation, which of the following are valid reasons to install a unidirectional antenna in an Access Point (AP), rather than an omnidirectional one? (Choose all that apply.)", "choices": [ "The AP will be located against an outside wall.", "There are many interior walls between the AP and the most distant workstation.", "A unidirectional antenna can be focused to a specific signal pattern width.", "All of the above" ], "answer": "D", "solution": "By placing a unidirectional antenna against an outside wall, you can limit network access to users inside the structure. Unidirectional antennae provide greater signal strength than omnidirectional antennae, enabling their signals to penetrate more interior walls. It is possible to focus a unidirectional antenna to a wider or narrower signal pattern", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-578", "type": 0, "question": "Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling?", "choices": [ "10GBASE-T", "100BASE-T", "1000BASE-T", "None of the other answers is correct." ], "answer": "C", "solution": "The number before the word _BASE_ defines the speed, in megabits per second (Mbps). 1000 Mbps equals 1 gigabit per second (1 Gbps). The _T_ in the suffix implies twisted-pair or UTP cabling, so 1000BASE-T is the UTP-based Gigabit Ethernet standard name", "topic": [ "Fundamentals of Ethernet LANs" ] }, { "id": "Wired Network-579", "type": 0, "question": "A large enterprise network will—at a minimum—have demarcation points for telephone services and a connection to an Internet Service Provider's (ISP's) network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. Which of the following is the term used to describe this wiring nexus?", "choices": [ "MTBF", "IDF", "RDP", "MDF" ], "answer": "D", "solution": "The place containing the demarcation points and the backbone switch is called the Main Distribution Frame (MDF). An Intermediate Distribution Frame (IDF) is the location of localized telecommunications equipment such as the interface between the horizontal cabling and the backbone. Mean Time Between Failures (MTBF) and Remote Desktop Protocol (RDP) are not network wiring locations", "topic": [] }, { "id": "Wired Network-580", "type": 0, "question": "Which of the following tasks is not considered to be part of an IT department's incident response plan?", "choices": [ "Stopping an ongoing incident", "Containing the damage caused by an incident", "Repairing the damage caused by an incident", "Rebuilding an infrastructure destroyed by an incident" ], "answer": "D", "solution": "Once a network infrastructure has been partially or completely destroyed, it is no longer a matter of incident response; the responsibility passes over to the disaster recovery plan, which requires a different set of policies. Stopping, containing, and remediating an incident are all considered incident response policies", "topic": [ "Network Operations" ] }, { "id": "Wired Network-581", "type": 0, "question": "What technology delivers IP services using labels to forward packets from the source to the destination?", "choices": [ "ADSL", "Cable", "Frame Relay", "MPLS" ], "answer": "D", "solution": "MPLS is a technology for the delivery of IP services using labels (numbers) to forward packets", "topic": [ "WAN Technologies and the Enterprise Edge" ] }, { "id": "Wired Network-582", "type": 0, "question": "On your network, a few users have been accessing material on inappropriate websites. What type of server can you install to block content from a list of prohibited websites?", "choices": [ "DNS server", "Authentication server", "Proxy server", "Web server" ], "answer": "C", "solution": "A proxy server makes requests for resources on behalf of a client. Proxy servers are known for three things. One, the proxy server can cache the information requested, speeding up subsequent searches. Two, the proxy can act as a filter, blocking content from prohibited websites and blocking sensitive data from leaving the network. Three, the proxy server can modify the requester's information when passing it to the destination, blocking the sender's identity and acting as a measure of security; the user can be made anonymous. A DNS server resolves IP addresses to domain names. An authentication server verifies the identity of a user and their access to resources, and a web server provides information in files that can be read by a web browser, whether internal to the company or on the Internet", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-583", "type": 0, "question": "Which of the following is the most deterministic strategy you can use to push a specific AP to join a specific controller?", "choices": [ "Let the AP select the least-loaded controller", "Use DHCP option 43", "Specify the master controller", "Specify the primary controller" ], "answer": "D", "solution": "If the primary controller responds to an AP’s discovery methods, the AP will always try to join it first, ahead of any other controller. Configuring an AP with a primary controller is the most specific method because it points the AP to a predetermined controller. Other methods are possible, but they can yield ambiguous results that could send an AP to one of several possible controllers", "topic": [ "Wireless Infrastructure" ] }, { "id": "Wired Network-584", "type": 0, "question": "Which of the following does a router normally use when making a decision about routing TCP/IP packets?", "choices": [ "Destination MAC address", "Source MAC address", "Destination IP address", "Source IP address", "Destination MAC and IP addresses" ], "answer": "C", "solution": "Routers compare the packet’s destination IP address to the router’s IP routing table, making a match and using the forwarding instructions in the matched route to forward the IP packet", "topic": [ "Fundamentals of WANs and IP Routing" ] }, { "id": "Wired Network-585", "type": 0, "question": "Which of the following is an optional configuration parameter for smart tunnels?", "choices": [ "Application ID", "Operating system", "Process name", "Hash" ], "answer": "D", "solution": "When configuring a smart tunnel, the application ID, operating system, and process name are all required. Only the hash is an optional configuration parameter", "topic": [ "Clientless Remote Access SSL VPNs on the ASA" ] }, { "id": "Wired Network-586", "type": 0, "question": "Ralph is troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. Ralph checks that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then runs `ipconfig /all` on the user's workstation and examines the output. Which of the following could be the explanation for the user's problem, based on these `ipconfig` results? \n \n \n Windows IP Configuration\r\n Host Name . . . . . . . . . . . . : Client12\r\n Primary Dns Suffix . . . . . . . : \r\n Node Type . . . . . . . . . . . . : Hybrid\r\n IP Routing Enabled. . . . . . . . : No\r\n WINS Proxy Enabled. . . . . . . . : No\r\n Ethernet adapter Local Area Connection:\r\n Connection-specific DNS Suffix . : \r\n Description . . . . . . . . . . . : PCIe Family Controller\r\n Physical Address. . . . . . . . . : 60-EB-69-93-5E-E5\r\n DHCP Enabled. . . . . . . . . . . : Yes\r\n Autoconfiguration Enabled . . . . : Yes\r\n Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2\r\n IPv4 Address. . . . . . . . . . . : 169.254.203.42\r\n Subnet Mask . . . . . . . . . . . : 255.255.0.0\r\n Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM\r\n Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM\r\n Default Gateway . . . . . . . . . : \r\n DHCPv6 IAID . . . . . . . . . . . : 241232745\r\n DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5\r\n DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1\r\n fec0:0:0:ffff::2%1\r\n fec0:0:0:ffff::3%1\r\n NetBIOS over Tcpip. . . . . . . . : Enabled", "choices": [ "The Subnet Mask is incorrect.", "The Default Gateway address is missing.", "The DHCPv4 scope is exhausted.", "The DNS server addresses are incorrect." ], "answer": "C", "solution": "The 169.254.203.42 address assigned to the workstation is from the 169.254.0.0/16 network address assigned to Automatic Private Internet Protocol Addressing (APIPA), a standard for the assignment of Internet Protocol (IP) addresses to Dynamic Host Configuration Protocol (DHCP) clients when they cannot obtain an address from a DHCP server. Since no one else is experiencing a problem, the DHCP server is presumably functioning. The Subnet Mask value is correct for an APIPA address, and APIPA does not provide Default Gateway or Domain Name System (DNS) server addresses. Therefore, an exhausted DHCP scope is the only one of the explanations provided that could be the cause of the problem", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-587", "type": 0, "question": "Which of the following RAID levels does not provide fault tolerance?", "choices": [ "RAID 0", "RAID 1", "RAID 5", "RAID 10" ], "answer": "A", "solution": "Redundant Array of Independent Disks (RAID) is a technology for storing data on multiple hard disk drives, providing fault tolerance, increased performance, or both. The various RAID levels provide different levels of functionality and have different hardware requirements. RAID 0 uses data striping only (blocks written to each disk in turn), which does not provide any form of fault tolerance. RAID 1 provides disk mirroring, RAID 5 combines disk striping with distributed storage of parity information, and RAID 10 creates mirrored stripe sets—these three levels all provide fault tolerance", "topic": [ "Network Operations" ] }, { "id": "Wired Network-588", "type": 0, "question": "Which of the following is an example of when a point-to-multipoint network is called for?", "choices": [ "When a centralized office needs to communicate with many branch offices", "When a full mesh of WAN links is in place", "When multiple offices are daisy-chained to one another in a line", "When there are only two nodes in the network to be connected" ], "answer": "A", "solution": "When a central office, such as headquarters, needs to communicate directly with its branch offices but the branches do not require direct communication with one another, the point-to-multipoint model is applicable. The other scenarios tend to indicate the use of a point-to-point link between sites", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-589", "type": 0, "question": "Which command is used to redistribute a static default route into OSPF?", "choices": [ "redistribute static", "redistribute ospf 1 subnets", "default-information originate", "ip route 0.0.0.0 0.0.0.0 110" ], "answer": "C", "solution": "The command **default-information originate** is used to redistribute a static default route into OSPF", "topic": [ "Troubleshooting OSPFv2" ] }, { "id": "Wired Network-590", "type": 0, "question": "The DS field of DSCP is capable of how many codepoints?", "choices": [ "8", "32", "64", "128" ], "answer": "C", "solution": "The DS field allocates 6 bits in the ToS field, thus making it capable of 64 distinct codepoints", "topic": [ "Internet Protocol Version 4 Design" ] }, { "id": "Wired Network-591", "type": 0, "question": "Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?", "choices": [ "Hypervisor", "Virtual server", "vSwitch (virtual switch)", "VPN concentrator" ], "answer": "A", "solution": "The hypervisor is the hardware or software component responsible for managing virtual machines and providing the virtualized hardware environment on which they run. Virtual servers and virtual switches are components that are part of the virtual network infrastructure enabled by the hypervisor. A Virtual Private Network (VPN) concentrator is a type of router that enables multiple remote clients to connect to a network; it has nothing to do with virtual networking", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-592", "type": 0, "question": "On a Wireless Access Point (WAP) that uses an Access Control List (ACL) to specify which devices are permitted to connect to the network, which of the following is used to identify the authorized devices?", "choices": [ "Usernames", "IP addresses", "Device names", "MAC addresses" ], "answer": "D", "solution": "WAPs use the layer 2 MAC addresses coded into devices in their ACLs. Usernames, IP addresses, and device names can easily be impersonated", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-593", "type": 0, "question": "What is NAT-PT?", "choices": [ "Network Address Translation–Port Translation. Translates RFC 1918 addresses to public IPv4 addresses.", "Network Addressable Transparent–Port Translation. Translates network addresses to ports.", "Network Address Translation–Protocol Translation. Translates between IPv4 and IPv6 addresses.", "Next Address Translation–Port Translation." ], "answer": "C", "solution": "NAT-PT translates between IPv4 and IPv6 addresses", "topic": [ "Internet Protocol Version 6 Design" ] }, { "id": "Wired Network-594", "type": 0, "question": "Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?", "choices": [ "512", "1024", "1500", "1518" ], "answer": "C", "solution": "The MTU is the largest amount of data (in bytes) that a protocol operating at a given layer of the OSI model can transmit in one packet. The MTU does not include any header and footer fields supplied by that protocol. For Ethernet, the maximum frame size is 1518 bytes, which includes 18 bytes of header and footer fields. Therefore, the MTU for Ethernet is 1500 bytes. Protocols operating at other OSI model layers can have different MTUs. For example, the typical MTU for an Internet Protocol (IPv4) implementation is smaller than that of Ethernet", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-595", "type": 0, "question": "Which of the following is not a statistic that you would typically find in a server performance baseline?", "choices": [ "CPU utilization", "Disk transfer rate", "Network transmissions speed", "OS update history", "Memory utilization" ], "answer": "D", "solution": "Performance baselines characterize hardware performance, so the OS update history would be of little or no use for future comparisons. A baseline typically consists of CPU, memory, disk, and network performance statistics", "topic": [ "Network Operations" ] }, { "id": "Wired Network-596", "type": 0, "question": "Which of the following devices is not one of the tools generally used by a data networking cable installer?", "choices": [ "Tone generator and locator", "Wiremap tester", "Butt set", "Cable certifier" ], "answer": "C", "solution": "A butt set is a one-piece telephone handset with alligator clips that enables its operator to connect to a telephone line anywhere that the cables are accessible. They are used by telephone cable technicians, but generally not by installers of network data cables. The other options are all standard tools used by data networking cable installers", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-597", "type": 0, "question": "When initially authenticating to the Cisco SD-WAN REST API, how are the username and password encoded?", "choices": [ "application/postscript", "application/xml", "application/json", "application/x-www-form-urlencoded" ], "answer": "D", "solution": "The information sent over the authentication POST call is URL form encoded and contains the username and password for the vManage instance", "topic": [ "Cisco Enterprise Networking Management Platforms and APIs" ] }, { "id": "Wired Network-598", "type": 0, "question": "Which of the following disaster recovery mechanisms is the least expensive to implement?", "choices": [ "A cold site", "A warm site", "A hot site", "All of the options cost the same." ], "answer": "A", "solution": "Cold, warm, and hot backup sites differ in the hardware and software they have installed. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive. A warm site has hardware in place that must be installed and configured. A hot site has all of the necessary hardware installed and configured. A warm site is more expensive than a cold site, and a hot site is the most expensive", "topic": [ "Network Operations" ] }, { "id": "Wired Network-599", "type": 0, "question": "What is the term for the process by which dynamic routing protocols update other routers with routing table information?", "choices": [ "Convergence", "Distance vectoring", "Redistribution", "Dissemination" ], "answer": "A", "solution": "Convergence is the term for the process by which routers propagate information from their routing tables to other routers on the network using dynamic routing protocols. Distance vectoring, redistribution, and dissemination do not describe this process", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-600", "type": 0, "question": "What is the greatest number of subnets you can create with a Class A IPv4 address if you use a 14-bit subnet identifier?", "choices": [ "256", "1,022", "1,024", "16,382", "16,384" ], "answer": "E", "solution": "The formula for calculating the number of subnets you can create using a subnet identifier of a given length is 2x, where x is the number of bits in the subnet identifier. Therefore, with a 14-bit subnet, you can conceivably create 214, or 16,384, subnets", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-601", "type": 0, "question": "Which software tool is used to view network traffic at the frame level?", "choices": [ "TDR", "Multimeter", "Port scanner", "Packet sniffer" ], "answer": "D", "solution": "A packet sniffer captures and analyzes Ethernet frames on a network. The sniffer can be used for detailed troubleshooting of transmit and receive traffic on a LAN from the frame level to the Application layer", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-602", "type": 0, "question": "What routes match the following prefix list: **ip prefix-list ENARSI seq 35 deny 192.168.0.0/20 ge 24 le 28**?", "choices": [ "Routes with an address from 192.168.0.0 to 192.168.15.255 with a subnet mask of 24 to 28", "Routes within the 192.168.0.0/20 subnet with a subnet mask greater than 24 and less than 28", "Routes with the subnet ID and mask 192.168.0.0/20", "Routes with an address from 192.168.0.0 to 192.168.15.255 with a subnet mask of 24 or 28" ], "answer": "A", "solution": "Routes with an address from 192.168.0.0 to 192.168.15.255 with a subnet mask of 24 to 28 will match the following prefix list: **ip prefix-list ENARSI seq 35 deny 192.168.0.0/20 ge 24 le 28", "topic": [ "Troubleshooting ACLs and Prefix Lists" ] }, { "id": "Wired Network-603", "type": 0, "question": "Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?", "choices": [ "Interface MTU", "Default IP TTL", "ARP cache timeout", "TCP keepalive interval" ], "answer": "B", "solution": "The Default IP Time-to-Live (TTL) option specifies the maximum number of seconds or hops allowed to an IP datagram before a router removes it from the network. This prevents datagrams from circulating endlessly. The Interface Maximum Transmission Unit (MTU) option specifies the maximum size of an IP datagram. The Address Resolution Protocol (ARP) cache timeout specifies how long entries containing the IP address assigned by the server can remain in the cache maintained by a client's ARP implementation. The Transmission Control Protocol (TCP) keepalive interval option specifies the number of seconds that the client should wait before transmitting a keepalive message over a TCP connection", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-604", "type": 0, "question": "Ralph is testing a twisted-pair cable run using a tone generator and locator. When he applies the tone generator to one particular wire at one end of the cable, he fails to detect a tone at the other end. Which of the following faults has Ralph discovered?", "choices": [ "Open", "Short", "Split pair", "Crosstalk" ], "answer": "A", "solution": "The failure to detect a tone on a wire indicates that there is either a break in the wire somewhere inside the cable or a bad connection with the pin in one or both connectors. This condition is called an open circuit. A short is when a wire is connected to two or more pins at one end of the cable. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-605", "type": 0, "question": "Which type of routers are used to interconnect areas in IS-IS?", "choices": [ "Level 1 routers", "Level 2 routers", "Level 1/2 routers", "Level 2 routers and Level 1/2 routers" ], "answer": "D", "solution": "Both Level 2 and Level 1/2 routers are used to interconnect IS-IS areas", "topic": [ "Routing Protocol Characteristics, EIGRP, and IS-IS" ] }, { "id": "Wired Network-606", "type": 0, "question": "Which of the following is not one of the typical heights for devices mounted in IT equipment racks?", "choices": [ "1 unit", "2 units", "3 units", "4 units" ], "answer": "C", "solution": "Devices designed to fit into IT equipment racks typically have heights measured in units. One unit equals 1.75 inches. Most rack-mounted devices are one (1U), two (2U), or four units (4U) tall", "topic": [ "Network Operations" ] }, { "id": "Wired Network-607", "type": 0, "question": "You can configure the priority value on an AP to accomplish which one of the following?", "choices": [ "To set the controller it will try to join first", "To define which APs will be preferred when joining a controller", "To set the SSID that will be advertised first", "To identify the least loaded controller to join" ], "answer": "B", "solution": "The AP priority determines which APs can join a controller when the controller fills with APs", "topic": [ "Designing High Availability" ] }, { "id": "Wired Network-608", "type": 0, "question": "Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs? (Choose all that apply.)", "choices": [ "Category 3 (CAT3)", "Category 5 (CAT5)", "Category 5e (CAT5e)", "Category 6 (CAT6)", "Category 6a (CAT6a)", "None of the above" ], "answer": "F", "solution": "All twisted pair Gigabit Ethernet implementations require all four wire pairs to achieve 1000 Mbps transfer rates", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-609", "type": 0, "question": "Which APIC CLI command signals an APIC or ACI switch to generate a system message for transmission toward a syslog server?", "choices": [ "moquery", "grep", "logit", "syslog" ], "answer": "C", "solution": "logit** is used to test syslog configurations within a fabric through submission of a test system message", "topic": [ "Monitoring ACI Using Syslog and SNMP" ] }, { "id": "Wired Network-610", "type": 0, "question": "A physical star topology consists of several workstations that branch off a central device called a ____________________.", "choices": [ "NIC", "Bridge", "Router", "Hub" ], "answer": "D", "solution": "A hub or a switch is at the center of a star topology. A NIC is a network card, which each computer must have to be on the network. Bridges and routers are higher‐level connectivity devices that connect network segments or separate networks together", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-611", "type": 0, "question": "A 2×3 MIMO device correctly describes which one of the following?", "choices": [ "A device with two radios and three antennas", "A device with two transmitters and three receivers", "A device with two bonded channels and three spatial streams", "A device with two receivers and three transmitters" ], "answer": "B", "solution": "The device has two transmitters and three receivers. The number of spatial streams supported would be added after the 2×3 designation", "topic": [ "RF Standards" ] }, { "id": "Wired Network-612", "type": 0, "question": "When you think about an IP address using classful addressing rules, an address can have three parts: network, subnet, and host. If you examined all the addresses in one subnet, in binary, which of the following answers correctly states which of the three parts of the addresses will be equal among all addresses? (Choose the best answer.)", "choices": [ "Network part only", "Subnet part only", "Host part only", "Network and subnet parts", "Subnet and host parts" ], "answer": "D", "solution": "When using classful IP addressing concepts as described in Chapter 13, “Analyzing Subnet Masks,” addresses have three parts: network, subnet, and host. For addresses in a single classful network, the network parts must be identical for the numbers to be in the same network. For addresses in the same subnet, both the network and subnet parts must have identical values. The host part differs when comparing different addresses in the same subnet", "topic": [ "Analyzing Existing Subnets" ] }, { "id": "Wired Network-613", "type": 0, "question": "When performing a DNS lookup on the Cisco Expressway, if the host is not a fully qualified domain name, how is DNS queried first?", "choices": [ "_Host_", "_Host_.< _system_domain_ >", "Neither, only FQDN hosts can be queried", "Both queried at the same time" ], "answer": "B", "solution": "If the supplied host is fully qualified, then DNS is queried first for _host_. If the lookup for _host_ fails, then an additional query for _host_. _< system_domain>_ is performed, where _< system_domain>_ is the domain name as configured on the DNS page of the Expressway. If the supplied host is not fully qualified, then DNS is queried first for _host. _. If the lookup for _host. _ fails, then an additional query for _host_ is performed", "topic": [ "Troubleshooting a Business-to-Business (B2B) Collaboration Solution" ] }, { "id": "Wired Network-614", "type": 0, "question": "True or false: Without Cisco ISE, it would not be possible to implement pxGrid.", "choices": [ "True", "False" ], "answer": "A", "solution": "pxGrid requires a pxGrid controller, and Cisco ISE is the only platform that can perform this role", "topic": [ "Secure Network Access Control" ] }, { "id": "Wired Network-615", "type": 0, "question": "Which of the following types of cables is used to connect a terminal to the console port of a router or switch?", "choices": [ "Rollover", "Straight through", "Crossover", "Plenum", "Shielded", "Tap" ], "answer": "A", "solution": "A rollover cable is a type of null modem cable, usually flat and light blue in color, with the pinouts reversed on either end, to enable a terminal to communicate with a router or switch through the device's dedicated console port. None of the other options are suitable for this purpose. A straight through cable is the standard network cable used to connect a computer to a switch. A crossover cable is designed to connect two network adapters directly. A plenum cable is a type of cable intended for use within air spaces and has an outer sheath that does not produce toxic fumes when it burns. A shielded cable is intended to protect signals from electromagnetic interference. A tap is a device used to branch a coaxial cable to two devices", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-616", "type": 0, "question": "The Wi-Fi connection between your laptop and network has failed. Upon examining Device Manager you notice that the network card is not listed. You've reseated the card and it still isn't found in Device Manager, so you've decided to replace it. Which of the following card types will you likely need to purchase?", "choices": [ "PCIe", "PCI", "2", "PCMCIA" ], "answer": "C", "solution": "Most likely you'll need to purchase an M.2 Wi-Fi card, and it's the only option listed that would work. Before you purchase a replacement, verify that your laptop has an internal connector and note what type it is. Then disable the onboard Wi-Fi, if there is one, before installing the new card. Mini-PCIe is a laptop connector standard that was largely replaced by M.2 connectors. PCIe and PCI are for desktop computers; PCI having been replaced by the newer, faster PCIe. PCMCIA is a legacy type of laptop connector. If there is no internal connector for a Wi-Fi card, you could purchase a USB Wi-Fi card, but it will take up one of your ports and may get bumped, and it was not listed as an option for this question", "topic": [ "Mobile Devices" ] }, { "id": "Wired Network-617", "type": 0, "question": "WPA2 with 802.1x and AES was introduced in which one of the following CCX versions?", "choices": [ "CCXv1", "CCXv2", "CCXv3", "CCXv4", "CCXv5" ], "answer": "C", "solution": "WPA2 with 802.1x was introduced in CCXv3 and so is supported in it and later versions", "topic": [ "Configuring Client Connectivity" ] }, { "id": "Wired Network-618", "type": 0, "question": "Which of the following IP addresses can be routed across the Internet?", "choices": [ "127.0.0.1", "192.168.1.1", "129.52.50.13", "10.52.50.13" ], "answer": "C", "solution": "**Explanation:** The only listed answer that is a public address (needed to get onto the Internet) is 129.52.50.13.\n\n **Incorrect answers:** All the other answers are private IP addresses, which are meant to be behind a firewall. 127.0.0.1 is the IPv4 local loopback IP address. 192.168.1.1 is a common private IP address used by SOHO networking devices. 10.52.50.13 is a private address. (Note that the 10 network is common in larger networks.)", "topic": [] }, { "id": "Wired Network-619", "type": 0, "question": "In current data center networking architecture, which network layer is used to transmit VXLAN packets or other overlay packets?", "choices": [ "Overlay network", "SD-WAN", "Underlay network", "MPLS" ], "answer": "C", "solution": "The underlay network—the bottom of that layer—provides a foundation for all other network services. The underlay transmits VXLAN and other overlay packets, so administrators must understand a different way to address connectivity issues", "topic": [ "Implementing Data Center Overlay Protocols" ] }, { "id": "Wired Network-620", "type": 0, "question": "Which of the following is the prefix for address 2000:0000:0000:0005:6000:0700: 0080:0009, assuming a mask of /64?", "choices": [ "2000::5::/64", "2000::5:0:0:0:0/64", "2000:0:0:5::/64", "2000:0:0:5:0:0:0:0/64" ], "answer": "C", "solution": "The /64 prefix length means that the last 64 bits, or last 16 digits, of the address should be changed to all 0s. That process leaves the unabbreviated prefix as 2000:0000:0000:0005:0000:0000:0000:0000. The last four quartets are all 0s, making that string of all 0s be the longest and best string of 0s to replace with ::. After removing the leading 0s in other quartets, the answer is 2000:0:0:5::/64", "topic": [ "Fundamentals of IP Version 6" ] }, { "id": "Wired Network-621", "type": 0, "question": "A network consists of four controllers: A, B, C, and D. Mobility group 1 consists of controllers A and B, while mobility group 2 consists of controllers C and D; the mobility list on each controller contains both mobility group definitions. Which one of the following answers describes what happens when a client tries to roam between controllers B and C?", "choices": [ "Roaming is seamless and efficient.", "Roaming is not possible.", "Roaming is possible, but CCKM and key caching do not work.", "Only Layer 3 roaming is possible." ], "answer": "C", "solution": "Controllers A and B are listed in each other’s mobility list, so they are known to each other. However, they are configured with different mobility group names. Clients may roam between the two controllers, but CCKM and PKC information will not be exchanged", "topic": [ "Understanding Wireless Roaming and Location Services" ] }, { "id": "Wired Network-622", "type": 0, "question": "Which command enables you to verify the maximum paths configured for load balancing and whether unequal-path load balancing has been enabled?", "choices": [ "show ip protocols", "show ip eigrp interfaces", "show ip eigrp neighbors", "show ip interfaces" ], "answer": "A", "solution": "The command **show ip protocols** enables you to verify the maximum paths configured for load balancing and whether unequal-path load balancing has been enabled", "topic": [ "Troubleshooting EIGRP for IPv4" ] }, { "id": "Wired Network-623", "type": 0, "question": "Which of the following statements is accurate?", "choices": [ "A three-node M3 cluster of APICs can scale up to 200 leaf switches.", "Sharding is a result of the evolution of what is called horizontal partitioning of databases.", "The number of shards distributed among APICs for a given attribute is directly correlated to the number of APICs deployed.", "A standby APIC actively synchronizes with active APICs and has a copy of all attributes within the APIC database at all times." ], "answer": "B", "solution": "At the time of this book’s publication, a cluster of at least four L3 APICs is necessary to scale to 200 leaf switches. Sharding is a result of the evolution of what is called horizontal partitioning of databases. In an ACI deployment that has three or more APICs, there will always be three shards for each attribute in the APIC database. Standby APICs do not actively synchronize data with active APICs. They are passive players in an ACI fabric that need to be manually activated to replace a failed APIC and restore the APIC quorum", "topic": [ "Understanding ACI Hardware and Topologies" ] }, { "id": "Wired Network-624", "type": 0, "question": "Dylan is troubleshooting his IPv4 network. The network's subnet mask is `255.255.192.0.` Which of the following IP addresses is _not_ on the same network as the others?", "choices": [ "`130.200.65.5`", "`130.200.130.1`", "`130.200.100.4`", "`130.200.125.5`" ], "answer": "B", "solution": "The third octet's subnet mask of 192 means that the first 2 bits of the octet are used to identify the network number, so the network can be broken down into four subnets using those first 2 bits of the octet. The subnets would be 00000000, 01000000, 10000000, and 11000000. IP addresses within each range would be 0 to 63, 64 to 127, 128 to 191, and 192 to 255. The first and last IP in each range would not be used because they would represent the subnet itself and the broadcast numbers. Options A, C, and D all fall in the second subnet's range. Option B is in the third subnet", "topic": [ "Networking" ] }, { "id": "Wired Network-625", "type": 0, "question": "For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups to tape at 6:00 a.m. every Wednesday and Saturday and incremental backups to tape at 6:00 a.m. every other day?", "choices": [ "One", "Two", "Three", "Four" ], "answer": "D", "solution": "An incremental backup is a job that backs up all of the files that have changed since the last backup of any kind. Therefore, to restore a system that failed on Tuesday at noon, you would have to restore the most recent full backup from the previous Saturday and the incrementals from Sunday, Monday, and Tuesday morning", "topic": [ "Network Operations" ] }, { "id": "Wired Network-626", "type": 0, "question": "To perform an initial configuration of a converged wireless controller, to which one of the following should you connect with your web browser?", "choices": [ "Virtual interface", "Console port", "Dynamic interface", "Access switch management address" ], "answer": "D", "solution": "Because the access switch hosts both a switch and a Wireless Controller Module (WCM) function, you should connect to it using the switch management address", "topic": [ "Implementing Controller-based Deployments" ] }, { "id": "Wired Network-627", "type": 0, "question": "Which of the following statements is INCORRECT regarding the Cisco MDS NX-OS Setup Utility?", "choices": [ "The Cisco MDS NX-OS Setup Utility is an interactive command-line interface (CLI) mode that guides you through a basic (also called a startup) configuration of the system.", "You can press Ctrl+C at any prompt to skip the remaining configuration options and proceed with what you have configured up to that point, except for the administrator password.", "You use the setup utility mainly for configuring the system initially, when no configuration is present. However, you can use the setup utility at any time for basic device configuration.", "You can configure only out-of-band and not in-band management using the Cisco MDS NX-OS Setup Utility." ], "answer": "D", "solution": "You can configure both in-band and out-of-band configuration using the Cisco MDS NX-OS Setup Utility", "topic": [ "Describe Software Management and Infrastructure Monitoring" ] }, { "id": "Wired Network-628", "type": 0, "question": "Which one of the following is a unique characteristic of Multicast Direct?", "choices": [ "A WLC will direct all multicast streams toward its next-hop router.", "Specific multicast streams will be redirected toward wireless clients as unicast streams.", "Multicast streams from wireless clients will be directed toward an anchor controller.", "WLCs will provide an easy-to-use web-based interface to assist clients in receiving multicast traffic.\n\nFoundation Topics" ], "answer": "B", "solution": "Multicast Direct (also called VideoStream or Media Stream) allows a WLC to take incoming multicast video streams and redirect them as unicast streams to individual recipient wireless clients. The goal is to improve the quality of video delivery over the wireless medium", "topic": [ "Implementing Multicast" ] }, { "id": "Wired Network-629", "type": 0, "question": "The OSI model has seven layers and the DoD has four. At which layer does SMTP work in both models?", "choices": [ "Network", "Transport", "Session", "Application", "Internet" ], "answer": "D", "solution": "SMTP resides at the Application layer of the OSI and DoD models", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-630", "type": 0, "question": "Alice is a new hire at Adatum Corp., and when she asks about wireless network access for her laptop, she is given a Service Set Identifier (SSID) and a WiFi Protected Access II (WPA2) passphrase. Later, in the lunchroom, when she tries to connect her laptop to the network, she cannot see the SSID she was given in the Available Networks list, although she can see other networks. What should Alice do next to try to resolve the problem?", "choices": [ "Type in the WPA2 passphrase.", "Type the SSID in manually.", "Move closer to the Wireless Access Point (WAP).", "Move away from the microwave in the lunchroom." ], "answer": "B", "solution": "It is possible that the WAP has been configured to not broadcast the network's SSID as a security measure, so Alice should first attempt to access it by typing the SSID in manually. She would not be able to type in the WPA2 passphrase until she is connecting to the SSID. Moving the laptop closer to the WAP or away from possible sources of electromagnetic interference might be solutions to the problem, but they should not be the first thing Alice tries", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-631", "type": 0, "question": "Alice is working the help desk when a user calls and reports that she is unable to connect to the Internet. Which of the following steps is the one Alice is least likely to perform first when troubleshooting the problem?", "choices": [ "Check the configuration of the router connecting the LAN to the Internet", "Ask the user if she can access resources on the local network", "Check to see if anyone else is experiencing the same problem", "Check the user's job title to see if she is an important person in the company" ], "answer": "A", "solution": "There are many possible causes for the problem that are more likely than a router configuration error, so this is not something Alice would check first. Asking if the user can access the local network attempts to isolate the problem. If she cannot, the problem could be in her computer; if she can, then the problem lies somewhere in the Internet access infrastructure. If other users are experiencing the problem, then the issue should receive a higher priority, and Alice knows that the problem does not lie in the user's computer. While it might not be the first thing she checks, it is a political reality that higher ranking users often get preferential treatment", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-632", "type": 0, "question": "A rack-mounted device that is four units tall will be approximately what height in inches?", "choices": [ "75", "5", "4", "7" ], "answer": "D", "solution": "The standard unit height for IT equipment racks is 1.75 inches, which is the equivalent of one unit. Four units would therefore be 7 inches", "topic": [ "Network Operations" ] }, { "id": "Wired Network-633", "type": 0, "question": "Which of the following Windows tools uses Internet Control Message Protocol (ICMP) messages and manipulates IPv4 time-to-live values to illustrate the route packets take through an internetwork?", "choices": [ "`ping`", "`netstat`", "`route`", "`tracert`", "`nslookup`", "`hostname`" ], "answer": "D", "solution": "The Windows `tracert` tool transmits a series of ICMP messages with incrementing Time to Live (TTL) values, which identify each router on the path that the packets take through the network. `Ping` uses ICMP, but it does not manipulate TTL values. `Netstat`, `Route`, `Nslookup`, and `Hostname` do not use ICMP messages, nor do they manipulate TTL values when performing their normal functions", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-634", "type": 0, "question": "You have multiple departments all connected to switches, with crossover cables connecting the switches together. However, response time on the network is still very slow even though you have upgraded from hubs to switches. What technology should you implement to improve response time on the networks?", "choices": [ "STP", "VLANs", "Convergence", "OSPF" ], "answer": "B", "solution": "Switches break up collision domains by default, but the network is still one large broadcast domain. In order to break up broadcast domains in a layer 2 switched network, you need to create virtual LANs", "topic": [ "Switching and Virtual LANs" ] }, { "id": "Wired Network-635", "type": 0, "question": "You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?", "choices": [ "Tone generator and probe", "Protocol analyzer", "Packet sniffer", "Wi-Fi analyzer" ], "answer": "D", "solution": "A wireless locator, or a Wi-Fi analyzer, can be either a handheld hardware device or specialized software that is installed on a laptop, smartphone, or other mobile device and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues. A tone generator and probe are used for locating a wire. Protocol analyzers and packet sniffers are tools used for capturing and analyzing network traffic", "topic": [ "Networking" ] }, { "id": "Wired Network-636", "type": 0, "question": "Improving network response time and reliability are examples of what?", "choices": [ "Organization requirements", "Organization constraints", "Technical goals", "Technical constraints" ], "answer": "C", "solution": "These are examples of technical goals", "topic": [ "Network Design Methodology" ] }, { "id": "Wired Network-637", "type": 0, "question": "An administrator has defined constructs that match traffic based on destination ports 80 and 443, allowing such traffic along with return traffic through the ports. The contract is expected to be applied to communication between a client EPG and a web EPG. How should the contract be applied to the two EPGs to allow the clients to establish communication with the web EPG?", "choices": [ "In the consumer direction on both EPGs", "In the provider direction on both EPGs", "In the provider direction on the client EPG and in the consumer direction on the web EPG", "In the consumer direction on the client EPG and in the provider direction on the web EPG" ], "answer": "D", "solution": "Where a client is requesting a service from another system, the client is a consumer of the server-side service, and the server is the provider of the service", "topic": [ "Tenant Building Blocks" ] }, { "id": "Wired Network-638", "type": 0, "question": "You need to log in to a Unix/Linux server across a network that is not secure. Which of the following protocols will allow you to remotely administer this server securely?", "choices": [ "Telnet", "SSH", "SFTP", "HTTP" ], "answer": "B", "solution": "Secure Shell (SSH) allows you to remotely administer router, switches, and even servers securely", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-639", "type": 0, "question": "Which type of topology has the greatest number of physical connections?", "choices": [ "Point-to-multipoint", "Star", "Point-to-point", "Mesh" ], "answer": "D", "solution": "In the mesh topology, there is a path from each connection to every other one in the network. A mesh topology is used mainly because of the robust fault tolerance it offers—if one connection goes on the blink, computers and other network devices can simply switch to one of the many redundant connections that are up and running", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-640", "type": 0, "question": "A user calls Alice at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Alice examines the routing table on the user's workstation and sees the following. Which of the following commands must Alice run to correct the user's problem? \n \n \n IPv4 Route Table\r\n ===========================================================================\r\n Active Routes:\r\n Network Destination Netmask Gateway Interface Metric\r\n 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331\r\n 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331\r\n 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331\r\n 192.168.2.0 255.255.255.0 On-link 192.168.2.37 281\r\n 192.168.2.37 255.255.255.255 On-link 192.168.2.37 281\r\n 192.168.2.255 255.255.255.255 On-link 192.168.2.37 281\r\n 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331\r\n 224.0.0.0 240.0.0.0 On-link 192.168.2.37 281\r\n 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331\r\n 255.255.255.255 255.255.255.255 On-link 192.168.2.37 281\r\n ===========================================================================\r\n Persistent Routes:\r\n None", "choices": [ "`route add 0.0.0.0 MASK 0.0.0.0 192.168.2.37 METRIC 25 IF 192.168.2.99`", "`route add 0.0.0.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37`", "`route add 192.168.2.0 MASK 255.255.255.0 192.168.2.99 METRIC 25 IF 192.168.2.37`", "`route add 0.0.0.0 MASK 0.0.0.0 192.168.2.99 METRIC 25 IF 192.168.2.37`" ], "answer": "D", "solution": "To access the Internet, the workstation's routing table must include a default gateway entry. To create a default gateway entry in the routing table, you use the `route add` command with a Network Destination value of 0.0.0.0, a MASK value of 0.0.0.0, and the address of a router on the local network (in this case, 192.168.2.99). The entry must also have a `METRIC` value that is lower than the other entries in the table so that it will be used first", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-641", "type": 0, "question": "Which device should be used if you need to determine whether your network meets ISO or TIA standards?", "choices": [ "Angry IP", "Certifiers", "Nmap", "Routing table" ], "answer": "B", "solution": "A certifier connects to a cable and runs a bank of tests that can verify whether it meets the standards set by organizations such as ISO or TIA", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-642", "type": 0, "question": "Alice has been instructed to create an IPv4 network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?", "choices": [ "255.255.255.128", "255.255.255.192", "255.255.255.224", "255.255.255.240", "255.255.255.248", "255.255.255.252" ], "answer": "C", "solution": "To create a network with 8 subnets and 30 hosts per subnet, Alice would have to allocate 3 of the 8 bits in the last octet for subnet identifiers. This would result in a binary value of 11100000 for the last octet in the subnet mask, which converts to a decimal value of 224", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-643", "type": 0, "question": "Which of the following types of network documentation is often overlaid on an architectural drawing or blueprint?", "choices": [ "Network map", "Network diagram", "Cable diagram", "Management information base" ], "answer": "C", "solution": "A cable diagram is a precise depiction of the cable runs installed in a site. Often drawn on an architect's floor plan or blueprint, the cable diagram enables network administrators to locate specific cables and troubleshoot connectivity problems. A network map is a depiction of network devices, not drawn to scale, with additional information added, such as IP addresses and link speeds. In most cases, network maps are automatically created by a software product, such as Nmap, that scans the network and creates a display from the information it discovers. The term _network diagram_ is most often used to refer to a manually created document containing pictograms of network devices, with lines representing the connections between them. The diagram might be roughly similar to the actual layout of the site, but it is usually not drawn to scale. A Management Information Base (MIB) is a component of a network management system that is based on the Simple Network Management Protocol (SNMP) and contains information about only one device; it does not depict all of the devices on the network", "topic": [ "Network Operations" ] }, { "id": "Wired Network-644", "type": 0, "question": "True or false: A member router contains a complete copy of the LSDBs for every area in the routing domain.", "choices": [ "True", "False" ], "answer": "B", "solution": "An OSPF member router contains only a copy of the LSDB for the areas it participates in", "topic": [ "OSPF" ] }, { "id": "Wired Network-645", "type": 0, "question": "Ralph has configured a server called NE6 to function as a web server. He does not want to change the server's existing name, but he wants it to also be accessible to clients using the name `www` . What Domain Name System (DNS) modification can Ralph make to accomplish this?", "choices": [ "Create an additional A resource record.", "Create a new CNAME resource record.", "Modify the existing A resource record.", "Create a new PTR resource record." ], "answer": "B", "solution": "A canonical name (CNAME) resource record specifies an alternative host name (or alias) for a system already registered in the DNS. By creating a CNAME record specifying the `www` name, the server can be addressed using either NE6 or www. Creating an additional A resource record will cause the server to be recognized using one name or the other, but not both. Modifying the existing A record will change the hostname. PTR resource records are used only for reverse name resolution", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-646", "type": 0, "question": "Ed has been hired by a private company to connect two remote sites with a Wide Area Network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?", "choices": [ "A standard modem-to-modem connection", "A T-3 dedicated leased line", "A cable television (CATV) connection", "An ADSL (Asymmetrical Digital Subscriber Line) connection" ], "answer": "B", "solution": "For this scenario, the best of the options given is a dedicated leased line connection. This is because the bandwidth requirements are constant, and the data transfer rates are high. To support the 40 Mbps data rate, Ed should recommend a T-3 dedicated leased line, running at 44.735 Mbps. Standard modem connections, CATV, and ADSL connections are all too slow", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-647", "type": 0, "question": "What is the advertised network for the loopback interface with IP address 10.123.4.1/30?", "choices": [ "10.123.4.1/24", "10.123.4.0/30", "10.123.4.1/32", "10.123.4.0/24" ], "answer": "C", "solution": "The loopback address is classified as an OSPF loopback interface type, which is always advertised as a /32 address, regardless of the subnet mask", "topic": [ "OSPF" ] }, { "id": "Wired Network-648", "type": 0, "question": "What type of network device helps reduce the size of a collision domain?", "choices": [ "Hub", "Switch", "Load balancer", "Router" ], "answer": "B", "solution": "A switch uses the MAC address table to limit the Layer 2 communication between only the two devices communicating with each other", "topic": [ "Packet Forwarding" ] }, { "id": "Wired Network-649", "type": 0, "question": "How many IP addresses are available for hosts in the subnet 198.10.100.64/27?", "choices": [ "14", "30", "62", "126" ], "answer": "B", "solution": "There are 5 host bits: 25 − 2 = 30 hosts", "topic": [ "Internet Protocol Version 4 (IPv4) Design" ] }, { "id": "Wired Network-650", "type": 0, "question": "Which networking device has multiple ports, each of which is its own collision domain, and examines the header of the incoming packet to determine which port the packet gets sent to?", "choices": [ "Hub", "Switch", "Bridge", "Router" ], "answer": "B", "solution": "Switches provide centralized connectivity for a LAN. Switches examine the header of incoming packets and forward each to only the port whose associated media access control (MAC) address matches the receiving MAC address in the header. Hubs are seldom used now because the entire hub is one collision domain and when a packet is received, the hub sends the packet out to all of its ports indiscriminately. Bridges are used to connect different networks to work as one, and routers are used to forward packets from one network to other networks", "topic": [ "Networking" ] }, { "id": "Wired Network-651", "type": 0, "question": "How many bits does the IEEE 802.1Q frame format use to define VLAN IDs, and what is the maximum number of VLAN IDs that can be used to segment Layer 2 traffic?", "choices": [ "12 bits and 4094 VLAN IDs", "10 bits and 1024 VLAN IDs", "11 bits and 2048 VLAN IDs", "24 bits and 8096 VLAN IDs" ], "answer": "A", "solution": "12 header bits are used in the definition of VLAN IDs. Out of the resulting 4096 VLAN IDs, 2 are reserved and cannot be used for data traffic, resulting in 4094 usable VLAN IDs", "topic": [ "Why ACI?" ] }, { "id": "Wired Network-652", "type": 0, "question": "When a client attempts to join a BSS, which one of the following frame types is sent first?", "choices": [ "Beacon", "Rate request", "Association request", "Authentication request" ], "answer": "D", "solution": "A client must first be authenticated to the BSS before it can request to be associated", "topic": [ "Understanding 802.11 Frame Types" ] }, { "id": "Wired Network-653", "type": 0, "question": "When you are creating endpoint groups in the Cisco ACI, what does this automatically create on an associated DVS?", "choices": [ "Port groups", "Access list", "VLAN", "VXLAN" ], "answer": "A", "solution": "The Virtual Machine Manager (VMM) domain profile groups VM controllers with similar networking policy requirements. For example, VM controllers can share VLAN pools and application endpoint groups (EPGs). The APIC communicates with the controller to publish network configurations such as port groups that are then applied to the virtual workloads", "topic": [ "Describe Cisco Application Centric Infrastructure" ] }, { "id": "Wired Network-654", "type": 0, "question": "Which of the following topologies is used by the majority of new Ethernet networks installed today?", "choices": [ "Bus", "Virtual ring", "Mesh", "Hierarchical star" ], "answer": "D", "solution": "Virtually all of the new Ethernet networks installed today use the star or the hierarchical star topology, with one or more switches functioning as a cabling nexus", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-655", "type": 0, "question": "What is a compact representation of the address 3f00:0000:0000:a7fb:0000:0000: b100:0023?", "choices": [ "3f::a7fb::b100:0023", "3f00::a7fb:0000:0000:b100:23", "3f::a7fb::b1:23", "3f00:0000:0000:a7fb::b1:23" ], "answer": "B", "solution": "Answers A and C are incorrect because you cannot use the double colons (::) twice. Answers C and D are also incorrect because you cannot reduce b100 to b1", "topic": [ "Internet Protocol Version 6 (IPv6) Design" ] }, { "id": "Wired Network-656", "type": 0, "question": "Which one of the following can be used to provide wireless connectivity to a nonwireless device?", "choices": [ "Wireless repeater", "Workgroup bridge", "Transparent bridge", "Adaptive bridge" ], "answer": "B", "solution": "A workgroup bridge acts as a wireless client, but bridges traffic to and from a wired device connected to it", "topic": [ "Fundamentals of Wireless Networks" ] }, { "id": "Wired Network-657", "type": 0, "question": "All the APs on the second floor of a building are part of a single ESS. Each AP has been configured with a transmit power level of 14 dBm. In addition, each AP has been configured to use a non-overlapping channel that is different from its adjacent neighbors. All APs have been configured to offer only the 24-, 36-, 48-, and 54-Mbps data rates; all other rates are disabled. One day, one of the APs fails and someone replaces it. Afterward, users begin to call and complain about poor performance and roaming. You discover that the problems are not occurring in the area covered by the replacement AP; instead, they are occurring about two APs away from it. Which one of the following could be causing the problem?", "choices": [ "The replacement AP has its radios disabled.", "The replacement AP is using a transmit level of 1 dBm.", "The replacement AP is using the 1- and 2-Mbps data rates.", "The replacement AP is new and cannot be causing the problem." ], "answer": "C", "solution": "If the problem is occurring some distance away from the replacement AP, the replacement AP must be working correctly within its immediate area. If the replacement had a 1-dBm transmit power, it could not be causing any interference at a great distance away. The problem is likely occurring because the lowest data rates have been enabled on the AP. The lower rates effectively extend the replacement AP’s cell size into the cells of other APs farther away. If the channels are identical, the replacement could be causing co-channel interference in other cells, degrading client performance and roaming", "topic": [ "Planning Coverage with Wireless APs" ] }, { "id": "Wired Network-658", "type": 0, "question": "Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2?", "choices": [ "Inserts a 4-byte header and does change the MAC addresses", "Inserts a 4-byte header and does not change the MAC addresses", "Encapsulates the original frame behind an entirely new Ethernet header", "None of the other answers are correct" ], "answer": "B", "solution": "802.1Q defines a 4-byte header, inserted after the original frame’s destination and source MAC address fields. The insertion of this header does not change the original frame’s source or destination address. The header itself holds a 12-bit VLAN ID field, which identifies the VLAN associated with the frame", "topic": [ "Implementing Ethernet Virtual LANs" ] }, { "id": "Wired Network-659", "type": 0, "question": "Which utility can you use to find the MAC and TCP/IP addresses of your Windows workstation?", "choices": [ "`ping`", "`ipconfig`", "`ipconfig /all`", "`tracert`", "`telnet`" ], "answer": "C", "solution": "The `ipconfig /all` utility will display the current configuration of TCP/IP on a given workstation—including the current IP address, DNS configuration, WINS configuration, and default gateway", "topic": [ "Network Software Tools and Commands" ] }, { "id": "Wired Network-660", "type": 0, "question": "What is a key requirement to enable split tunneling on a FlexConnect AP?", "choices": [ "The centrally switched WLAN must have the locally switched option selected.", "NAT/PAT must be configured to allow centrally switched traffic to access the local VLAN.", "An ACL must be used for split tunneling to take effect.", "Split tunneling must be configured at the FlexConnect group level." ], "answer": "C", "solution": "An ACL is required to identify which centrally switched traffic should have access to the local LAN. Answer A is incorrect because this changes the behavior of the centrally switched WLAN to be locally switched. Answer B is incorrect because NAT/PAT is automatically enabled by the split tunneling feature. Answer D is incorrect because split tunneling may be configured at either the AP or the FlexConnect group level", "topic": [ "Implementing FlexConnect" ] }, { "id": "Wired Network-661", "type": 0, "question": "In which module would you place Cisco Unified Communications Manager (CUCM)?", "choices": [ "Campus core", "E-commerce", "Server farm", "Edge distribution farm" ], "answer": "C", "solution": "The server farm hosts campus servers, including Cisco CallManager servers", "topic": [ "Network Design Models" ] }, { "id": "Wired Network-662", "type": 0, "question": "Which of the following statements about web server logs is not true?", "choices": [ "To analyze web server activity, you typically use an application that interprets the web server log files.", "Web server logs are typically maintained as text files.", "Web server logs record the IP addresses of all visiting users.", "To interpret web server logs, you use a protocol analyzer." ], "answer": "D", "solution": "A protocol analyzer provides information about network traffic; it does not interpret web server logs. Most web servers maintain logs that track the Internet Protocol (IP) addresses and other information about all hits and visits. The logs are stored as text files and contain a great deal of information, but in their raw form, they are difficult to interpret. Therefore, it is common practice to use a traffic analysis application that reads the log files and displays their contents in a more user-friendly form, such as tables and graphs", "topic": [ "Network Operations" ] }, { "id": "Wired Network-663", "type": 0, "question": "Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.240.0?", "choices": [ "0.0.0.0", "0.0.0.31", "0.0.0.240", "0.0.0.255", "0.0.15.255", "0.0.248.255" ], "answer": "E", "solution": "0.0.15.255 matches all packets with the same first 20 bits. This is useful when you want to match a subnet in which the subnet part comprises the first 20 bits, as in this case", "topic": [ "Basic IPv4 Access Control Lists" ] }, { "id": "Wired Network-664", "type": 0, "question": "Which of the following syslog message severity levels indicates a call for immediate action?", "choices": [ "0", "1", "2", "3", "4" ], "answer": "B", "solution": "Every syslog message includes a single-digit severity code. Severity code 1 is an alert message, indicating that immediate action is needed. Code 0 is the most severe, indicating an emergency that has rendered the system unusable. Severity code 2 is a critical condition message, and code 3 is an error condition. Code 4 is a warning message", "topic": [ "Network Operations" ] }, { "id": "Wired Network-665", "type": 0, "question": "What type of connection are you using if you use a USB cable to connect your laptop to your cell phone in order to use the cellular wireless connection from the laptop?", "choices": [ "Hotspot", "Tethering", "USB networking", "Phoning" ], "answer": "B", "solution": "Tethering is connecting a device to a mobile hotspot. The term used to be reserved only for when you were connected via USB cable, as opposed to connecting via wireless. Some devices will not function as a mobile hotspot but will allow you to tether a mobile device to it with a USB cable so that the mobile device can share the cellular Internet connection", "topic": [ "Mobile Devices" ] }, { "id": "Wired Network-666", "type": 0, "question": "Your junior IT administrator has identified a port on your Cisco switch that is changing between up and down repeatedly. What have they observed?", "choices": [ "Port flapping", "Port toggling", "Port flashing", "Port flagging" ], "answer": "A", "solution": "This is known as port flapping, also known as link flapping. It can be caused by a faulty or nonstandard network cable, non–Energy Efficient Ethernet (EEE) devices, or small form-factor pluggable (SFP) devices that are not working or synchronizing properly", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-667", "type": 0, "question": "Model-driven telemetry is a new concept for network monitoring in which data is streamed from network devices continuously to subscribers using a push model via which protocol?", "choices": [ "NETCONF", "RESTCONF", "XML", "HTML" ], "answer": "A", "solution": "Model-driven telemetry is a new concept for network monitoring in which data is streamed from network devices continuously to subscribers using NETCONF", "topic": [ "Automation" ] }, { "id": "Wired Network-668", "type": 0, "question": "Which of the following is the true definition of the term _modem_?", "choices": [ "A device that connects a computer to the Public Switched Telephone Network (PSTN)", "A device that connects a Local Area Network (LAN) to the Internet", "A device that converts analog signals to digital signals and back again", "A device that connects a Local Area Network (LAN) to a Wide Area Network (WAN)" ], "answer": "C", "solution": "A modem (modulator/demodulator) is any device that converts analog signals to digital signals and digital signals back to analog signals. The digital device does not have to be a computer, and the analog device does not have to be the PSTN. There are many devices that are incorrectly referred to as modems, such as devices that connect a digital LAN to a digital WAN or all-digital devices that connect computers to the Internet", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-669", "type": 0, "question": "The Cisco Secure Architectural Framework is known as ______.", "choices": [ "Cisco SEAF", "Cisco Secure Malware Analytics", "Cisco SAFE", "Cisco Validated Designs" ], "answer": "C", "solution": "Cisco SAFE is the Cisco security architectural framework", "topic": [ "Secure Network Access Control" ] }, { "id": "Wired Network-670", "type": 0, "question": "A network load balancing cluster is made up of multiple computers that function as a single entity. Which of the following terms is used to describe an individual computer in a load balancing cluster?", "choices": [ "Node", "Host", "Server", "Box" ], "answer": "B", "solution": "In a network load balancing cluster, each computer is referred to as a host. Other types of clusters use other terms. For example, in a failover cluster, each computer is called a node. The terms _server_ and _box_ are not used in clustering", "topic": [ "Network Operations" ] }, { "id": "Wired Network-671", "type": 0, "question": "A user is unable to access the network and is getting an error message that a duplicate IP exists on the system. You are confused because you have a DHCP server. What do you need to do next?", "choices": [ "Manually configure the IP address.", "Ensure that this computer is set to obtain an IP address automatically.", "Ping the IP address from another computer to find out the name of the duplicate computer.", "At a command prompt, enter `ipconfig /release`, then `ipconfig /renew`." ], "answer": "B", "solution": "Every device on a network must have a unique IP address. Many networks use a DHCP server to assign IP addresses because keeping track of them manually would create a great deal of work. If there are two identical IP addresses attempting to access a network with DHCP, then at least one of them has its IP address configured manually. Ensuring that this computer is set to obtain an IP address automatically should be your first step. If it isn't, then you have found the problem. If it is, then you could ping the IP address using `ping -a _ipaddress_`, substituting the duplicated IP address for the variable `_ipaddress_` in the command. This will return the hostname of the other computer. Every network admin should have a list of computer names and where they are located. You could then ensure that the other computer is also set to obtain an IP address automatically. Manually configuring an IP address is what caused the problem. The `ipconfig /release` and `ipconfig /renew` commands wouldn't help in this situation", "topic": [ "Software Troubleshooting" ] }, { "id": "Wired Network-672", "type": 0, "question": "Which IP address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)?", "choices": [ "Manual", "Dynamic", "Stable", "Automatic" ], "answer": "C", "solution": "Stable is not a DHCP allocation method. DHCP supports three allocation methods: manual, dynamic, and automatic", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-673", "type": 0, "question": "What occurs when you create an IPv4 static route with an Ethernet interface designated instead of a next-hop IP address?", "choices": [ "The router uses ARP to get the MAC address of the directly connected router’s IP address.", "The router forwards the packet with the destination MAC address FFFF:FFFF:FFFF.", "The router uses ARP to get the MAC address of the IP address in the source of the packet.", "The router uses ARP to get the MAC address of the IP address in the destination of the packet." ], "answer": "D", "solution": "The router uses ARP to get the MAC address of the IP address in the destination of the packet when you create an IPv4 static route with an Ethernet interface designated instead of a next-hop IP address", "topic": [ "IPv4/IPv6 Addressing and Routing Review" ] }, { "id": "Wired Network-674", "type": 0, "question": "True or false: The configuration of a managed node connectivity group is mandatory when using dynamic IP addressing.", "choices": [ "True", "False" ], "answer": "A", "solution": "Managed node connectivity groups are constructs that map IP address pools to management EPGs. Therefore, the configuration of at least one managed node connectivity group is mandatory when using dynamic IP addressing", "topic": [ "Implementing Management" ] }, { "id": "Wired Network-675", "type": 0, "question": "Which of the following is a feature included in some routers that collects and analyzes network traffic data sent or received through a network interface?", "choices": [ "Netmon", "Netflow", "Netstat", "Nbtstat" ], "answer": "B", "solution": "Netflow is a network traffic monitoring feature first introduced in Cisco routers in 1996. Netmon, Netstat, and Nbtstat are all operating system utilities, not router features", "topic": [ "Network Operations" ] }, { "id": "Wired Network-676", "type": 0, "question": "All of the ports on a root bridge are assigned what role?", "choices": [ "Root port", "Designated port", "Superior port", "Master port" ], "answer": "B", "solution": "All of the ports on a root bridge are assigned the designated port role (forwarding)", "topic": [ "Spanning Tree Protocol" ] }, { "id": "Wired Network-677", "type": 0, "question": "Which of the following statements about SIP registration to the Cisco Expressway is true?", "choices": [ "Alias and SIP server settings must be manually configured on the endpoint first.", "SIP settings can be provisioned to the endpoint using TFTP.", "CDP is required for SIP registration to the Expressway.", "DHCP is required for SIP registration to the Expressway." ], "answer": "A", "solution": "The SIP URI and Expressway IP address are typically configured locally on the endpoint. These configurations can also be provisioned through Cisco Telepresence Management Suite (TMS), but TFTP is not supported as it is on the Unified CM. Once these settings have been configured, the final step in the process is for the endpoint to register to the Cisco Expressway", "topic": [ "Introduction to the Cisco Expressway Solution" ] }, { "id": "Wired Network-678", "type": 0, "question": "What happens to a route that does not match the PrefixRFC1918 prefix list when using the following route map?\n \n \n route-map QUESTION deny 10\r\n match ip address prefix-list PrefixRFC1918\r\n route-map QUESTION permit 20\r\n set metric 200", "choices": [ "The route is allowed, and the metric is set to 200.", "The route is denied.", "The route is allowed.", "The route is allowed, and the default metric is set to 100." ], "answer": "A", "solution": "Because the route does not match the prefix list, sequence 10 does not apply, and the route moves on to sequence 20, which sets the metric to 200. It is implied that the route proceeds because it was modified", "topic": [ "Route Maps and Conditional Forwarding" ] }, { "id": "Wired Network-679", "type": 0, "question": "By default, when CUBE receives a SIP packet from an untrusted source, what action is taken?", "choices": [ "CUBE sends a 403 Forbidden.", "CUBE trusts all IP addresses and routes the call.", "CUBE drops the packet.", "CUBE sends a 503 Service Unavailable." ], "answer": "C", "solution": "CUBE performs a silent discard and drops the packet", "topic": [ "CUBE Interworking Features" ] }, { "id": "Wired Network-680", "type": 0, "question": "Your corporate office has sent a memo that all remote offices must use a security protocol that your WAP doesn't support. What should you do first?", "choices": [ "Update the WAP's firmware.", "Replace the WAP.", "Buy all new devices.", "Keep using the old security protocol." ], "answer": "A", "solution": "Your first step is to see if a firmware update to the WAP will provide the new security protocol that you need. You'll want to try updating the devices' firmware or software as well. During transition times, WAPs will often have a transitional security setting that will support both the older and the new devices until you can get everything updated. If you can't update your old WAP, the next step would be to look for a new WAP to use during your transition", "topic": [ "Hardware and Network Troubleshooting" ] }, { "id": "Wired Network-681", "type": 0, "question": "You need to set up a temporary operating system environment to quickly test a piece of software your manager wants to install on the network. Which should you use?", "choices": [ "AAA server", "Sandbox", "SCADA", "Application virtualization" ], "answer": "B", "solution": "A sandbox is a temporary operating system environment, kind of like a “lite” version of a virtual machine. It’s ideal for testing software such as this. An AAA server is for authentication, authorization, and accounting of security. SCADA is a legacy hardware and/or software environment used to control industrial systems. Application virtualization is used for legacy apps or cross‐platform virtualization", "topic": [ "Network Services, Virtualization, and Cloud Computing" ] }, { "id": "Wired Network-682", "type": 0, "question": "On the ASA, which of the following is _not_ a method of assigning IP addresses to AnyConnect clients?", "choices": [ "Using a DHCP server", "Using a local address pool", "Using a RADIUS server", "Manually" ], "answer": "D", "solution": "AnyConnect clients may not be assigned IP addresses manually. IP addresses must be assigned via a local address pool, RADIUS server, or DHCP server", "topic": [ "AnyConnect VPNs on the ASA and IOS" ] }, { "id": "Wired Network-683", "type": 0, "question": "Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?", "choices": [ "WINS Server Addresses", "Default Gateway", "DNS Server Addresses", "Subnet Gateway" ], "answer": "B", "solution": "The Default Gateway parameter specifies the address of the local router that the end system should use to access other networks. The WINS Server Addresses and DNS Server Addresses parameters are used to resolve names to IP addresses. There is no such parameter as Subnet Gateway", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-684", "type": 0, "question": "A screened subnet is a segment that is exposed to the Internet and separated from the internal network by a firewall. Administrators typically use a screened subnet for servers that must be accessible by outside users, such as web and email servers. Which of the following is another term for a screened subnet?", "choices": [ "PEAP", "DMZ", "VLAN", "TKIP" ], "answer": "B", "solution": "Another term for a screened subnet is a DMZ, or demilitarized zone. They are also known as perimeter networks. A Virtual Local Area Network (VLAN) is a logical network segment created within a switch. Protected Extensible Authentication Protocol (PEAP) is an authentication protocol, and Temporal Key Integrity Protocol (TKIP) is an encryption algorithm. These three options are not terms for a screened subnet", "topic": [] }, { "id": "Wired Network-685", "type": 0, "question": "Which one of the following is the frame type sent to discover APs within the signal range of a wireless client?", "choices": [ "Scan", "Probe", "Beacon", "Discovery" ], "answer": "B", "solution": "A probe request frame is sent to ask any listening APs to identify themselves", "topic": [ "Understanding 802.11 Frame Types" ] }, { "id": "Wired Network-686", "type": 0, "question": "Delays in the transmission of data packets over a network can result in temporary service interruptions, dropouts, or even data loss. Which of the following terms is used to describe these delays?", "choices": [ "Crosstalk", "Electromagnetic interference (EMI)", "Jitter", "Attenuation" ], "answer": "C", "solution": "Jitter is defined as delays in the transmission of individual network packets. For audio or video transmissions, jitter can result in dropped words or frames. For data file transmissions, jitter can require retransmission of packets", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-687", "type": 0, "question": "An 802.11 transmitter is configured to send a signal on channel 11. Someone reports a problem receiving the signal, so you investigate and find a second transmitter broadcasting on channel 11. Which one of the following best describes the problem?", "choices": [ "Path interference", "Adjacent channel interference", "Co-channel interference", "Cross-channel interference" ], "answer": "C", "solution": "Because both transmitters are using the same channel, the interference is described as co-channel", "topic": [ "RF Signals in the Real World" ] }, { "id": "Wired Network-688", "type": 0, "question": "Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?", "choices": [ "Synchronization", "Initialization exchange", "Connection establishment", "Three-way handshake" ], "answer": "D", "solution": "Two systems establishing a TCP connection exchange three messages before they begin transmitting data. The exchange of these synchronization messages is referred to as a three-way handshake. The other terms listed are not formally used to describe this exchange", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-689", "type": 0, "question": "Suppose that you search for a wireless client on a controller and notice that it is associated. Which one of the following parameters would confirm that the client has completed the association process with the controller and is ready to pass data?", "choices": [ "Client’s IP address", "AP name and IP address", "Associated AP status", "RUN policy manager state" ], "answer": "D", "solution": "From the controller’s perspective, a client must go through a sequence of state changes before it can be fully associated and joined to the network. Only when a client is in the RUN state is it fully operational", "topic": [ "Troubleshooting WLAN Connectivity" ] }, { "id": "Wired Network-690", "type": 0, "question": "You are troubleshooting an Internet connectivity issue. Several laptop users cannot connect to any websites. Users with desktop PCs do not have any trouble. Which of the following is most likely causing the problem?", "choices": [ "Router", "Cable modem", "WAP", "Encryption", "Firewall", "UTM", "IPv6 link-local address" ], "answer": "C", "solution": "**Explanation:** The wireless access point is most likely the problem. Perhaps it was turned off or disabled or lost its connection to the network. This WAP failure causes the laptops to fail when attempting to connect to websites; furthermore, the laptops won’t have any Internet connection whatsoever. There are a lot of reasons a client computer may not be able to connect to a WAP, but if several wireless clients cannot make the connection, you can usually assume that the problem is not at the client side and instead is at the central connecting device—in this case the WAP. Laptops often connect wirelessly because they are mobile devices, whereas PCs often connect in a wired fashion because they are stationary and don’t necessarily need a wireless connection.\n\n **Incorrect answers:** If the PCs can connect to the Internet fine (as the question states), you can probably rule out the router, cable modem, firewall, and UTM device—unless, of course, one of the devices was configured with some kind of rule stating that the laptops can’t connect to websites. This is unlikely, but it is a possibility if the network has a firewall or UTM. UTM stands for unified threat management; UTM devices combine the functionality of firewalls, intrusion detection systems (IDSs), and proxy servers, among other things. UTMs and next-generation firewalls (NGFWs) are designed to integrate a variety of threat defenses into one device", "topic": [] }, { "id": "Wired Network-691", "type": 0, "question": "Which one of the following is the best type of wireless LAN survey to perform for a new building that is under construction, where APs have not yet been deployed?", "choices": [ "Predictive survey", "Passive survey", "Active survey", "Performance survey" ], "answer": "A", "solution": "If the building is under construction, the walls have probably not been built yet. Therefore, it doesn’t make sense to try a passive or active site survey because there are no APs to measure and no final building materials to affect the RF signals. Instead, a predictive survey is used to calculate AP locations and RF coverage over a virtual area before APs have been deployed", "topic": [ "Planning Coverage with Wireless APs" ] }, { "id": "Wired Network-692", "type": 0, "question": "Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?", "choices": [ "Digital Subscriber Line (DSL)", "Metro-optical", "Satellite", "Cable" ], "answer": "B", "solution": "DWDM has become a popular technology in the construction of metro-optical networks because it addresses some of the scalability and cost restrictions of other optical technologies, such as Synchronous Optical Networks (SONETs). DSL, satellite, and cable providers do not typically use DWDM", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-693", "type": 0, "question": "The Simple Network Management Protocol (SNMP) works by processing information gathered from agents installed or embedded in network devices and displaying the information on a central console. Which of the following is the term used for the database in which SNMP agents store information about their properties?", "choices": [ "MIB", "Trap", "Syslog", "SIEM" ], "answer": "A", "solution": "A Management Information Base (MIB) is the database on an SNMP agent in which ASN.1 information about the properties of the managed device is stored. The other three options do not perform this function. A trap is an alert message that SNMP agents send to the network management console when an exceptional event occurs. Syslog is a standard for message logging components. Security Information and Event Management (SIEM) is a combination tool that uses information gathered from logs and network devices to provide a real-time analysis of the network's security condition", "topic": [] }, { "id": "Wired Network-694", "type": 0, "question": "Which OSI layer is responsible for establishing an end-to-end connection between the sender and the receiver?", "choices": [ "Network layer", "Transport layer", "Session layer", "Presentation layer" ], "answer": "B", "solution": "The transport layer, as the name suggests, is responsible for end-to-end transport of data from the source to the destination of the data traffic. Connection-oriented protocols at the transport layer establish an end-to-end connection between the sender and the receiver, keep track of all the segments that are being transmitted, and have a retransmission mechanism in place", "topic": [ "Network Fundamentals" ] }, { "id": "Wired Network-695", "type": 0, "question": "Which of the following types of patch cables is used to connect a computer to a wall plate?", "choices": [ "Straight through", "Crossover", "Rollover", "Plenum" ], "answer": "A", "solution": "A straight through cable is the standard network patch cable used to connect a computer to a wall plate. A crossover cable is designed to connect two network adapters directly. A rollover cable is used to enable a terminal to communicate with a router or switch through the device's console port. A plenum cable is a type of cable intended for use within air spaces that has an outer sheath that does not produce toxic fumes when it burns", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-696", "type": 0, "question": "Enabling root guard on a switch port does what?", "choices": [ "Upon receipt of an inferior BPDU, the port is shut down.", "Upon receipt of a superior BPDU, the port is placed into a root inconsistent state.", "Upon receipt of an inferior BPDU, the BPDU is filtered.", "When the root port is shut down, only authorized designated ports can become root ports." ], "answer": "B", "solution": "Root guard ensures that the designated port does not transition into a root port by placing the port in a root inconsistent state for any VLANs that is received a superior BPDU on", "topic": [ "Advanced STP Tuning" ] }, { "id": "Wired Network-697", "type": 0, "question": "Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?", "choices": [ "Automatic", "Dynamic", "Manual", "Static" ], "answer": "B", "solution": "Dynamic allocation enables a Dynamic Host Configuration Protocol (DHCP) server to lease IP addresses to clients for a specific time interval. When the lease period expires, the client can renew it, if it is still using the address. If the address is no longer in use when the lease expires, it is returned to the scope of available leases for reallocation. Automatic allocation permanently assigns an IP address from the scope to a client. Manual and static allocation are two terms that describe the allocation of a specific IP address to a specific client", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-698", "type": 0, "question": "True or false: The OSPF process ID must match for routers to establish a neighbor adjacency.", "choices": [ "True", "False" ], "answer": "B", "solution": "False. The OSPF process ID is locally significant and is not required to match for neighbor adjacency", "topic": [ "OSPF" ] }, { "id": "Wired Network-699", "type": 0, "question": "An electrician installing a new light fixture accidentally severs one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?", "choices": [ "Bus", "Star", "Logical ring", "Mesh" ], "answer": "A", "solution": "A cable break in a bus topology would split the network into two halves, preventing the nodes on one side of the break from communicating with those on the other. In addition, both halves of the network would be left with one unterminated end, which would prevent the computers on each side of the break from communicating effectively. A cable break in a star or logical ring topology would only interrupt the connection of a single computer to the network. The mesh topology is not often used for LANs, but redundant network connections are a characteristic of mesh networks, which means that a single cable break would have no effect on the network", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-700", "type": 0, "question": "Which of the following tools can test a port on a device?", "choices": [ "Cable certifier", "Loopback plug", "Butt set", "Toner probe" ], "answer": "B", "solution": "By using a loopback plug, you can connect the transmit signals to the receiver and test the condition of the connected port", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-701", "type": 0, "question": "Alice is a consultant who has been hired to move a client's old 20-node coaxial Ethernet network to a new location. She disassembles all of the network cabling and other components and packs them for shipping. At the new site, she sets up all of the computers, plugs a T-connector into each network adapter, and connects the cables, running them from one computer to the next to form the bus. When Alice is finished, she starts the computers and tests their network connectivity. She finds that 12 consecutive computers can communicate with each other, and the other 8 can communicate with each other, but the 12 cannot communicate with the 8. She makes sure that all of the connectors are securely tightened, especially the ones on the 12th computer, but the problem persists. Which of the following is the most likely cause of the difficulty?", "choices": [ "Alice has forgotten to terminate the computers at each end of the bus.", "One of the connectors on the 12th computer has a bent pin.", "Alice has forgotten to ground the network.", "The transmit and receive pins are reversed on the 12th computer." ], "answer": "B", "solution": "A bent pin on one of the 12th computer's connections would cause a break in the bus, essentially forming two networks that operate independently. The failure to terminate or ground the network would not produce this type of fault. Reversing the transmit and receive pins is not possible on a coaxial connection, due to the architecture of the cable", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-702", "type": 0, "question": "Which one of the following is the primary cause of free space path loss?", "choices": [ "Spreading", "Absorption", "Humidity levels", "Magnetic field decay" ], "answer": "A", "solution": "Energy traveling in an electromagnetic wave spreads in three dimensions, weakening the signal strength over a distance", "topic": [ "Wireless Signals and Modulation" ] }, { "id": "Wired Network-703", "type": 0, "question": "Which of the following protocols can use TCP and UDP, permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices?", "choices": [ "DNS", "SNMP", "SMTP", "TCP" ], "answer": "B", "solution": "Simple Network Management Protocol is typically implemented using version 3, which allows for a connection-oriented service, authentication and secure polling of network devices, and alerts and reports on network devices", "topic": [ "Introduction to the Internet Protocol" ] }, { "id": "Wired Network-704", "type": 0, "question": "Which types of network environments was SD-Access designed for?", "choices": [ "Data center", "Internet", "Enterprise campus and branch", "Service provider", "WAN", "Private cloud" ], "answer": "C", "solution": "Cisco SD-Access was designed for enterprise campus and branch network environments and not for other types of network environments, such as data center, service provider, and WAN environments", "topic": [ "Fabric Technologies" ] }, { "id": "Wired Network-705", "type": 0, "question": "Your manager wants you to install a networked Internet appliance that prevents network traffic–based attacks and includes antimalware and antispam software. What should you install?", "choices": [ "Spam gateway", "Load balancer", "UTM", "Proxy server" ], "answer": "C", "solution": "It sounds like the manager wants a unified threat management (UTM) device. They are designed to be one‐stop network protection devices. Spam gateways help with spam email but not with other malware. A load balancer spreads work around to multiple servers. A proxy server fulfills requests for clients", "topic": [ "Network Services, Virtualization, and Cloud Computing" ] }, { "id": "Wired Network-706", "type": 0, "question": "Cisco Identity Services Engine (ISE) is:", "choices": [ "A sports medicine approach to heal swollen and aching muscles", "A network management platform", "A network security and policy platform", "A unified computing system that incorporates virtualization of endpoints" ], "answer": "C", "solution": "**Explanation:** Cisco Identity Services Engine (ISE) is a network security and policy platform. Using Cisco ISE, a network administrator can maintain and serve security policy to all network devices from a central location", "topic": [ "Cisco Identity Services Engine Architecture" ] }, { "id": "Wired Network-707", "type": 0, "question": "You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the APs?", "choices": [ "Authentication", "Encryption", "Channel overlap", "AP configuration" ], "answer": "C", "solution": "If you have a large area to cover with wireless, you need to be concerned with channel overlap", "topic": [ "Wireless Networking" ] }, { "id": "Wired Network-708", "type": 0, "question": "True or false: Enabling OSPF authentication for an area consists of setting the OSFP authentication type under the OSPF process and placing the password on all area interfaces.", "choices": [ "True", "False" ], "answer": "A", "solution": "You can enable OSPF authentication on all interfaces for an area by configuring the area authentication in the OSPF process and then configuring the password for an interface under each member interface", "topic": [ "OSPF" ] }, { "id": "Wired Network-709", "type": 0, "question": "Which of the following IPv6 addresses is automatically assigned by the host when it boots and is only usable on the broadcast domain that it exists in?", "choices": [ "`2000::/3`", "`FC00::/7`", "`FE80::/10`", "`FF00::/8`" ], "answer": "C", "solution": "An IPv6 address in the `FE80::/10` range is called a link-local address and is similar to an IPv4 automatic private IP addressing (APIPA) address. (The `169.254.0.0/16` range in IPv4 is the APIPA range, used for automatic configuration if the host can't locate a Dynamic Host Configuration Protocol [DHCP] server.) Link-local addresses are generated by the PC when it boots up. Packets using a link-local address cannot be forwarded by a router", "topic": [ "Networking" ] }, { "id": "Wired Network-710", "type": 0, "question": "What network management protocol defined by the IETF supports running, candidate, and startup configuration data stores?", "choices": [ "NETCONF", "JSON", "RESTCONF", "SSH" ], "answer": "A", "solution": "NETCONF is defined by the IETF and supports running, candidate, and startup configuration data stores", "topic": [ "Automation" ] }, { "id": "Wired Network-711", "type": 0, "question": "Which IPv6 OSPFv3 LSA is used to describe prefixes outside an area but that are still within the OSPF routing domain?", "choices": [ "Router link states", "Net link states", "Inter-area prefix link states", "Type 5 AS external link states" ], "answer": "C", "solution": "Inter-area prefix link states describe prefixes outside an area but that are still within the OSPF routing domain", "topic": [ "Troubleshooting OSPFv3" ] }, { "id": "Wired Network-712", "type": 0, "question": "You just purchased a network-enabled multifunction device. Which one of the following connection types are likely not built into it?", "choices": [ "Bluetooth", "Wi-Fi", "Ethernet", "RFID" ], "answer": "D", "solution": "Most modern network-enabled multifunction devices will have Bluetooth, Wi-Fi, and Ethernet connections. They may also have AirPrint support for Apple devices. They are not likely to have RFID as a connection type, although they may have an RFID reader for secure print job authentication", "topic": [ "Hardware" ] }, { "id": "Wired Network-713", "type": 0, "question": "What is the effective total throughput increase with a full-duplex connection?", "choices": [ "None", "Twice as much", "Four times as much", "Ten times as much" ], "answer": "B", "solution": "Double up! You can get 20 Mbps with a 10 Mbps Ethernet running full-duplex or 200 Mbps for Fast Ethernet", "topic": [ "The Current Ethernet Specifications" ] }, { "id": "Wired Network-714", "type": 0, "question": "Users on Ed's 802.11n wireless network are dropping their connections intermittently. Which of the following might help to resolve the problem?", "choices": [ "Restart the Wireless Access Point (WAP)", "Change the network's Service Set Identifier (SSID)", "Change the channel the devices are using", "Change the wireless security protocol" ], "answer": "C", "solution": "If the users are losing their connections due to interference from other types of devices, changing the channel alters the frequency the network uses and can enable it to avoid the interference. The other options are not likely to affect any condition that would cause users to drop their connections", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-715", "type": 0, "question": "Which of the following terms refers to a routing protocol that relies on hop counts to measure the efficiency of routes through an internetwork?", "choices": [ "Link state protocol", "Distance vector protocol", "Edge gateway protocol", "Interior gateway protocol" ], "answer": "B", "solution": "Distance vector protocols rely on hop counts—that is, the number of routers between a source and a destination—to evaluate the efficiency of routes. Link state protocols use a different type of calculation, usually based on Dijkstra's algorithm. The terms _interior gateway protocol_ and _edge gateway protocol_ do not refer to the method of calculating routing efficiency", "topic": [] }, { "id": "Wired Network-716", "type": 0, "question": "Which one of the following runs the DCA algorithm?", "choices": [ "RF group leader", "Master controller", "Each controller", "NCS or Cisco Prime Infrastructure" ], "answer": "A", "solution": "TPC and DCA are RRM algorithms that run on a per-RF group basis. Therefore, the RF group leader runs the algorithms", "topic": [ "Understanding RRM" ] }, { "id": "Wired Network-717", "type": 0, "question": "Which of the following devices can also be described as a multiport repeater?", "choices": [ "Hub", "Bridge", "Switch", "Router" ], "answer": "A", "solution": "A repeater is a physical layer device that regenerates incoming signals and retransmits them. A hub is a type of repeater that receives data through any one of its multiple ports and retransmits the data out through all of its other ports. Bridges and switches are data link layer devices, and routers are network layer devices. None of these three can be described as multiport repeaters", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-718", "type": 0, "question": "Which of the following designs would suit customers with a basic level of routing expertise?", "choices": [ "VLAN + 802.1Q + VRF", "VLANs + VRFs + GRE tunnels", "VLANs + VRFs + mGRE tunnels", "MPLS with MP-BGP" ], "answer": "A", "solution": "Explanation: The design option that requires the least level of routing expertise is VLANs + 802.1Q + VRFs", "topic": [ "Scalable Enterprise Campus Architecture Design" ] }, { "id": "Wired Network-719", "type": 0, "question": "What tool would you use to both find a break in a fiber-optic connection and test the fiber connectivity on the network?", "choices": [ "Multimeter", "OTDR", "Butt set", "Toner probe" ], "answer": "B", "solution": "An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to give you the skinny on optical fibers. It works by putting out a series of optical pulses into the specific fiber you want to test and can tell you if a break in the fiber has occurred and where", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-720", "type": 0, "question": "Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?", "choices": [ "TLS://", "HTTPS://", "HTTP://", "HTLS://" ], "answer": "B", "solution": "No matter what protocol is used to encrypt a website, you must use the HTTPS:// prefix to access it. HTTP:// is for unencrypted sites, and TLS:// and HTLS:// are nonexistent prefixes", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-721", "type": 0, "question": "What protocol number does OSPFv3 use for its inter-router communication?", "choices": [ "87", "88", "89", "90" ], "answer": "C", "solution": "The IANA has reserved protocol 89 for OSPF", "topic": [ "OSPFv3" ] }, { "id": "Wired Network-722", "type": 0, "question": "What is the variation in delay?", "choices": [ "Jitter", "Bandwidth variance", "Latency", "Egress latency" ], "answer": "A", "solution": "When data arrives with delays that increase and decrease, there is jitter along the transmission path. This is very detrimental to jitter-sensitive applications such as voice and video", "topic": [ "Ensuring Network Availability" ] }, { "id": "Wired Network-723", "type": 0, "question": "What is the main reason SD-Access uses VXLAN data encapsulation instead of LISP data encapsulation?", "choices": [ "VXLAN supports IPv6.", "VXLAN supports Layer 2 networks.", "VXLAN has a much smaller header.", "VXLAN has a better ring to it." ], "answer": "B", "solution": "Although LISP is the control plane for the SD-Access fabric, it does not use LISP data encapsulation for the data plane; instead, it uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header, and this allows SD-Access to support Layer 2 and Layer 3 overlays", "topic": [ "Fabric Technologies" ] }, { "id": "Wired Network-724", "type": 0, "question": "Which of the following was a short-term solution to the IPv4 address exhaustion problem?", "choices": [ "IP version 6", "IP version 5", "NAT/PAT", "ARP" ], "answer": "C", "solution": "NAT, specifically the PAT feature that allows many hosts to use private IPv4 addresses while being supported by a single public IPv4 address, was one short-term solution to the IPv4 address exhaustion problem. IP version 5 existed briefly as an experimental protocol and had nothing to do with IPv4 address exhaustion. IPv6 directly addresses the IPv4 address exhaustion problem, but it is a long-term solution. ARP has no impact on the number of IPv4 addresses used", "topic": [ "Fundamentals of IP Version 6" ] }, { "id": "Wired Network-725", "type": 0, "question": "Suppose that an AP is configured to offer the following data rates to its clients: 2, 5.5, 6, 9, 11, 12, 18, 24, 36, and 48 Mbps. Which one of the following strategies should be used to reduce the AP’s cell size?", "choices": [ "Enable the 1-Mbps data rate", "Enable the 54-Mbps data rate", "Disable the 36- and 48-Mbps data rates", "Disable the 2-Mbps data rate" ], "answer": "D", "solution": "The 1-Mbps data rate is already disabled, which limits the cell size to some extent. You can reduce it further by disabling the 2-Mbps data rate", "topic": [ "Planning Coverage with Wireless APs" ] }, { "id": "Wired Network-726", "type": 0, "question": "What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?", "choices": [ "Forwards the switch to the first available link", "Drops the frame", "With the exception of the source port, floods the network with the frame looking for the device", "Sends back a message to the originating station asking for a name resolution" ], "answer": "C", "solution": "With the exception of the source port, switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device", "topic": [ "Switching and Virtual LANs" ] }, { "id": "Wired Network-727", "type": 0, "question": "Which of the following controllers (if any) uses a mostly centralized control plane model?", "choices": [ "OpenDaylight Controller", "Cisco Application Policy Infrastructure Controller (APIC)", "Cisco APIC Enterprise Module (APIC-EM)", "None of these controllers uses a mostly centralized control plane." ], "answer": "A", "solution": "The OpenDaylight Controller uses an Open SDN model with an OpenFlow southbound interface as defined by the Open Networking Foundation (ONF). The ONF SDN model centralizes most control plane functions. The APIC model for data centers partially centralizes control plane functions. The APIC-EM controller (as of time of publication) makes no changes to the control plane of routers and switches, leaving those to run with a completely distributed control plane", "topic": [ "Introduction to Controller-Based Networking" ] }, { "id": "Wired Network-728", "type": 0, "question": "Summarizing external OSPF routes on an ASBR is accomplished by using the _____.", "choices": [ "interface configuration command summary-address _network prefix-length_", "OSPF process configuration command summary-address _network subnet-mask_", "OSPF process configuration command area _area-id_ range _network subnet-mask_", "interface configuration command area _area-id_ summary-address _network subnet-mask_" ], "answer": "B", "solution": "You configure OSPF route summarization on the ASBR with the OSPF process configuration command **summary-address** _network subnet-mask_", "topic": [ "Advanced OSPF" ] }, { "id": "Wired Network-729", "type": 0, "question": "If an AP tries every available method to discover a controller but fails to do so, what happens next?", "choices": [ "It broadcasts on every possible subnet.", "It tries to contact the default controller at 10.0.0.1.", "It reboots or starts discovering again.", "It uses IP redirect on the local router." ], "answer": "C", "solution": "If an AP cannot find a viable controller, it reboots and tries the discovery process over again", "topic": [ "Wireless Infrastructure" ] }, { "id": "Wired Network-730", "type": 0, "question": "If you want to allow both voice and data traffic to be transmitted across the same Digital Subscriber Line (DSL) connection, what type of device is required at the customer site?", "choices": [ "A signal terminator", "A Digital Subscriber Line Access Multiplexer (DSLAM)", "A coder/decoder (CODEC) device", "A splitter" ], "answer": "D", "solution": "In a DSL connection, a signal splitter is needed at the customer site to separate the lower frequency voice range from the higher frequencies used by data traffic. The higher frequency signals are handled at the central office by a DSLAM device. Lower frequency signals carrying voice traffic are handled at the central office by a CODEC device. A signal terminator is not required by DSL", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-731", "type": 0, "question": "Alice is having trouble with a new fiber-optic cable run that has just been installed between two buildings on her company's campus. To confirm that there is a problem with the cables, Alice consults the wiring diagram provided by the cable installer and begins to calculate the optical power loss resulting from cable installation factors such as the type of cable used, the attenuation resulting from the length of the cable runs, and the number and type of splices. Which of the following terms describes the calculations that Alice is performing?", "choices": [ "Protocol analysis", "Routing loop", "Optical link budget", "Received Signal Strength Indication (RSSI)" ], "answer": "C", "solution": "Alice's calculations are called an optical link budget. By adding up the various loss factors in decibels (dB), she can determine whether the budget is low, resulting in communication problems over the link. Protocol analysis is an examination of network packet contents. A routing loop is a condition in which packets are circulating endlessly around a network. RSSI is a wireless networking statistic that does not apply to fiber-optic connections", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-732", "type": 0, "question": "Which of the following devices expands on the capabilities of the traditional firewall by adding features like Deep Packet Inspection (DPI) and an Intrusion Prevention System (IPS)?", "choices": [ "RADIUS server", "CSU/DSU", "NGFW", "Proxy server" ], "answer": "C", "solution": "Next-Generation Firewalls (NGFWs) expand on the packet filtering capabilities of traditional firewalls by adding features such as DPI and IPSs, as well as inspection of encrypted traffic and antivirus scanning. Remote Authentication Dial-In User Service (RADIUS) servers can provide centralized Authentication, Authorization, Accounting, Auditing (AAAA) services. A CSU/DSU is a device that provides a router on a private network with access to a leased line. A proxy server is an application layer service that receives Internet service requests from client computers, reads the application layer protocol data in each request, and then generates its own request for the same service and transmits it to the Internet server the client specifies", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-733", "type": 0, "question": "What is jitter?", "choices": [ "The echo caused by mismatched impedance", "The loss of packets in the network", "The variable delay of received packets", "The fixed delay of received packets" ], "answer": "C", "solution": "Jitter is the variance in the amount of per-packet delay incurred during the transport of packets across the network, such as packets in an IP telephony voice call", "topic": [ "Voice and Video Design" ] }, { "id": "Wired Network-734", "type": 0, "question": "Your junior associate wants to start surveying a cubicle space in an office building. Where should the associate position the first AP to start the AP-on-a-stick survey?", "choices": [ "At the corner of the building floor", "At the geometric center of the floor", "At the center of one cubicle block", "Over the corridor between two cubicle blocks" ], "answer": "A", "solution": "Starting from a strong obstacle is typically the easiest way to go. Any other starting point will cause more trial and error before finding the right position and overlap", "topic": [ "Conducting an Onsite Site Survey" ] }, { "id": "Wired Network-735", "type": 0, "question": "IPv6 uses how many more bits for addresses than IPv4?", "choices": [ "32", "64", "96", "128" ], "answer": "C", "solution": "IPv6 uses 128 bits for addresses, and IPv4 uses 32 bits. The difference is 96", "topic": [ "Internet Protocol Version 6 Design" ] }, { "id": "Wired Network-736", "type": 0, "question": "Which of the following is a valid IPv4 address for a networked host?", "choices": [ "127.0.0.1", "169.254.0.0/16", "172.17.58.254", "255.10.15.7" ], "answer": "C", "solution": "**Explanation:** Of the answers listed, 172.17.58.254 is the only valid IPv4 address for a network host. A host on the network is any computer or network device that uses an IP address to communicate with other computers or devices. 172.17.58.254 is a class B private IP address, so it fits the description of a valid IPv4 address for a network host.\n\n **Incorrect answers:** 127.0.0.1 is the IPv4 local loopback address. Every computer using TCP/IP gets this address, which is used for testing. This address cannot be used to communicate with other hosts on the network. 169.254.0.0/16 means the IP address 169.254.0.0 with the default subnet mask 255.255.0.0, indicating that the network number is 169.254; it is not a valid host IP address because it ends in 0.0. The first IP address of a network is always reserved for the network number; it cannot be used by a host. Otherwise, if the address were, say, 169.254.0.1, the address would work, but because it is an APIPA address, it would be able to communicate only with other systems using APIPA addresses. 255.10.15.7 is not valid. That address is within the class E reserved range. For normal host IP addresses, the first octet is either between 1 and 126 or between 128 and 223, but it cannot be between 224 and 255", "topic": [] }, { "id": "Wired Network-737", "type": 0, "question": "You are testing a twisted-pair cable run using a tone generator and locator. When you apply the tone generator to each of the first seven wires at one end of the cable, you successfully detect a tone on the corresponding pin at the other end. However, when you connect the tone generator to the eighth wire, you fail to detect a tone at the other end. Which of the following fault types have you discovered?", "choices": [ "Short circuit", "Open circuit", "Split pair", "Crosstalk" ], "answer": "B", "solution": "The failure to detect a tone on the eighth wire indicates that there is either a break in the wire somewhere inside the cable or a bad pin connection in one or both connectors. This type of fault is called an open circuit. None of the other three options are faults that manifest as described. A short circuit is when a wire is connected to two or more pins at one end of the cable. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires", "topic": [] }, { "id": "Wired Network-738", "type": 0, "question": "When configuring DTMF relay interworking on CUBE, which command allows CUBE to negotiate different RTP payload types, such as reception of RTP-NTE PT 100 and sending of RTP-NTE PT 101?", "choices": [ "asymmetric payload dtmf", "rtp payload-type nte 101", "pass-thru content sdp", "early-offer forced" ], "answer": "A", "solution": "To enable asymmetric payload support for DTMF, audio codecs, and video codecs, you use the command **asymmetric payload dtmf", "topic": [ "CUBE Interworking Features" ] }, { "id": "Wired Network-739", "type": 0, "question": "How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?", "choices": [ "8", "15", "16", "17" ], "answer": "B", "solution": "The value after the slash in a Classless Inter-Domain Routing (CIDR) address specifies the number of bits in the network identifier. An IPv4 address has 32 bits, so if 17 bits are allocated to the network identifier, 15 bits are left for the host identifier", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-740", "type": 0, "question": "Which of the following is not a key benefit of SD-Access?", "choices": [ "Compatibility", "Automation", "Policy", "Assurance" ], "answer": "A", "solution": "Automation, policy, and assurance are key benefits of SD-Access; compatibility is not", "topic": [ "SD-Access Design" ] }, { "id": "Wired Network-741", "type": 0, "question": "What Cisco IOS XE command is used to configure an application and enter application hosting configuration mode?", "choices": [ "docker config appid < _name_ >", "app config < _name_ >", "app-config appid < _name_ >", "docker-host app < _name_ >", "app-hosting appid < _name_ >" ], "answer": "E", "solution": "The Cisco IOS XE command **app-hosting appid < _name_ >** is used to configure an application and enter application hosting configuration mode. It was introduced in IOS XE 16.12.1 on the Cisco Catalyst 9300 series switches. Answers A and D are incorrect because these commands are not supported in Cisco IOS XE. Answers B and C are incorrect because no such command syntax exists", "topic": [ "Hosting an Application on a Network Device" ] }, { "id": "Wired Network-742", "type": 0, "question": "Which of the following statements is most accurate regarding a guest and a guest portal?", "choices": [ "A guest who connects to the network must type [guest.cisco.com](http://guest.cisco.com) into the browser to enter the guest portal.", "A guest who connects to the network with an unknown device is redirected to the guest portal.", "A sponsor tells the guest what address to type into a browser to reach the guest portal.", "Guest portals are used only with wireless networks." ], "answer": "B", "solution": "**Explanation:** A guest who connects to the network with an unknown device is redirected to the guest portal. Which portal a guest is redirected to is based on the configuration of ISE. Often, a special wireless SSID is used as the source condition. After the guest is registered, the device is added to the endpoint identity group so the guest is not redirected in subsequent connections", "topic": [ "Guest Services" ] }, { "id": "Wired Network-743", "type": 0, "question": "A designer from the corporate office is visiting your field office. The user tries to print from their MacBook Pro to a networked printer, but it does not work. Local users in the office are able to print to the device using their Windows computers. What would most likely solve the problem?", "choices": [ "Select the Enable Mac Printing option in the print server configuration settings.", "Select the Enable Bonjour option in the print server configuration settings.", "Install a macOS printer driver on the print server.", "Stop and restart the print spooler service." ], "answer": "C", "solution": "Print servers need to have the appropriate drivers for all operating systems that will be clients. It's possible that this print server does not have the macOS driver installed", "topic": [ "Hardware" ] }, { "id": "Wired Network-744", "type": 0, "question": "At which layers of the OSI model do bridges, hubs, and routers primarily operate, respectively?", "choices": [ "Physical, Physical, Data Link", "Data Link, Data Link, Network", "Data Link, Physical, Network", "Physical, Data Link, Network" ], "answer": "C", "solution": "Bridges, like switches, are Data Link layer devices. Hubs, like repeaters, are Physical layer devices. Routers are Network layer devices", "topic": [ "The Open Systems Interconnection Specifications" ] }, { "id": "Wired Network-745", "type": 0, "question": "Which command displays only the network prefixes that originate from AS 40 or AS 45?", "choices": [ "show bgp ipv4 unicast regexp _40|45$", "show bgp ipv4 unicast regexp ^40|45", "show bgp ipv4 unicast regexp _4(0|5)$", "show bgp ipv4 unicast regexp _[40,45]$" ], "answer": "C", "solution": "Please refer to Example 12-31", "topic": [ "Advanced BGP" ] }, { "id": "Wired Network-746", "type": 0, "question": "Which device would most likely be used to locate a specific connection in an unlabeled punch-down block?", "choices": [ "VOM", "Certifier", "TDR", "Toner probe" ], "answer": "D", "solution": "A toner probe allows you to identify a cable that may be in a large bundle and hard to trace. At the remote end, a tone generator is attached to the cable and then at the probe can be used to find the cable at the other end", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-747", "type": 0, "question": "Enabling EIGRPv6 on an interface with EIGRPv6 classic configuration requires _____.", "choices": [ "the command network _prefix_ / _prefix-length_ under the EIGRP process", "the command network _interface-id_ under the EIGRP process", "the command ipv6 eigrp _as-number_ under the interface", "nothing; EIGRPv6 is enabled on all IPv6 interfaces upon initialization of the EIGRP process" ], "answer": "C", "solution": "EIGRPv6 classic configuration requires identification with the command **ipv6 eigrp** _as-number_ under the router", "topic": [ "EIGRPv6" ] }, { "id": "Wired Network-748", "type": 0, "question": "Which protocol does ACI Multi-Site use to advertise information about an endpoint in a stretched subnet to an adjacent fabric?", "choices": [ "COOP", "OSPF", "MP-BGP EVPN", "EIGRP" ], "answer": "C", "solution": "MP-BGP EVPN handles cross-site endpoint information advertisements", "topic": [ "ACI Anywhere" ] }, { "id": "Wired Network-749", "type": 0, "question": "Which of the following does a switch use to forward incoming packets out through the correct ports?", "choices": [ "IP addresses", "MAC addresses", "DNS names", "MTU values" ], "answer": "B", "solution": "Switches use Media Access Control (MAC) addresses to identify the ports associated with specific hosts. The switch reads the destination MAC address from each incoming packet and forwards it out through the port associated with that address. Switches are data link layer devices, so they do not use IP addresses or DNS names to forward packets. The Maximum Transmission Unit (MTU) value specifies the maximum size of data link layer frames; the switch does not use it to forward packets", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-750", "type": 0, "question": "Which command is used to verify the flow exporter that has been assigned to a flow monitor?", "choices": [ "show flow Interface", "show flow exporter", "show flow monitor", "show flow record" ], "answer": "C", "solution": "The command **show flow monitor** is used to verify the flow exporter that has been assigned to a flow monitor", "topic": [ "Device Management and Management Tools Troubleshooting" ] }, { "id": "Wired Network-751", "type": 0, "question": "You are installing a new network for a small office. They are concerned about security and therefore want it managed by one computer. When installing the Windows computers, what type of network setup will you choose?", "choices": [ "Workgroup", "Homegroup", "Personal area network", "Domain" ], "answer": "D", "solution": "A domain is a group of computers that are tightly connected or associated and share a common domain name. It has a single authority (called a domain controller) that manages security and access to resources for all the computers. All users will log in to the Windows domain using their centrally created user account. If no domain is used, then by default Windows computers will join a workgroup called workgroup, making it easy to share files, printers, and other resources. Access to resources is configured on each workstation that is sharing a resource. The drawbacks of a workgroup are that security is configured on each PC and it's only appropriate for very small networks. Homegroup was a networking scheme in prior versions of Windows that shared libraries. A personal area network (PAN) consists of a PC and its wireless devices, usually paired Bluetooth devices such as printers, headphones, and input devices. A domain is a network where access to resources is configured on a central server that all users of the resources must log in to", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-752", "type": 0, "question": "What are the three main components of IEEE 802.1X?", "choices": [ "Agent, broker, and authentication server", "Supplicant, authorizer, and authorization server", "Authentication server, supplicant, and authenticator", "EAP, RADIUS, and TLS" ], "answer": "C", "solution": "**Explanation:** The three main components of 802.X are the authentication server, the supplicant, and the authenticator", "topic": [ "802.1X" ] }, { "id": "Wired Network-753", "type": 0, "question": "Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?", "choices": [ "FTP", "SNMP", "NTP", "HTTP" ], "answer": "A", "solution": "The File Transfer Protocol (FTP) uses two port numbers. It uses the first, port 21, for a control connection that remains open during the entire client-server session. The second port, 20, is for a data connection that opens only when the protocol is actually transferring a file between the client and the server. Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), and Hypertext Transfer Protocol (HTTP) all use a single port on the server", "topic": [] }, { "id": "Wired Network-754", "type": 0, "question": "Which regular expression syntax does the Cisco Expressway utilize?", "choices": [ "Perl", "Python", "PCRE", "POSIX" ], "answer": "D", "solution": "The Cisco Expressway uses POSIX format for regular expression syntax", "topic": [ "Regular Expressions on the Cisco Expressway" ] }, { "id": "Wired Network-755", "type": 0, "question": "Which IPv6 First-Hop Security feature is able to validate the source of IPv6 traffic and, if the source is not valid, block it?", "choices": [ "RA Guard", "DHCPv6 Guard", "IPv6 ND inspection/snooping", "Source Guard" ], "answer": "D", "solution": "Source Guard is an IPv6 First-Hop Security feature that validates the source of IPv6 traffic and, if the source is not valid, blocks it", "topic": [ "Infrastructure Security" ] }, { "id": "Wired Network-756", "type": 0, "question": "Which of the following is a Class B private IP address?", "choices": [ "10.1.1.10", "172.32.1.10", "172.28.1.10", "192.168.168.10" ], "answer": "C", "solution": "The ranges for private IP addresses are", "topic": [ "Multisite and Business-to-Business (B2B) Collaboration Solutions" ] }, { "id": "Wired Network-757", "type": 0, "question": "Which WLAN controller redundancy scheme uses a backup WLC configured as the tertiary WLC in the APs?", "choices": [ "N+1", "N+N", "N+N+1", "N+N+B" ], "answer": "C", "solution": "With N+N+1 redundancy, an equal number of controllers back up each other, as with N+N. Plus, a backup WLC is configured as the tertiary WLC for the access points", "topic": [ "Wireless LAN Design" ] }, { "id": "Wired Network-758", "type": 0, "question": "On an IEEE 802.11b/g/n wireless network running at 2.4 GHz with multiple Access Points (APs), the traditional best practice is to use channels 1, 6, and 11, with no two adjacent APs configured to use the same channel. Which of the following is the real reason why this is a good plan?", "choices": [ "Channels 1, 6, and 11 are the only channels with frequencies that do not overlap.", "Channels 1, 6, and 11 have more bandwidth than the other channels.", "Channels 1, 6, and 11 have greater ranges than the other channels.", "Channels 1, 6, and 11 are the default settings on most wireless devices." ], "answer": "A", "solution": "Wireless LAN regulations call for 22 MHz channels in the 2.4 GHz band that are spaced 5 MHz apart, which means that they overlap. Channels 1, 6, and 11 are the only three channels that are distant enough from each other not to overlap. Therefore, they do not interfere with each other. Channels 1, 6, and 11 do not differ from the other channels in their bandwidth or their transmission range. Each wireless device can be set to use only one channel. Therefore, channels 1, 6, and 11 cannot all be the default setting", "topic": [ "Network Implementations" ] }, { "id": "Wired Network-759", "type": 0, "question": "By default, which one of the following methods and intervals does an AP use to detect a failed controller?", "choices": [ "ICMP, 60 seconds", "ICMP, 30 seconds", "CAPWAP keepalive, 60 seconds", "CAPWAP keepalive, 30 seconds", "CAPWAP discovery, 30 seconds" ], "answer": "D", "solution": "APs use CAPWAP keepalive messages that are sent to the controller every 30 seconds", "topic": [ "Understanding Controller Discovery" ] }, { "id": "Wired Network-760", "type": 0, "question": "Which of the following is the device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN)?", "choices": [ "QSFP", "CSU/DSU", "SIP trunk", "IDS/IPS" ], "answer": "B", "solution": "A Channel Service Unit/Data Service Unit (CSU/DSU) is a device that provides a LAN router on a private network with access to a leased line WAN connection. Quad Small Form-factor Pluggable (QSFP) is a standard for a type of modular transceiver, often used on fiber-optic installations. A Session Initiation Protocol (SIP) trunk provides a connection between the private and public domains of a unified communications network, such as a LAN and the Public Switched Telephone Network (PSTN). An intrusion detection system/intrusion prevention system (IDS/IPS) is a network hardware or software security appliance that detects malicious activity and attempts to block it", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-761", "type": 0, "question": "Which of the following is a type of connector used with coaxial cable?", "choices": [ "RJ-11", "RJ-45", "F type", "SC" ], "answer": "C", "solution": "Coaxial cable can use BNC connectors and F type connectors. RJ‐11 and RJ‐45 are twisted pair connectors. SC is a fiber‐optic connector", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-762", "type": 0, "question": "Which of the following was created to provide logging services for the Unix sendmail program?", "choices": [ "Syslog", "Netstat", "SNMP", "CARP" ], "answer": "A", "solution": "Syslog is a standard designed to facilitate the transmission of log entries generated by a device or process, such as the sendmail Simple Network Management Protocol (SMTP) server, across an Internet Protocol (IP) network to a message collector, called a syslog server. Netstat is a program that displays status information about a system's network connections; it does not provide logging services. SNMP is a protocol that carries network management information from agents to a central console; it was not created specifically for sendmail. The Cache Array Routing Protocol (CARP) enables proxy servers to exchange information; it does not provide logging services", "topic": [ "Network Operations" ] }, { "id": "Wired Network-763", "type": 0, "question": "Which of the following is _not_ a tool that can identify applications on hosts?", "choices": [ "Web proxy", "Application layer firewall", "Using NBAR", "Using NetFlow" ], "answer": "D", "solution": "NetFlow does not have application layer data", "topic": [ "Network and Host Profiling" ] }, { "id": "Wired Network-764", "type": 0, "question": "You need a network that provides centralized authentication for your users. Which of the following logical topologies should you use?", "choices": [ "VLANs", "Peer-to-peer", "Client-server", "Mesh" ], "answer": "C", "solution": "A client-server logical topology allows you to have a centralized database of users so that authentication is provided in one place", "topic": [ "Introduction to Networks" ] }, { "id": "Wired Network-765", "type": 0, "question": "Which of the following features is supported by DHCP, but not by BOOTP and RARP?", "choices": [ "Dynamic address allocation", "Relay agents", "Manual address allocation", "Automatic address allocation" ], "answer": "A", "solution": "Dynamic Host Configuration Protocol (DHCP) can dynamically allocate IP addresses to clients and reclaim them when their leases expire. Bootstrap Protocol (BOOTP) and Reverse Address Resolution Protocol (RARP) can allocate addresses automatically or manually, but they cannot reclaim them. DHCP and BOOTP both support relay agents", "topic": [ "Networking Fundamentals" ] }, { "id": "Wired Network-766", "type": 0, "question": "A network consists of four controllers: A, B, C, and D. Mobility group 1 consists of controllers A and B, while mobility group 2 consists of controllers C and D. Which one of the following answers describes what will happen when a client tries to roam between controllers B and C?", "choices": [ "Roaming is seamless and efficient.", "Roaming is not possible.", "Roaming is possible, but CCKM and key caching will not work.", "Only Layer 3 roaming is possible." ], "answer": "C", "solution": "Controllers A and B are listed in each other’s mobility list, so they are known to each other. However, they are configured with different mobility group names. Clients may roam between the two controllers, but CCKM and key caching information will not be exchanged", "topic": [ "Understanding Roaming" ] }, { "id": "Wired Network-767", "type": 0, "question": "What is the difference between DMVPN phase 2 and DMVPN phase 3?", "choices": [ "There is no difference; they both support only hub-and-spoke solutions.", "DMVPN phase 2 supports hub-and-spoke solutions, and DMVPN phase 3 also supports spoke-to-spoke.", "DMVPN phase 2 has smaller routing tables.", "DMVPN phase 3 has smaller routing tables." ], "answer": "D", "solution": "Phase 3 has smaller routing tables because it can summarize routes", "topic": [ "Dynamic Multipoint Virtual Private Network (DMVPN)" ] }, { "id": "Wired Network-768", "type": 0, "question": "Imagine that you have configured the **[enable secret](vol2_glossary.xhtml#glos_158)** command, followed by the **enable password** command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?", "choices": [ "enable password", "enable secret", "Neither", "The password command, if it’s configured" ], "answer": "B", "solution": "If both commands are configured, IOS accepts only the password as configured in the **enable secret** command", "topic": [ "Securing Network Devices" ] }, { "id": "Wired Network-769", "type": 0, "question": "Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0?", "choices": [ "0.0.0.0", "0.0.0.31", "0.0.0.240", "0.0.0.255", "0.0.15.0", "0.0.248.255" ], "answer": "D", "solution": "0.0.0.255 matches all packets that have the same first three octets. This is useful when you want to match a subnet in which the subnet part comprises the first three octets, as in this case", "topic": [ "Basic IPv4 Access Control Lists" ] }, { "id": "Wired Network-770", "type": 0, "question": "What is SLAAC used for?", "choices": [ "To provide an IPv6 address to a client", "To route IPv6 packets", "To assign a DNS server", "To provide a MAC address given an IP address" ], "answer": "A", "solution": "SLAAC is a protocol used to generate an IPv6 address", "topic": [ "Fundamentals of Networking Protocols and Networking Devices" ] }, { "id": "Wired Network-771", "type": 0, "question": "If a switch is configured to send syslog messages, which ISE persona should the switch send these messages to?", "choices": [ "Administration", "Monitoring", "Policy Services", "pxGrid" ], "answer": "B", "solution": "**Explanation:** Cisco switches can be configured to send syslog messages to the MnT node, where the data is correlated as part of the authentication reports", "topic": [ "Implement Wired and Wireless Authentication" ] }, { "id": "Wired Network-772", "type": 0, "question": "Which HSRP feature was new in HSRPv2?", "choices": [ "Group numbers that are greater than 255", "Virtual MAC addresses", "Tracking", "Preemption" ], "answer": "A", "solution": "In HSRP version 1, group numbers are restricted to the range from 0 to 255. HSRP version 2 expands the group number range from 0 to 4095", "topic": [ "Implementing Routing in the Data Center" ] }, { "id": "Wired Network-773", "type": 0, "question": "You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites?", "choices": [ "53", "67", "80", "443" ], "answer": "C", "solution": "Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access websites, except secure sites that use HTTPS, which is on port 443", "topic": [ "Networking" ] }, { "id": "Wired Network-774", "type": 0, "question": "What is the purpose of wire-map testers?", "choices": [ "Check copper cable for crossed pairs only", "Analyze protocols in software", "Help find unused protocols and remove them from the network", "Detect transposed wires, opens, and shorts in twisted-pair cables" ], "answer": "D", "solution": "Wire-map testers are used to determine the cable pinouts from one end of a cable to the other. It can also identify open pins and shorts. By using a wire-map tester on an Ethernet cable, you can verify the cable is pinned correctly and has no open or shorted connections", "topic": [ "Cable Connectivity Issues and Tools" ] }, { "id": "Wired Network-775", "type": 0, "question": "Ed has discovered that some of the twisted-pair cables on his newly installed network are running right alongside fluorescent light fixtures in the drop ceiling. Which of the following problems is the network likely to experience due to the cables' proximity to the fixtures?", "choices": [ "Jitter", "Attenuation", "Crosstalk", "EMI" ], "answer": "D", "solution": "Fluorescent light fixtures and other devices in an office environment can generate magnetic fields, resulting in electromagnetic interference (EMI). When a copper-based cable runs too near to such a device, the magnetic fields can generate an electric current on the cable that interferes with the signals exchanged by network devices. Jitter, crosstalk, and attenuation are all conditions that can affect the performance of a wired network, but they are not directly related to the cables' proximity to light fixtures", "topic": [ "Network Troubleshooting" ] }, { "id": "Wired Network-776", "type": 0, "question": "Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers?", "choices": [ "Data", "Chunk", "Segment", "Frame", "Packet" ], "answer": "D", "solution": "By convention, the term _frame_ refers to the part of a network message that includes the data-link header and trailer, with encapsulated data. The term _packet_ omits the data-link header and trailer, leaving the network layer header with its encapsulated data. The term _segment_ omits the network layer header, leaving the transport layer header and its encapsulated data", "topic": [ "Introduction to TCP/IP Networking" ] }, { "id": "Wired Network-777", "type": 0, "question": "You have gathered information on a network issue and determined the affected areas of the network. What is your next step in resolving this issue?", "choices": [ "You should implement the best solution for the issue.", "You should test the best solution for the issue.", "You should check to see if there have been any recent changes to this affected part of the network.", "You should consider any negative impact to the network that might be caused by a solution." ], "answer": "C", "solution": "After determining the affected area, you need to find out if any changes have taken place", "topic": [ "Network Troubleshooting Methodology" ] }, { "id": "Wired Network-778", "type": 0, "question": "A network connection doesn't seem to be working as it should. You've verified that the cables are good from end to end. Where can you quickly look in the OS to see if there is a problem with the onboard NIC driver?", "choices": [ "Device Manager", "Programs and Features", "File Explorer Options", "Ease of Access" ], "answer": "A", "solution": "A quick look at Device Manager is often all you need to troubleshoot a problem with an onboard device. If the device drivers aren't installed for the device, you'll see a yellow exclamation point in Device Manager. Programs and Features allows the user to add, remove, or troubleshoot installed programs (the options will change by program) and add Windows features that are not yet installed. The File Explorer Options utility changes how File Explorer works such as showing hidden files or extensions and other view options. Ease of Access provides alternative ways to interact with the computer for differently abled users", "topic": [ "Operating Systems" ] }, { "id": "Wired Network-779", "type": 0, "question": "Which routing protocols support variable-length subnet masks (VLSMs)?", "choices": [ "EIGRP", "OSPF", "IS-IS", "A and B", "A and C", "B and C", "A, B, and C" ], "answer": "G", "solution": "EIGRP, OSPF, and IS-IS support VLSMs", "topic": [ "OSPF, BGP, Route Manipulation, and IP Multicast" ] }, { "id": "Wired Network-780", "type": 0, "question": "Which of the following is a Class C network address?", "choices": [ "10.10.10.0", "127.0.0.1", "128.0.0.0", "192.255.254.0" ], "answer": "D", "solution": "Only option D is in the Class C range of 192 through 224. It might look wrong because there is a 255 in the address, but this is not wrong—you can have a 255 in a network address, just not in the first octet", "topic": [ "IP Addressing" ] }, { "id": "Wired Network-781", "type": 0, "question": "True or false: Containers do not need vSwitches to communicate with each other or with the outside world.", "choices": [ "True", "False" ], "answer": "B", "solution": "Containers, just like VMs, rely on vSwitches (also known as virtual bridges) for communication within a node (server) or the outside world", "topic": [ "Virtualization" ] }, { "id": "Wired Network-782", "type": 0, "question": "What OSPFv3 LSA carries address prefixes?", "choices": [ "Network LSA", "Summary LSA", "Interarea-router LSA", "Intra-area-prefix LSA" ], "answer": "D", "solution": "Intra-area-prefix LSAs carry IPv6 prefixes associated with a router, a stub network, or an associated transit network segment", "topic": [ "OSPF, BGP, and Route Manipulation" ] }, { "id": "Wired Network-783", "type": 0, "question": "Which of the following statements is TRUE regarding Enhanced Transmission Selection (ETS)?", "choices": [ "ETS automatically discovers and negotiates DCB capabilities between the NIC and switch.", "ETS manages end-to-end congestion.", "ETS enables multiple traffic types to share the same link.", "ETS manages bandwidth between different types of traffic on the same link." ], "answer": "D", "solution": "IEEE 802.1Q defines eight priorities but not a simple, effective, and consistent scheduling mechanism between them. IEEE 802.11 Qaz ETS (Enhanced Transmission Selection) allows assignment of bandwidth to each priority group", "topic": [ "Implement FCoE Unified Fabric" ] }, { "id": "Wired Network-784", "type": 1, "question": "以下哪些关于静态路由的说法是正确的?(选择所有适用的选项。)", "choices": [ "静态路由是管理员必须在网络发生变化时手动添加、修改或删除的配置路由。", "当新的网络路径可用时,路由协议会自动将静态路由添加到路由表中。", "静态路由会自动适应网络基础设施的变化。", "静态路由是针对具有到每个目标网络的冗余路径的大型互联网络的推荐解决方案。", "静态路由是针对只有一条路径到达目标网络的小型互联网的推荐解决方案。" ], "answer": "A,E", "solution": "当网络发生变化时,管理员必须手动添加、修改或删除静态路由。因此,在存在多条路径到达每个目标网络的大型互联网中,不建议使用静态路由。静态路由不会被路由协议自动添加,并且不会适应网络变化。", "topic": [ "网络实现" ] }, { "id": "Wired Network-785", "type": 1, "question": "以下哪些网络概念经常使用虚拟互联网协议(IP)地址来提供高可用性?(选择所有适用项。)", "choices": [ "聚类", "负载均衡", "网络地址转换(NAT)", "网络接口卡(NIC)组合。" ], "answer": "A,B", "solution": "高可用性虚拟IP地址实现是指多个服务器被识别为单个地址,使得所有服务器都能接收到传入的客户端流量。在服务器集群和网络负载平衡安排的情况下,集群本身具有独特的名称和IP地址,与单个服务器的名称和IP地址不同。客户端将自己的地址定向到集群,而不是集群中的某个服务器。NAT不是高可用性技术,NIC团队不使用虚拟IP地址。", "topic": [ "网络运营" ] }, { "id": "Wired Network-786", "type": 1, "question": "MST区域可以通过以下哪两种方式与PVST+/RSTP进行交互?", "choices": [ "MST区域是所有VLAN的根桥。", "MST区域是某些VLAN的根桥。", "PVST+/RSTP拓扑结构是所有VLAN的根桥。", "PVST+/RSTP拓扑结构是某些VLAN的根桥。" ], "answer": "A,C", "solution": "MST可以通过作为所有VLAN的根桥或确保PVST+/RSTP环境是所有VLAN的根桥来与PVST+/RSTP环境进行交互。但MST不能成为某些VLAN的根桥,然后让PVST+/RSTP环境成为其他VLAN的根桥。", "topic": [ "多重生成树协议(Multiple Spanning Tree Protocol)" ] }, { "id": "Wired Network-787", "type": 1, "question": "在路由器R1支持IPv6数据包路由之前,必须执行以下两项任务:\n\n1. 配置至少一个IPv6地址在R1的接口上。\n2. 启用IPv6路由功能。", "choices": [ "使用“ipv6 address”接口子命令在每个接口上启用IPv6。", "使用ip versions 4 6 global命令启用对IPv4和IPv6两个版本的支持。", "此外,使用ipv6 unicast-routing全局命令启用IPv6路由。", "使用ip routing dual-stack全局命令迁移到双栈路由。" ], "answer": "A,C", "solution": "在这四个答案中,两个正确的答案展示了在Cisco路由器上支持IPv6所需的最小配置:启用IPv6路由(**ipv6 unicast-routing**)并在每个接口上启用IPv6,通常是通过为每个接口添加单播地址(**ipv6 address…**)来实现的。而另外两个错误的答案列出了不存在的命令。", "topic": [ "在路由器上实现IPv6地址分配" ] }, { "id": "Wired Network-788", "type": 1, "question": "以下哪些不是RSTP端口状态?", "choices": [ "阻塞", "听力", "学习", "转发" ], "answer": "A,B", "solution": "阻塞和监听状态已经合并为RSTP的丢弃状态。", "topic": [ "生成树协议" ] }, { "id": "Wired Network-789", "type": 1, "question": "在两个相邻的交换机上,使用**channel-group**接口子命令的哪些关键字组合会导致交换机使用LACP并尝试将该链路添加到EtherChannel中?(选择两个答案。)", "choices": [ "理想和积极的", "被动和主动", "主动和自动", "积极和积极的" ], "answer": "B,D", "solution": "channel-group命令将指示交换机使用LACP来动态协商添加到EtherChannel的链接,当命令分别使用“active”和“passive”关键字时。而“desirable”和“passive”关键字则指示交换机使用PAgP而不是LACP。在这四个答案中,两个正确答案使用了两个LACP值,而两个不正确的答案使用了至少一个值,这将导致交换机使用PAgP,从而使答案不正确。", "topic": [ "RSTP和EtherChannel配置" ] }, { "id": "Wired Network-790", "type": 1, "question": "以下哪些技术可以用于初始化EIGRP进程?(选择两个。)", "choices": [ "使用接口命令 ip eigrp _as-number_ ipv4 unicast。", "使用全局配置命令 router eigrp _as-number_。", "使用全局配置命令 router eigrp _process-name_。", "使用接口命令 router eigrp _as-number_。" ], "answer": "B,C", "solution": "EIGRP进程通过全局配置命令“router eigrp as-number”(经典配置)或“router eigrp process-name”(命名模式配置)进行初始化。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-791", "type": 1, "question": "以下哪些关于单模光纤电缆的说法是正确的?(选择所有适用的选项。)", "choices": [ "单模光纤使用LED光源,而多模光纤使用激光。", "单模光缆可以跨越比多模光缆更长的距离。", "单模光缆的纤芯直径比多模光缆小。", "单模光缆的弯曲半径比多模光缆小,更容易安装。", "单模光纤电缆需要接地,而多模光纤电缆不需要。" ], "answer": "B,C", "solution": "单模光纤的纤芯更小,可以跨越比多模光纤更长的距离。单模光纤还使用激光光源,具有更大的弯曲半径,并且不需要接地。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-792", "type": 1, "question": "有哪两个指标被跟踪以衡量运营利用率?", "choices": [ "系统日志", "运行时间", "停机时间", "简单网络管理协议(SNMP)" ], "answer": "B,C", "solution": "利用率指标包括跟踪应用程序、服务器和网络设备的正常运行时间和停机时间。", "topic": [ "确保网络可用性" ] }, { "id": "Wired Network-793", "type": 1, "question": "以下哪种连接器类型与光纤电缆相关?(选择所有适用项。)", "choices": [ "RJ11", "ST", "F", "LC", "MT-RJ" ], "answer": "B,D,E", "solution": "光纤电缆连接器都基于相同的基本原理工作,但有多种形式因素可供选择,包括直插式(ST)、本地连接器(LC)和机械转接-注册插座(MT-RJ)。RJ-11是一种双绞线电缆连接器,而F连接器用于同轴电缆。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-794", "type": 1, "question": "以下哪些原因会导致接口监视器显示的数据包丢失数量增加?(选择所有适用项。)", "choices": [ "重置", "弃牌", "错误", "溢出。" ], "answer": "B,C", "solution": "接口监视器显示的数据包丢失是由错误引起的,例如格式错误或无法读取的数据包,或者是被丢弃的数据包,因为它们的目的地是另一个接口。重置和溢出不是数据包丢失的原因。", "topic": [ "网络运营" ] }, { "id": "Wired Network-795", "type": 1, "question": "在配置Webex Edge Connect时,需要与哪些实体建立哪些层次的连接?(选择三个。)", "choices": [ "第一层:通过Equinix的物理连接。", "第三层:与思科Webex的网络连接性", "第二层:通过Equinix的数据链路连接。", "第二层:通过Cisco Webex进行数据链路连接", "第三层:通过Equinix实现网络连接" ], "answer": "A,B,C", "solution": "要设置Webex Edge Connect,首先需要与Equinix代表一起完成两项任务:建立物理连接和建立数据链路连接。完成这些任务后,您可以继续进行第三项任务,即通过Equinix Cloud Exchange Portal与Cisco Webex建立网络连接。", "topic": [ "Webex Edge解决方案" ] }, { "id": "Wired Network-796", "type": 1, "question": "后向链路桥接/级联解决了哪些问题?(选择两个。)", "choices": [ "允许网格用于点对点链接。", "克服了在网状树中使用单一通道的限制。", "扩展网格树的大小", "允许网格支持工作组桥接。" ], "answer": "B,C", "solution": "许多网状AP只有一个5GHz无线电用于回传。这意味着网状树中的所有AP必须在同一信道上运行,这会导致干扰和增加争用。为了解决这个问题,可以将多个AP串联起来,允许在非重叠信道上创建不同的单元。这使得网状树可以更大并且性能更好。", "topic": [ "设计无线网状网络" ] }, { "id": "Wired Network-797", "type": 1, "question": "ZBFW有哪两个系统构建区域?(选择两个。)", "choices": [ "内部区域(选项可能与美式足球相关)", "暮光之区", "系统区域", "外侧区域", "自我区域", "默认区域" ], "answer": "E,F", "solution": "在ZBFW架构中,有两个系统构建的区域:自身和默认。", "topic": [ "网络设备访问控制和基础设施安全" ] }, { "id": "Wired Network-798", "type": 1, "question": "以下哪三个被认为是SIP URI?", "choices": [ "username@domain", "123username", "username @domain.com", "8088675309", "+18088675309", "username@172.16.0.50" ], "answer": "A,C,F", "solution": "SIP URI地址的格式类似于电子邮件地址,采用“用户@域名”的形式。这使得SRV方案可以查找与DNS名称相关联的SIP服务器。如果未找到(或未定义)域名,但该名称与IP地址相关联,则客户端将直接使用UDP协议在端口5060上联系该IP地址上的SIP服务器。", "topic": [ "Cisco Expressway的初始配置设置" ] }, { "id": "Wired Network-799", "type": 1, "question": "以下哪些选项描述了ZBFW?(选择两个。)", "choices": [ "提供具有无状态检查功能的高安全性。", "提供有状态防火墙功能。", "是一个网络接口模块", "是一个集成的IOS XE解决方案。", "安全设备是否类似于ASA 5500-X?" ], "answer": "B,D", "solution": "ZBFW是一种集成的IOS解决方案,提供路由器状态防火墙功能。", "topic": [ "网络设备访问控制和基础设施安全" ] }, { "id": "Wired Network-800", "type": 1, "question": "哪些SIP请求可以用于更新两个用户代理之间的现有媒体会话?(选择两个。)", "choices": [ "INVITE", "PRACK", "UPDATE", "REGISTER", "OPTIONS" ], "answer": "A,C", "solution": "INVITE和UPDATE都可以与SDP一起使用,以执行中呼叫会话更新,以修改SDP会话参数。", "topic": [ "VoIP协议:SIP和H.323" ] }, { "id": "Wired Network-801", "type": 1, "question": "以下哪些配置是为FlexVPN提供的?(选择两个。)", "choices": [ "IKEv2配置文件", "IPsec配置文件", "IKEv2策略", "IPsec策略" ], "answer": "B,C", "solution": "FlexVPN提供了一个默认的IPsec配置文件和IKEv2策略。", "topic": [ "FlexVPN配置和故障排除" ] }, { "id": "Wired Network-802", "type": 1, "question": "以下哪些是优化网络性能的原因?(选择所有适用项。)", "choices": [ "最大化正常运行时间。", "最小化延迟。", "使用VoIP技术", "使用视频应用程序", "以上选项均不正确。" ], "answer": "A,B,C,D", "solution": "有许多带宽密集型程序,比如VoIP和视频流。这些只是优化网络性能必要性的几个原因。", "topic": [ "数据中心架构和云概念" ] }, { "id": "Wired Network-803", "type": 1, "question": "你的路由器仅接收相邻 EIGRP 路由器的已连接路由和摘要路由。可能的原因是什么?(选择两个。)", "choices": [ "已在与邻居连接的接口上应用了一个入站分发列表,它过滤掉所有非直连路由和所有汇总路由,并防止它们被学习。", "错误的接口已配置参与路由过程,并且邻居关系仅部分形成。", "你的路由器已配置了EIGRP Stub命令。", "你的路由器接口被配置为被动模式。" ], "answer": "A,C", "solution": "如果你的路由器只接收相邻 EIGRP 路由器的已连接路由和汇总路由,那么可能是某个接口应用了分发列表,或者在路由器上配置了 eigrp stub 命令。", "topic": [ "EIGRPv6(Enhanced Interior Gateway Routing Protocol version 6):增强型内部网关路由协议第6版。" ] }, { "id": "Wired Network-804", "type": 1, "question": "使用 **dial-peer hunt 0** 进行拨号对等匹配时,选择出站拨号对等的条件是什么?(选择三个。)", "choices": [ "随机选择", "电话号码中最长匹配", "最少使用。", "明确偏好", "轮流选择" ], "answer": "A,B,D", "solution": "dial-peer hunt 0** 定义了一个使用电话号码最长匹配、显式优先级和随机选择的出站拨号对等体匹配。", "topic": [ "CUBE呼叫路由和数字操作" ] }, { "id": "Wired Network-805", "type": 1, "question": "哪些无线网络(Wi-Fi)标准可以同时使用2.4 GHz和5 GHz频率?(选择两个。)", "choices": [ "802.11g", "802.11n", "802.11ac (Wi-Fi 5)", "802.11ax (Wi-Fi 6)" ], "answer": "B,D", "solution": "只有802.11n和802.11ax标准可以同时使用2.4 GHz和5 GHz频率,这使它们向后兼容所有其他标准。802.11a和802.11ac标准仅使用5 GHz频率。802.11b和802.11g仅使用2.4 GHz频率。", "topic": [] }, { "id": "Wired Network-806", "type": 1, "question": "你的笔记本电脑配备了WWAN卡,并且你已经与一个移动网络服务提供商安排好了服务。在Windows 10中,你可以在哪里连接到网络?(选择两个。)", "choices": [ "在任务栏上单击无线网络图标,然后在列表中选择带有蜂窝网络图标(垂直条形)的网络。", "在Windows设置的“网络和Internet”组中,点击“移动热点”。", "在Windows设置的“网络和Internet”组中,点击“Wi-Fi”。", "在Windows设置的“网络和Internet”组中,点击“蜂窝数据”。" ], "answer": "A,D", "solution": "一旦WWAN已经设置好,连接它的最简单方法是从任务栏上的无线网络图标中选择它所显示的可用无线网络。或者,进入Windows设置,选择网络和Internet,然后选择蜂窝移动网络来选择您的网络。移动热点是指您将设备上的Internet连接与附近的其他设备共享。在Windows设置的网络和Internet组中选择Wi-Fi将不会显示WWAN连接。", "topic": [ "操作系统" ] }, { "id": "Wired Network-807", "type": 1, "question": "使用SAN的优点是什么?(选择两个。)", "choices": [ "网络上更多的存储空间", "更高效的数据存储", "更快的数据访问", "自动化数据备份" ], "answer": "B,C", "solution": "存储区域网络(SAN)具有许多优点,包括块级数据存储,更加高效。它们还可以减少网络负载,提供更快的数据访问,并且易于扩展。它们并不本质上提供更多的存储空间(尽管它们易于扩展),也不会自动备份数据(尽管它们易于设置)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-808", "type": 1, "question": "如果您有一台带有双电源的服务器,每个电源都连接到单独的不间断电源(UPS),每个UPS连接到单独的建筑电源电路,连接到备用发电机,那么以下哪些故障可以使服务器幸存并无限期运行?(选择所有适用项。)", "choices": [ "一台服务器电源故障", "一个UPS的故障", "一个建筑物电路故障", "建筑备用发电机故障" ], "answer": "A,B,C,D", "solution": "如果服务器的一个电源供应出现故障,另一个将继续运行。如果UPS中的一个出现故障,服务器将继续使用另一个运行。如果建筑物的一个电力断路器跳闸,服务器将继续使用另一个运行。如果建筑物备用发电机出现故障,只要建筑物仍有外部电源,服务器就会继续运行。", "topic": [ "网络运营" ] }, { "id": "Wired Network-809", "type": 1, "question": "以下哪些步骤是帮助识别问题的适当步骤?(选择所有适用项。)", "choices": [ "询问基础设施变更情况。", "根据症状进行内部或外部研究。", "请参考供应商的说明以获取指导。", "确定解决问题的下一步。", "收集用户信息并识别用户对计算机的更改。" ], "answer": "A,E", "solution": "识别问题的两个子步骤是:从用户那里收集信息并确定用户对计算机所做的更改,以及询问有关环境或基础设施的更改。进行内部或外部研究是建立可能原因理论的一部分。参考供应商的指示以制定解决问题的行动计划也是其中的一部分。确定下一步解决问题的步骤是测试理论以确定原因的一部分。", "topic": [ "故障排除方法和解决核心硬件问题" ] }, { "id": "Wired Network-810", "type": 1, "question": "一位工程师听说了DHCP Snooping并决定实施它。以下哪些设备可以实施DHCP Snooping?(选择两个答案。)", "choices": [ "第二层交换机", "路由器", "多层交换机", "最终用户主机" ], "answer": "A,C", "solution": "DHCP Snooping必须在执行二层交换的设备上实现。DHCP Snooping功能需要检查在同一广播域(VLAN)内的设备之间流动的DHCP消息。二层交换机以及多层交换机都可以执行该功能。因为路由器只执行三层转发(即路由),不会在同一VLAN内的设备之间转发消息,所以路由器不适合实现DHCP Snooping(并且在路由器上也不是Cisco IOS的功能)。终端用户设备作为DHCP Snooping的平台选择不好,因为它们无法接收所有DHCP消息,也无法防止帧在发生攻击时流动。", "topic": [ "DHCP Snooping和ARP Inspection" ] }, { "id": "Wired Network-811", "type": 1, "question": "以下哪些是TCP/IP参考模型中应用层协议的示例?(选择两个。)", "choices": [ "传输控制协议(TCP)", "超文本传输协议(HTTP)", "BGP(边界网关协议)", "FTP(文件传输协议)" ], "answer": "B,D", "solution": "有大量的应用层协议,包括用于在Web浏览器和Web服务器之间传输网页的超文本传输协议(HTTP),以及用于在客户端和服务器之间传输文件的文件传输协议(FTP)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-812", "type": 1, "question": "你可以使用以下哪些命令行工具在Unix或Linux系统上创建和修改静态路由?(选择所有适用项。)", "choices": [ "`route`", "`ifconfig`", "`traceroute`", "`ip`" ], "answer": "A,D", "solution": "`route` 命令最初是用于显示 Unix 或 Linux 系统的路由表并通过添加、更改和删除静态路由来修改其内容。`ip` 命令是 `iproute2` 命令行实用程序包的一部分,在许多 Unix 和 Linux 发行版中取代了 `route`。使用 `ip` 命令的 `route` 参数可以操作路由表。`traceroute` 和 `ifconfig` 工具不是用于操作路由表的命令。", "topic": [ "网络实现" ] }, { "id": "Wired Network-813", "type": 1, "question": "Ralph是一名网络管理员,他收到了一个Windows用户报告称在网络上访问某些其他计算机时遇到了困难。Ralph确定用户只在尝试连接路由器另一侧的系统时才遇到问题。因此,Ralph决定检查用户计算机上的路由表。他可以使用以下哪些工具来执行此操作?(选择所有适用项。)\n\n无法回答,因为题目是一道多选题,需要提供多个答案。", "choices": [ "`nbtstat`(NetBIOS over TCP/IP Statistics)", "路由(指网络中数据包传输的路径或规则)。", "`nslookup`(全称为 Name Server Lookup)是一个用于查询域名系统(DNS)的命令行工具,可以用来获取特定主机名或 IP 地址的相关信息,例如域名的 IP 地址、域名服务器的名称等。", "网络状态(netstat)" ], "answer": "B,D", "solution": "`route`工具使用`print`参数可以在Windows计算机上显示路由表的内容。`netstat -r`命令也可以实现相同的功能。而`nbtstat`和`nslookup`工具则无法显示路由表。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-814", "type": 1, "question": "以下哪两个关于NDP消息的说法是正确的?", "choices": [ "NDP消息仅在AP的操作信道上发送。", "NDP消息会在AP支持的每个信道上发送。", "NDP消息使用AP的正常发射功率级别进行传输。", "NDP消息使用AP支持的最大发射功率级别进行传输。" ], "answer": "B,D", "solution": "思科无线接入点会在每个支持的信道上以最大支持的发射功率水平传输它们的NDP广告。", "topic": [ "设计无线电管理" ] }, { "id": "Wired Network-815", "type": 1, "question": "当配置Cisco WLC与ISE通信时,必须为WLAN配置什么?(选择两个。)", "choices": [ "认证和授权的RADIUS服务器可以指向不同的ISE PSN,只要这些PSN是节点组的一部分。", "认证和计费的RADIUS服务器必须指向同一个ISE PSN。", "WLAN必须配置为SNMP NAC。", "WLAN必须配置为RADIUS NAC。" ], "answer": "B,D", "solution": "当与高级RADIUS服务器(例如Cisco ISE)交互时,Cisco WLC要求将相同的ISE PSN配置为WLAN的认证和计费服务器。此外,必须在WLAN配置的高级选项卡上启用RADIUS NAC。", "topic": [ "实现有线和无线认证" ] }, { "id": "Wired Network-816", "type": 1, "question": "以下哪些是不禁用未使用交换机端口的有效理由?(选择所有适用项。)\n\n- Disabling unused ports can cause unnecessary network downtime if a port needs to be used in the future.\n- Disabling unused ports can make it difficult to troubleshoot network issues if a port needs to be used in the future.\n- Disabling unused ports can cause unnecessary work for the IT department if a port needs to be used in the future.\n- Disabling unused ports can make it difficult to scale the network if new devices need to be added in the future.\n\n以上四个选项都是不禁用未使用交换机端口的有效理由。", "choices": [ "未使用的端口未连接到墙壁插座。", "数据中心已经受到未经授权的访问保护。", "该交换机配置为使用基于MAC地址的访问控制列表(ACL)。", "保留一些端口可以方便新用户的接入。" ], "answer": "B,C", "solution": "如果未经授权的人无法访问数据中心,那么就不存在有人插入设备到开启的端口的危险。如果交换机使用访问控制列表(ACL)来指定允许连接到它的系统的媒体访问控制(MAC)地址,则无需禁用未使用的端口,因为任何插入开放端口的未知设备都将无法获得访问网络的权限。其他两个选项不是有效的理由。未打补丁的端口仍可能在交换机位置被攻击。启用端口并不困难,因此为新用户留下启用的端口也不是一个有效的理由。", "topic": [] }, { "id": "Wired Network-817", "type": 1, "question": "以下是可能包含在新配置中的两个命令:\n\n```\ncrypto key generate rsa\nline vty 0 15\ntransport input ssh\n```", "choices": [ "一个用户名 _name_,一个秘密的 _password_,用于 vty 模式的子命令。", "一个用户名为_name_,密码为_password的全局配置命令。", "一个登录本地 VTY 模式的子命令。", "一个传输输入SSH全局配置命令。" ], "answer": "B,C", "solution": "SSH需要使用用户名和密码。使用“username”全局命令是定义支持SSH的用户名(和匹配密码)的一种方法。还需要配置vty行以要求使用用户名,其中“login local” vty子命令是其中之一的选项。", "topic": [ "配置基本交换机管理" ] }, { "id": "Wired Network-818", "type": 1, "question": "Windows Server Backup程序支持以下哪些类型的备份作业?(选择所有适用项。)", "choices": [ "递增的", "差分的,差异的", "完整的", "补充的,附加的" ], "answer": "A,C", "solution": "Windows Server Backup可以执行完整备份和增量备份。它不支持差异备份,也没有名为补充备份的备份作业。", "topic": [ "网络运营" ] }, { "id": "Wired Network-819", "type": 1, "question": "哪些探针用于触发SNMPQUERY探针查询NAD?(选择两个。)", "choices": [ "半径(网络安全中的一种认证协议)", "SNMP查询", "超文本传输协议(HTTP)", "SNMPTRAP(简单网络管理协议陷阱)" ], "answer": "A,D", "solution": "SNMPQUERY探针定期查询所有配置了SNMP字符串的NAD,但它也是一种响应式探针。当RADIUS探针接收到计费START消息或接收到SNMP陷阱时,SNMPQUERY探针会响应式地查询NAD。", "topic": [ "Profiling(个人资料)" ] }, { "id": "Wired Network-820", "type": 1, "question": "有哪两个术语用于识别一家互联网服务提供商,该提供商可能使用T1或T3线路、光纤等连接到互联网,并使用点对点毫米波或微波链路连接其塔之间的骨干网或扩展其服务区域,并使用点对多点无线技术为其客户提供互联网接入?", "choices": [ "无线互联网服务提供商(WISP)", "网络服务提供商", "分界点", "长距离固定无线" ], "answer": "A,D", "solution": "多年来,无线互联网服务提供商(WISPs)由一些个人或小公司组成,为那些大型商业互联网提供商不盈利的地区提供互联网接入服务,例如非常偏远的地区。它们也被称为长距离固定无线提供商。第一个WISP成立于1992年美国中西部地区。现在全世界有成千上万个WISP。在一些没有有线基础设施的地区,WISP是人们获取互联网连接的唯一途径。WISP使用租用线路或微波连接到互联网,通常在其塔之间使用点对点微波连接,在最终塔和用户之间使用点对多点连接。ISP是互联网服务提供商,分界点是客户场所的地方,网络责任从ISP转移到客户。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-821", "type": 1, "question": "OSPF在可行的情况下使用哪些目的地址?(选择两个。)", "choices": [ "IP地址224.0.0.5。", "IP地址224.0.0.10。", "IP地址224.0.0.8。", "MAC地址 01:00:5E:00:00:05", "MAC地址 01:00:5E:00:00:0A" ], "answer": "A,D", "solution": "OSPF使用多播IP地址224.0.0.5或MAC地址01:00:5e:00:00:05来进行AllSPFRouters组的通信。", "topic": [ "OSPF(Open Shortest Path First)开放式最短路径优先协议。" ] }, { "id": "Wired Network-822", "type": 1, "question": "您正在配置Bob的计算机以访问互联网。以下哪些是必需的?(选择所有适用项。)", "choices": [ "DNS服务器地址", "网关地址", "电子邮件服务器名称", "DHCP服务器地址", "域名" ], "answer": "A,B", "solution": "为了上网,需要DNS服务器地址,这样计算机才能从输入的域名中获取解析后的IP地址。网关地址是获取网络外部连接所必需的。", "topic": [] }, { "id": "Wired Network-823", "type": 1, "question": "以下哪个应用层协议包括一个程序,使用户能够登录到网络设备并使用命令行界面在远程系统上执行命令?(选择所有适用项。)", "choices": [ "远程登录协议(Telnet)", "文件传输协议(FTP)", "简单网络管理协议(SNMP)", "域名系统(DNS)", "Nslookup(网络系统查询工具)" ], "answer": "A,B", "solution": "Telnet和FTP都是包括命令行客户端应用程序的协议,其中Telnet提供终端仿真和FTP文件传输功能。SNMP和DNS都是应用层协议,但两者都不包括程序。Nslookup具有命令行界面,但它在本地系统上执行命令,而不是远程系统。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-824", "type": 1, "question": "Ralph正在配置一台工作站上的新电子邮件客户端,以使用简单邮件传输协议(SMTP)和邮局协议(POP3)电子邮件协议。他希望两个协议在与电子邮件服务器通信时都使用加密。以下哪些端口号应该由Ralph用于使用传输层安全性(TLS)来保护SMTP连接和使用安全套接字层(SSL)加密来保护POP3连接?(选择所有适用项。)", "choices": [ "110", "25", "587", "993", "995" ], "answer": "C,E", "solution": "SMTP使用TLS协议时使用端口号587。POP3使用SSL协议时使用端口号995。端口号25和110用于未加密的SMTP和POP3。端口号995用于SSL协议下的Internet消息访问协议(IMAP)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-825", "type": 1, "question": "以下哪些自治系统是私有的?(选择两个。)", "choices": [ "64,512到65,534。", "65,000到65,534", "42亿到42.949亿6929。", "4,265,000到4,265,535,016。" ], "answer": "A,C", "solution": "ASNs 64,512到65,535是16位ASN范围内的私有ASN,4,200,000,000到4,294,967,294是扩展32位范围内的私有ASN。", "topic": [ "BGP(Border Gateway Protocol):边界网关协议,是一种用于在互联网中交换路由信息的协议。" ] }, { "id": "Wired Network-826", "type": 1, "question": "以下哪些可能是问题的来源?(选择所有适用项。)\n\n- The data cable is faulty.\n- The patch cable is faulty.\n- The network switch is faulty.\n- The patch panel is faulty.\n- The computer's network card is faulty.\n- The wall plate is faulty.", "choices": [ "DNS服务器出现故障。", "该交换机端口已禁用。", "NAT服务器未正常运行。", "该交换机已配置使用端口安全。" ], "answer": "B,D", "solution": "在许多网络上,通常会禁用未使用的交换机端口,以防未经授权的个人将设备插入其中。一些网络还使用端口安全性,其中交换机配置了访问控制列表(ACL),指定允许使用它们的设备的媒体访问控制(MAC)地址。这两者都可能是 Ralph 问题的源头。因为没有其他网络用户报告问题,因此故障服务(如网络地址转换(NAT)和域名系统(DNS))不太可能是原因。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-827", "type": 1, "question": "您已被客户聘请,将距离500米的两个不同建筑物中的本地区域网络连接在一起。您使用的电缆类型必须支持千兆以太网数据速率1000兆位每秒(Mbps),并提供高水平的抗电磁干扰(EMI)。以下哪种电缆类型可以选择以满足客户的需求?(选择所有适用项。)", "choices": [ "单模光纤电缆", "细同轴电缆", "多模光纤电缆", "屏蔽双绞线(STP)电缆", "未屏蔽双绞线(UTP)电缆" ], "answer": "A,C", "solution": "任何类型的光纤电缆都能满足客户的要求。光纤电缆支持所需的1000 Mbps数据传输速率,并可连接距离为500米的网络。光纤电缆也不受电磁干扰的影响。虽然多模和单模光纤都能满足公司的一般需求,但多模光纤比单模光纤便宜得多。双绞线(STP或UTP)可以满足数据传输速率,但不支持超过100米的连接。细同轴电缆不支持数据传输速率或距离超过185米的连接。", "topic": [] }, { "id": "Wired Network-828", "type": 1, "question": "哪些命令可以用于查看CUBE上活动呼叫的信息?(选择两个。)", "choices": [ "显示魔方状态。", "显示活动语音呼叫简要信息。", "显示版本", "显示运行配置。", "显示VoIP RTP连接。" ], "answer": "B,E", "solution": "\"show call active voice brief\" 可以用于查看有关活动通话的信息,例如通话的总时间、发送/接收的媒体数据包、每个通话腿上使用的拨号对等体以及许多其他标识符。\"show voip rtp connections\" 可以用于查看由信令协商的本地和远程媒体信息。", "topic": [ "CUBE呼叫路由和数字操作" ] }, { "id": "Wired Network-829", "type": 1, "question": "REST和RESTful是什么?(选择两个。)", "choices": [ "REST代表表述性状态转移。", "REST是一种基于HTTP的协议,为访问在YANG中定义的数据提供编程接口。", "RESTful指的是应用REST架构概念编写的Web服务,它们被称为RESTful服务。", "RESTful指的是通过向实现XML-RPC的服务器发送HTTP请求并接收HTTP响应来执行RPC的Web服务。" ], "answer": "A,C", "solution": "REST代表表述性状态转移;它是编写Web API的相对较新的方面。答案B和D是不正确的,因为REST/RESTful API不是开发人员在创建API时遵循的一组规则。", "topic": [ "网络APIs" ] }, { "id": "Wired Network-830", "type": 1, "question": "在将内部双绞线电缆连接到插入墙板的插座连接器时,您可能会使用以下哪些工具?(选择所有适用项。)", "choices": [ "一个压接工具", "一种割线工具。", "猪尾接头", "一种剥线钳", "一台熔接机" ], "answer": "B,D", "solution": "打线钳对于这个操作至关重要。该工具可以一次性将绝缘层从电线上剥离,将其压入连接器中,并在末端切断多余部分。电线剥皮器可以简化准备电缆连接过程的任务。压接钳仅用于将连接器连接到补丁线上。猪尾式接头和熔接接头仅用于光纤网络。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-831", "type": 1, "question": "你是一名初级IT管理员,高级IT管理员刚刚设置了代理服务器,因此你需要为每台工作站添加设置。在Windows设置的网络和Internet组中正确设置代理服务器,你需要哪些信息?(选择两个。)\n\n答案:代理服务器的IP地址和端口号。", "choices": [ "代理服务器的IP地址", "路由器的IP地址", "DHCP服务器的IP地址", "代理服务器使用的端口号。" ], "answer": "A,D", "solution": "在Windows设置中设置代理服务器,您只需要使用服务器的IP地址和端口号即可。您可能还应该勾选“不使用代理服务器来访问本地(内部网络)地址”的框。除非路由器也充当代理服务器,否则您不需要路由器的IP地址或DHCP服务器的IP地址。路由器决定数据包是否属于局域网或其他网络,DHCP服务器的工作是为登录到网络的设备提供IP地址和其他设置。", "topic": [ "操作系统" ] }, { "id": "Wired Network-832", "type": 1, "question": "多协议交换机是执行与开放式系统互联 (OSI) 参考模型的两个不同层次相关的功能的设备。以下哪两个层次通常与网络交换相关联?(选择所有适用项。)", "choices": [ "应用程序", "展示", "会话", "运输", "网络", "数据链路", "物理的" ], "answer": "E,F", "solution": "网络交换机的主要功能是根据媒体访问控制(MAC)地址处理数据包,因此它是数据链路层设备。然而,多协议交换机是可以根据IP地址执行路由功能的设备,这是在网络层操作的。交换机通常不与OSI模型的其他层相关联。", "topic": [] }, { "id": "Wired Network-833", "type": 1, "question": "以下哪些可能是她的问题的原因?(选择所有适用项。)\n\n- The wireless signal is weaker in her new location.\n- There are too many devices connected to the wireless network in her new location.\n- Her laptop's wireless adapter is malfunctioning.\n- The company's IT department has changed the wireless network settings.", "choices": [ "特里克西的新办公室距离接入点(AP)比她以前的办公室更远。", "她的笔记本电脑连接到了错误的SSID。", "AP正在使用全向天线。", "Trixie的新办公室和AP之间有太多的墙。" ], "answer": "A,D", "solution": "距离接入点更远或中间隔着的墙壁干扰都可能导致无线信号变弱,从而导致Trixie遇到的间歇性连接问题。错误的服务集标识符(SSID)会阻止Trixie的笔记本电脑连接到网络。全向天线会在各个方向上产生信号,这不会解决Trixie的问题。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-834", "type": 1, "question": "以下哪些术语用于描述网络电缆连接所在的中心枢纽?(选择所有适用项。)\n\n网络电缆通常连接办公室终端点(例如墙板)到中央布线枢纽,通常在那里将这些连接加入到将它们连接在一起的骨干网络中。\n\n答案:中央布线枢纽,骨干网络。", "choices": [ "RDP", "IDF", "MDF", "MTBF" ], "answer": "B,C", "solution": "一个大型企业网络至少会有电话服务的分界点和连接到互联网服务提供商(ISP)网络的接入点。在许多情况下,这些服务进入建筑物的同一设备房,该设备房还容纳了骨干交换机,使网络上的所有设备都能访问这些资源。这个房间被称为主配线架(MDF)。中间配线架(IDF)是一个本地化电信设备的位置,例如水平布线和骨干之间的接口。例如,一个位于单个建筑物中的企业网络可能在地下室有其MDF,在每个楼层都有一个IDF。平均故障间隔时间(MTBF)和远程桌面协议(RDP)不是网络布线位置。", "topic": [] }, { "id": "Wired Network-835", "type": 1, "question": "Ed正在解决一些网络性能问题。在尝试了许多其他可能性之后,他正在检查办公室吊顶中的双绞线电缆。他发现一些电缆已经损坏,显然是由在那个空间工作的电工造成的。在某些情况下,电缆护套沿其长度被分开,内部的一些绝缘也被刮掉了。以下哪些故障可能是由此损坏引起的?(选择所有适用项。)\n\n- Signal attenuation 信号衰减\n- Crosstalk 串扰\n- Electromagnetic interference 电磁干扰\n- All of the above 以上所有", "choices": [ "断路。", "短路。", "拆分成对。", "交叉接线" ], "answer": "A,B", "solution": "开路可能是由电缆内部某处的电线断裂或一个或两个连接器中的引脚连接不良引起的。短路是指电线连接到电缆一端的两个或多个引脚,或者两个或多个电线的导体在电缆内部接触。在这种情况下,电缆的损坏可能导致任一条件。分裂对是指两根电线在电缆两端被错误地映射。交换对是指一对电线在电缆一端连接到错误的引脚。这两种故障都是由于安装过程中的错误布线引起的,而不是由损坏的电缆引起的。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-836", "type": 1, "question": "以下哪些可能是问题的原因?(选择所有适用项。)\n\n- The router is blocking traffic on UDP port 53.\n- The DNS server is down.\n- The DNS server is configured to only respond to requests from certain IP addresses.\n- There is a problem with Ralph's network connection.\n- The `nslookup` utility is not installed on Ralph's computer.", "choices": [ "连接网络的路由器没有运行DNS,也不会转发这种类型的数据报。", "远程服务器上的DNS进程未运行。", "你计算机上的TCP/IP主机配置设置不正确。", "DNS服务器计算机上的TCP/IP主机配置未正确配置。", "有一个防火墙阻止了DNS服务器的UTP 53端口。" ], "answer": "B,E", "solution": "问题的一个可能原因是远程服务器上的DNS进程已损坏或未运行。另一个可能的原因是防火墙阻止访问服务器的未屏蔽双绞线(UTP)端口53。这两种情况都会使端口无法访问。服务器上的传输控制协议/互联网协议(TCP/IP)客户端正在运行,如“ping”实用程序所验证的那样。这意味着Ralph计算机和DNS服务器上的IP主机配置都正常工作。路由器不需要运行DNS来转发数据报。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-837", "type": 1, "question": "以下哪些是RESTful API请求允许的HTTP方法?(选择三个答案。)", "choices": [ "获取", "提交", "向下", "放置" ], "answer": "A,B,D", "solution": "GET、POST、PUT和DELETE是REST API请求允许使用的HTTP方法。", "topic": [ "自动化和脚本工具" ] }, { "id": "Wired Network-838", "type": 1, "question": "以下哪些无线IEEE标准在2.4 GHz无线电频率上运行并且直接兼容?(选择两个。)", "choices": [ "802.11a是一种无线网络标准,工作在5GHz频段,最高传输速率可达54Mbps。", "802.11b是一种无线网络标准,也称为Wi-Fi标准,它使用2.4GHz频段进行通信,最高传输速率为11Mbps。", "802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的数据传输速度和更好的网络性能。", "802.11g是一种无线网络标准,它支持2.4GHz频段,最高传输速率为54Mbps。" ], "answer": "B,D", "solution": "802.11b和802.11g都在2.4 GHz范围内运行,并使用类似的传输标准。一些旧设备被列为802.11b/g,意味着它们可以与任一系统配合使用。另外,802.11a和802.11ac在5 GHz范围内运行。", "topic": [ "无线和SOHO网络" ] }, { "id": "Wired Network-839", "type": 1, "question": "历史上用于管理网络设备的协议有哪些?(选择两个。)", "choices": [ "SMTP", "SSH", "TFTP", "Telnet", "SNNP" ], "answer": "B,D", "solution": "历史上,网络设备是通过命令行界面(CLI)使用诸如Telnet和Secure Shell(SSH)等协议进行管理的。", "topic": [ "基础设施自动化" ] }, { "id": "Wired Network-840", "type": 1, "question": "以下哪些协议使用术语“数据报”来描述它创建的数据传输单元?(选择所有适用项。)", "choices": [ "Ethernet", "IP", "TCP", "UDP" ], "answer": "B,D", "solution": "术语“数据报”通常由提供无连接传递服务的协议使用。TCP/IP套件中的两个主要无连接协议是Internet协议(IP)和用户数据报协议(UDP),它们都使用术语“数据报”。以太网使用术语“帧”,传输控制协议(TCP)使用“段”。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-841", "type": 1, "question": "哪些答案列出了可以帮助使路由器接口G0/0准备好路由数据包的任务?(选择两个答案。)", "choices": [ "在G0/0配置模式下配置ip地址_地址掩码_命令。", "在G0/0配置模式下配置IP地址_address_和IP掩码_mask_命令。", "在G0/0配置模式下配置no shutdown命令。", "在G0/0配置模式下设置接口描述。" ], "answer": "A,C", "solution": "为了在接口上路由数据包,路由器接口配置必须包括IP地址和掩码。一个正确的命令显示了用于配置这两个值的正确单个命令,而一个不正确的命令将这些设置显示为两个单独的命令。此外,为了路由数据包,接口必须达到“up/up”状态;也就是说,“show interfaces”和其他命令列出了两个状态值,两者都必须是“up”。\"no shutdown\"命令启用接口。", "topic": [ "操作思科路由器" ] }, { "id": "Wired Network-842", "type": 1, "question": "HTTP函数用于API通信的有哪些?(选择三个。)", "choices": [ "获取", "来源", "清除,清洗,净化", "补丁", "放置" ], "answer": "A,D,E", "solution": "SOURCE和PURGE不存在。GET、POST、PUT、PATCH和DELETE是HTTP函数。", "topic": [ "应用程序编程接口(API)" ] }, { "id": "Wired Network-843", "type": 1, "question": "使用以下哪种设备的计算机将被视为传统设备?(选择所有适用项。)", "choices": [ "一个386处理器", "IPX/SPX协议", "一个在1983年开发的应用程序", "1 GB的内存" ], "answer": "A,B,C", "solution": "传统系统是指使用旧硬件、软件或网络协议的系统,这些协议在今天并不常用。一个只有1GB内存的系统可能会非常低效,但这本身并不意味着它是一个传统系统。", "topic": [ "网络服务、虚拟化和云计算" ] }, { "id": "Wired Network-844", "type": 1, "question": "最初,存储区域网络(SAN)仅专用于基于存储的流量。局域网(LAN)也需要用于其他类型的流量。然而,今天,SAN和LAN流量可以共存于单个网络介质上。以下哪些SAN协议能够与标准LAN流量共享网络介质?(选择所有适用项。)", "choices": [ "无限带宽(InfiniBand)", "光纤通道", "iSCSI(Internet Small Computer System Interface)是一种基于IP网络的存储协议,用于在计算机之间传输数据块。它允许远程访问存储设备,使得多个计算机可以共享存储资源。", "FCoE" ], "answer": "C,D", "solution": "iSCSI协议运行在标准IP网络上,而基于以太网的光纤通道(FCoE)变体则运行在标准以太网网络上。这两种协议都可以与局域网流量共享网络,尽管通常建议使用服务质量(QoS)机制。原始的光纤通道实现和InfiniBand都需要一个专用的网络介质,不支持局域网流量。", "topic": [] }, { "id": "Wired Network-845", "type": 1, "question": "在IPv6 ACL中,必须允许什么才能形成EIGRPv6邻居关系?", "choices": [ "FF02::A", "FF02::10", "The link-local address of the neighboring device", "The global address of the neighboring device" ], "answer": "A,C", "solution": "为了形成EIGRPv6邻居关系,IPv6 ACL必须允许邻居设备的链路本地地址和FF02::A多播地址。", "topic": [ "EIGRPv6(Enhanced Interior Gateway Routing Protocol version 6):增强型内部网关路由协议第6版。" ] }, { "id": "Wired Network-846", "type": 1, "question": "DHCP客户端使用广播消息来联系本地子网上的DHCP服务器。以下哪些机制可以在本地子网上没有DHCP服务器时将DHCP广播消息转发到另一个子网上的DHCP服务器?(选择所有适用项。)", "choices": [ "DHCP中继", "UDP转发", "区域传输", "IP帮助程序" ], "answer": "A,B,D", "solution": "DHCP中继、UDP转发和IP助手都是路由器机制,执行相同的任务,将一个子网上的广播消息转发到另一个子网上的特定IP地址作为单播消息。这使得DHCP客户端可以联系另一个子网上的DHCP服务器以获取IP地址。区域传输是DNS区域复制机制,DHCP客户端或服务器不使用该机制。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-847", "type": 1, "question": "在其默认配置下,自主AP的以下哪些说法是正确的?(选择所有适用项。)", "choices": [ "两个收音机都已启用。", "两台收音机都已禁用。", "未配置任何SSID。", "配置了一个SSID(“Cisco”)。" ], "answer": "B,C", "solution": "无线电已被禁用,也没有配置任何SSID。这会防止接入点在您正确配置之前变为活动状态。", "topic": [ "实现自主和云部署" ] }, { "id": "Wired Network-848", "type": 1, "question": "数据中心网络管理器(DCNM)可以部署在以下哪些变体中?(选择三个答案。)", "choices": [ "经典局域网", "局域网结构", "数据中心局域网", "SAN管理" ], "answer": "A,B,D", "solution": "DCNM可以以四种变体部署,分别是经典LAN、LAN Fabric、媒体控制器和SAN管理。", "topic": [ "评估自动化和编排技术" ] }, { "id": "Wired Network-849", "type": 1, "question": "哪些EIGRP数据包类型使用组播发送?(选择所有适用项。)", "choices": [ "Hello", "Reply", "Acknowledgement", "Update", "Query" ], "answer": "A,D,E", "solution": "邻居关系是通过hello数据包发现和维护的。这些数据包使用组播发送。更新消息用于向邻居发送路由信息。这些数据包可以通过单播发送到一个邻居,也可以通过组播发送到多个邻居。它们使用可靠传输协议发送。当路由器失去到网络的路径时,EIGRP使用查询数据包。路由器向其邻居发送查询数据包,询问它们是否有关于该网络的信息。这些数据包通过组播和使用可靠传输协议发送。", "topic": [ "第三层技术" ] }, { "id": "Wired Network-850", "type": 1, "question": "在使用控制器GUI创建新的WLAN时,以下哪些参数是必需的?(选择所有适用项。)", "choices": [ "SSID(Service Set Identifier)", "VLAN编号", "界面", "BSSID(基本服务集标识符)", "IP子网。" ], "answer": "A,C", "solution": "SSID和控制器接口是列表中唯一必需的参数。VLAN号码不是必需的,因为在配置控制器接口时会提供它。", "topic": [ "构建无线局域网" ] }, { "id": "Wired Network-851", "type": 1, "question": "以下哪种双绞线电缆类型支持仅使用两对线路就能同时支持10兆位每秒(Mbps)和100 Mbps数据传输速率?(选择所有适用项。)", "choices": [ "三类(CAT3)", "五类网线(CAT5)", "五类双绞线(CAT5e)", "第六类网线(CAT6)" ], "answer": "B,C,D", "solution": "CAT5电缆是最初的电缆标准,旨在实现高达100 Mbps的传输速率。CAT5e和CAT6支持100 Mbps,并且也被评为支持高达1000 Mbps的数据速率。这三种标准也支持10 Mbps的传输速率。CAT3可以支持10和100 Mbps,但需要四对线缆才能支持100 Mbps。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-852", "type": 1, "question": "在端口交换模式下,Cisco UCS单播流量路径中哪些特征是正确的?(选择两个答案。)", "choices": [ "每个服务器链接都被固定为一对多的上行端口。", "服务器之间的第二层流量被固定到上行端口。", "服务器到网络的流量通过其固定的上行端口发送。", "服务器之间的第二层流量是本地交换的。", "服务器到网络的流量是本地交换的。" ], "answer": "C,D", "solution": "Cisco UCS中的单播流量具有以下特点。", "topic": [ "思科统一计算系统概述" ] }, { "id": "Wired Network-853", "type": 1, "question": "如果使用所有默认的OSPF设置,具有路由器ID 1.1.1.1和2.2.2.2的路由器R1和R2通过以太网WAN链路连接。如果WAN链路同时为两个路由器初始化,则以下哪些答案是正确的?(选择两个答案。)", "choices": [ "路由器R1将成为DR。", "路由器R1将动态地发现路由器R2的存在。", "路由器R2既不是DR也不是BDR。", "路由器R1的show ip ospf neighbor命令将列出R2的状态为“FULL/DR”。" ], "answer": "B,D", "solution": "默认情况下,IOS将以广播方式分配OSPF网络类型的以太网接口,并将OSPF接口优先级设置为1。因此,两个路由器都尝试在链接上发现其他路由器(这是确定答案的一种方式)。", "topic": [ "OSPF网络类型和邻居" ] }, { "id": "Wired Network-854", "type": 1, "question": "以下哪个陈述是关于WLC上组播消息的正确说法?", "choices": [ "控制器可以通过多播组地址向其他控制器发送移动性消息。", "移动组播组地址必须与CAPWAP组播组地址相同。", "为了在控制器之间进行多播移动性消息,每个控制器必须有一个唯一的多播组地址。", "同一移动性组中的所有控制器必须具有相同的移动性组播组地址。" ], "answer": "A,D", "solution": "同一移动性组中的控制器可以通过组播向彼此发送移动性事件消息。所有控制器必须配置为使用相同的组播移动性组地址。移动性组播消息的操作与CAPWAP组播组无关。", "topic": [ "实现多播" ] }, { "id": "Wired Network-855", "type": 1, "question": "假设客户希望潜在用户在获得无线网络访问权限之前输入用户名和密码。以下哪些项目可以添加到您的无线设计要求列表中以满足客户的要求?", "choices": [ "RADIUS服务器", "AAA服务器", "ISE服务器", "AES服务器" ], "answer": "A,B,C", "solution": "客户需要用户认证,因此您可以利用RADIUS、AAA或ISE服务器来满足这个需求。AES不能用于用户认证,因为它是一种加密标准。", "topic": [ "无线设计要求" ] }, { "id": "Wired Network-856", "type": 1, "question": "哪些网络协议支持基于模型的可编程性?(选择三个。)", "choices": [ "网络配置协议(NETCONF)", "RESTCONF(RESTful Configuration Protocol)", "SSH(Secure Shell)安全外壳协议。", "gRPC(全称为Google Remote Procedure Call)是一种高性能、开源的远程过程调用(RPC)框架,由Google开发。它可以在多种语言之间进行通信,并支持多种序列化协议。" ], "answer": "A,B,D", "solution": "有三种基于标准的可编程接口可用于操作YANG数据模型:NETCONF、RESTCONF和gRPC。", "topic": [ "模型驱动的可编程性" ] }, { "id": "Wired Network-857", "type": 1, "question": "以下哪些关于备份防火墙状态和备份其配置的说法是正确的?(选择所有适用的选项。)", "choices": [ "防火墙状态的备份包含的数据比其配置的备份更多。", "防火墙配置的备份包含的数据比其状态备份更多。", "防火墙状态的备份包含与其配置备份完全相同的数据。", "防火墙状态的备份包括其配置。", "防火墙配置的备份包括其状态。" ], "answer": "A,D", "solution": "防火墙状态的备份包括其配置以及其他元素,例如模板和策略。因此,状态包含的数据比配置更多。", "topic": [ "网络运营" ] }, { "id": "Wired Network-858", "type": 1, "question": "哪些UCS接口支持目的地流量监控?(选择两个答案。)", "choices": [ "以太网", "虚拟网络适配器 (vNIC)。", "光纤通道", "FCoE端口" ], "answer": "A,C", "solution": "目标端口的类型决定了您需要哪种监视会话。对于以太网流量监视会话,目标端口必须是未配置的物理端口。对于光纤通道流量监视会话,目标端口必须是光纤通道上行端口,除非您正在使用Cisco UCS 6454 Fabric Interconnects和6300 Series Fabric Interconnects。", "topic": [ "思科统一计算基础设施监控" ] }, { "id": "Wired Network-859", "type": 1, "question": "以下哪两个是面向连接的协议?", "choices": [ "动态主机配置协议(DHCP)", "TFTP(Trivial File Transfer Protocol)简易文件传输协议", "安全超文本传输协议(HTTPS)", "SSH(Secure Shell)安全外壳协议。" ], "answer": "C,D", "solution": "面向连接的协议使用TCP工作,它保证数据包的传递。这种保证需要比UDP更多的资源,因为UDP是无连接的,因此不需要在未收到数据包时重新发送。HTTPS和SSH是面向连接的协议,而Trivial File Transfer Protocol(TFTP)和DHCP是无连接的协议。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-860", "type": 1, "question": "以下哪些LLDP命令可以识别Hannah硬件的型号?(选择两个答案。)", "choices": [ "显示邻居。", "显示邻居 Hannah。", "显示 lldp。", "显示LLDP接口。", "显示LLDP邻居。", "显示 LLDP 条目 Hannah。" ], "answer": "E,F", "solution": "“show lldp neighbors”命令每个邻居只列出一行输出。但是,它会列出邻居的平台信息,通常包括硬件型号。而“show lldp entry Hannah”命令则列出有关相邻路由器的一组消息,包括更多有关硬件型号和IOS版本的详细信息。", "topic": [ "设备管理协议" ] }, { "id": "Wired Network-861", "type": 1, "question": "一个工程师配置了一个ACL但忘记保存配置。此时,以下哪些命令显示IPv4 ACL的配置,包括行号?(选择两个答案。)", "choices": [ "显示当前配置。", "显示启动配置。", "显示IP访问列表。", "显示访问列表。" ], "answer": "C,D", "solution": "\"show ip access-lists\"和\"show access-lists\"命令都显示IPv4访问列表的配置,包括ACL行号。 \"show running-config\"和\"show startup-config\"命令都不列出ACL行号;在这种情况下,启动配置文件将不包含ACL配置。", "topic": [ "高级IPv4访问控制列表" ] }, { "id": "Wired Network-862", "type": 1, "question": "以下哪些关于FCoE NPV的陈述是正确的?(选择三个答案。)", "choices": [ "FCoE NPV实现了FIP监听作为NPV功能的扩展,同时保留了NPV的流量工程、VSAN管理、管理和故障排除方面的功能。", "FCoE NPV桥与FCF之间的连接仅支持点对多点链接。", "从控制平面的角度来看,FCoE NPV对FCF和主机执行代理功能,以便将主机的登录均匀地负载平衡到可用的FCF上行端口上。", "一个FCoE NPV桥接器是VSAN感知的,并且能够为主机分配VSAN。" ], "answer": "A,C,D", "solution": "FCoE NPV桥接到FCF的连接仅支持点对点链接。", "topic": [ "实施FCoE统一网络。" ] }, { "id": "Wired Network-863", "type": 1, "question": "你正在公司的筛选子网(也称为边界网络)上工作,该子网有五台Linux Web服务器,一台Cisco路由器,一台提供租用线路连接的CSU/DSU,以及一台基于Windows的防火墙。在尝试解决网络通信故障时,你在其中一台系统上键入了以下命令:`traceroute` `[adatum.com](http://adatum.com)`。你可能正在使用以下哪些系统?(选择所有适用的选项。)", "choices": [ "思科路由器", "Linux网络服务器之一", "CSU/DSU控制台", "基于Windows的防火墙" ], "answer": "A,B", "solution": "Linux和Cisco IOS操作系统都包括traceroute实用程序。Windows有自己的实用程序版本,但它被称为“tracert”。CSU/DSU无法运行traceroute命令。", "topic": [] }, { "id": "Wired Network-864", "type": 1, "question": "以下哪些协议使用隧道技术在TCP/IP系统之间建立安全连接?(选择所有适用的选项。)", "choices": [ "L2TP", "IPSec", "MGRE", "NAT" ], "answer": "A,B,C", "solution": "第二层隧道协议(L2TP)、Internet协议安全(IPSec)和多点通用路由封装(MGRE)都是将数据包以加密形式封装在另一个协议中以保护其内容的协议。网络地址转换(NAT)通过在使用私有地址生成的数据包中替换公共IP地址,使私有网络上的工作站能够访问互联网。NAT不使用隧道技术。", "topic": [] }, { "id": "Wired Network-865", "type": 1, "question": "你的朋友再次考虑他们公寓的网络配置。他们问你2.4 GHz和5 GHz网络上的频道有什么区别。你会告诉他们什么?(选择两个。)", "choices": [ "如果他们正在使用2.4 GHz网络,他们应该选择1、6或11信道,因为它们不会相互重叠。", "5 GHz网络频道提供更大的带宽,因此数据可以更快地传输,但它们可能会与邻居的信号产生更多的干扰。", "5 GHz频率被认为已经过时,因此应该使用2.4 GHz频率。", "所有的5 GHz频率都重叠,因此会有更大的干扰。" ], "answer": "A,B", "solution": "选项A是正确的。在2.4 GHz网络中,通道1、6和11是唯一不重叠的通道。选项B也是正确的。2.4 GHz网络中每个通道只有大约5 MHz的宽度,而在5 GHz网络中,最小宽度为20 MHz,但可以通过组合通道来配置为40 MHz或80 MHz。选项C是错误的。2.4 GHz频率支持旧设备;5 GHz频率是较新的。虽然2.4 GHz通道除了1、6和11之外都会重叠,但5 GHz通道不会重叠。您的朋友需要选择与其设备兼容的频率和通道,但如果使用5 GHz频率,路由器可能会自动配置通道。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-866", "type": 1, "question": "以下哪些解释了为什么通过添加路由器将大型交换式以太网LAN分成两个LAN可以帮助缓解交通拥堵并提高性能?(选择所有适用项。)", "choices": [ "添加路由器可以减少两个局域网上的广播流量。", "添加路由器可以减少两个局域网上的单播流量。", "添加路由器可以将流量转移到网络中的另一条路径。", "添加路由器可以防止一个局域网上的计算机与另一个局域网上的计算机通信。" ], "answer": "A,B", "solution": "添加路由器将以太网局域网分成两个局域网,创建两个独立的广播域。因此,每台计算机需要处理的广播消息数量更少。由于路由器分割了网络,因此每个子网上的单播流量量也减少了。", "topic": [ "网络实现" ] }, { "id": "Wired Network-867", "type": 1, "question": "哪些第一层设备可以用来扩大单个LAN段覆盖的区域?(选择两个。)", "choices": [ "防火墙", "网络接口控制器(NIC)", "集线器。", "中继器", "RJ-45转换器" ], "answer": "C,D", "solution": "并不是说你真的想要扩大单个碰撞域,但是一个集线器(多端口中继器)可以为你提供这个功能。", "topic": [ "开放系统互联规范" ] }, { "id": "Wired Network-868", "type": 1, "question": "**show ipv6 protocols** 的输出可以用于验证以下哪两个内容?(选择两个。)", "choices": [ "路由器ID", "哪些区域是普通区、Stub区和非完全Stub区。", "参与路由过程的接口。", "指定路由器的ID。" ], "answer": "A,C", "solution": "使用“show ipv6 protocols”命令,您可以验证路由器ID以及参与路由过程的接口。", "topic": [ "OSPFv3故障排除" ] }, { "id": "Wired Network-869", "type": 1, "question": "以下哪些关于这些选项之间的差异的陈述是正确的?(选择所有适用的选项。)\n\nRalph正在为公司的新分支机构设计数据中心。他正在考虑各种选项,包括在分支机构设施建立新的数据中心,使用共同托管的数据中心以及使用公共云提供商创建虚拟数据中心。", "choices": [ "一个共同部署的数据中心比分支机构或公共云数据中心更便宜实施。", "在分支机构或共同托管的数据中心中,Ralph的公司将拥有硬件设备。", "在所有三个数据中心选项中,Ralph公司的管理员将负责设置和管理硬件。", "在分支机构或共同托管的数据中心中,Ralph的公司将负责所有公用事业费用,包括供暖、制冷和电力。", "公共云数据中心的物理安全性将比其他两个选项更高。", "公共云数据中心比托管或分支机构数据中心更容易扩展。" ], "answer": "B,F", "solution": "在一个共同托管的数据中心中,客户将自己的服务器和其他硬件设备放置在共享的第三方设施中。因此,Ralph的公司将拥有分支机构或共同托管数据中心中的硬件设备。与其他选项相比,公共云中的数据中心更容易扩展,因为只需要创建额外的虚拟设备。共同托管数据中心的实施成本将比分支机构数据中心低,但公共云选项需要最小的初始支出。管理员将在分支机构或共同托管数据中心中设置和管理硬件设备,但不会在公共云数据中心中进行。在共同托管的数据中心中,Ralph的公司将与其他租户共享公用事业成本。公共云设施不一定更安全。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-870", "type": 1, "question": "以下哪些关于使用Metro Ethernet WAN和以太网局域网(E-LAN)服务的企业的第三层细节最有可能是正确的?(选择两个答案。)", "choices": [ "广域网使用一个IP子网。", "广域网使用10个或更多的IP子网。", "远程站点路由器将有一个OSPF邻居。", "一个远程站点的路由器将会有10个OSPF邻居。" ], "answer": "A,D", "solution": "E-LAN服务是一种服务,其中Metro以太网服务表现得好像WAN是一个单独的以太网交换机,以便每个设备可以直接与其他设备通信。因此,路由器位于同一子网中。对于一个总部路由器和10个远程站点,每个路由器将有10个OSPF邻居。", "topic": [ "广域网架构" ] }, { "id": "Wired Network-871", "type": 1, "question": "以下哪些是用于VPN实现的协议示例?", "choices": [ "传输控制协议(TCP)", "安全套接字层(SSL)", "用户数据报协议(UDP)", "多协议标签交换(MPLS)", "网络协议安全(IPsec)" ], "answer": "B,D,E", "solution": "MPLS、IPsec、SSL、PPTP 和 GRE 是用于 VPN 实现的协议的示例。", "topic": [ "虚拟专用网络(VPN)介绍" ] }, { "id": "Wired Network-872", "type": 1, "question": "哪些路由协议的管理距离为120?(选择两个。)", "choices": [ "RIPv1(Routing Information Protocol version 1)是一种基于距离向量算法的路由协议,用于在互联网中传递路由信息。", "RIPv2(Routing Information Protocol version 2)", "EIGRP(Enhanced Interior Gateway Routing Protocol)", "开放最短路径优先协议(OSPF)" ], "answer": "A,B", "solution": "RIPv1和RIPv2的AD值均为120。EIGRP的AD值为90,而OSPF的AD值为110。", "topic": [ "路由协议" ] }, { "id": "Wired Network-873", "type": 1, "question": "在周一早上,艾丽斯到达工作岗位后发现有多个用户的电子邮件和电话留言,称他们无法访问会计部门的文件服务器。在故障排除过程的开始阶段,以下哪些是最好的问题?(选择两个。)", "choices": [ "自用户上次能够访问服务器以来发生了什么变化?", "爱丽丝应该应用哪些软件更新到服务器?", "服务器是否遭受了硬盘故障?", "哪些用户报告了问题,他们位于哪里?" ], "answer": "A,D", "solution": "故障排除过程的第一阶段要求艾丽丝通过收集信息来确定问题。了解报告问题的人以及自服务器上次可访问以来发生了什么变化,可以为艾丽丝提供信息,帮助她确定问题是在用户的工作站、网络中的某个地方还是在服务器本身。其他选项旨在测试关于可能原因的理论,这是后来的故障排除阶段。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-874", "type": 1, "question": "以下哪些原因可能导致虚拟链路无法形成?(选择两个。)", "choices": [ "路由器的接口IP地址被用于虚拟链路命令中。", "本地区域 ID 被用于虚拟链路命令中。", "路由器ID被用于虚拟链路命令中。", "过渡区域 ID 在虚拟链路命令中被使用。" ], "answer": "A,B", "solution": "如果路由器的接口IP地址被用于\"virtual-link\"命令或本地区域ID被用于\"virtual-link\"命令,则虚拟链路可能无法形成。", "topic": [ "OSPFv2故障排除" ] }, { "id": "Wired Network-875", "type": 1, "question": "以下哪些协议包含在 iSCSI 数据包中?(选择所有适用项)。", "choices": [ "Ethernet", "IP", "TCP", "UDP", "None of the above" ], "answer": "A,B,C", "solution": "iSCSI在标准IP网络上运行;因此,iSCSI消息在传输层使用传输控制协议(TCP)进行封装,在网络层使用Internet协议(IP),在数据链路层使用以太网。iSCSI不使用用户数据报协议(UDP)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-876", "type": 1, "question": "以下哪两个不是有效的A类网络ID?(选择两个答案。)", "choices": [ "0.0.0", "130.0.0.0", "127.0.0.0", "0.0.0" ], "answer": "B,C", "solution": "A类网络的第一个八位字节范围为1-126(包括1和126),它们的网络ID在最后三个八位字节中都为0。130.0.0.0实际上是一个B类网络(第一个八位字节范围为128-191,包括128和191)。所有以127开头的地址都是保留的,因此127.0.0.0不是一个A类网络。", "topic": [ "分析类别化IPv4网络" ] }, { "id": "Wired Network-877", "type": 1, "question": "以下哪些功能有助于保护网络交换机免受与生成树协议(STP)相关的攻击?(选择所有适用项。)", "choices": [ "BPDU守卫", "根保护(Root guard)", "DHCP欺骗防范。", "地理围栏" ], "answer": "A,B", "solution": "桥接协议数据单元(BPDUs)是交换机运行STP时交换的消息,用于了解交换网络中可用路径和其他交换机状态。交换机只应通过连接到其他交换机的端口接收BPDUs。BPDU守卫是一种功能,可防止BPDU消息通过连接到终端系统(如计算机)的端口到达,从而防止攻击者操纵STP拓扑。根守卫通过强制选择交换网络上的根桥口影响STP的行为。如果没有根守卫,管理员无法强制执行具有冗余交换结构的网络的拓扑结构。", "topic": [ "网络实现" ] }, { "id": "Wired Network-878", "type": 1, "question": "DHCP提供哪些好处?(选择两个。)", "choices": [ "减少了网络端点配置任务和成本。", "消除网络参数配置的单点故障。", "网络配置的分散管理", "网络参数配置的集中管理" ], "answer": "A,D", "solution": "使用DHCP而不是手动配置的一些好处包括集中管理网络参数配置,减少网络端点配置任务和成本。", "topic": [ "IP服务" ] }, { "id": "Wired Network-879", "type": 1, "question": "哪些 `ping` 命令可以验证您的本地 TCP/IP 接口是否正常工作?(选择所有适用项。)", "choices": [ "`ping 204.153.163.2`", "`ping 127.0.0.1`", "`ping localif`", "`ping localhost`", "`ping iphost`" ], "answer": "B,D", "solution": "地址127.0.0.1是专门为本地TCP/IP接口指定的特殊IP地址。主机名localhost是赋予本地接口的主机名。因此,对本地接口的IP地址或主机名进行ping操作将告诉您本地接口是否正常工作。", "topic": [ "网络软件工具和命令" ] }, { "id": "Wired Network-880", "type": 1, "question": "由于设备设计的变化,以下哪种攻击类型现在很少见?(选择所有适用项。)", "choices": [ "VLAN跳跃", "逻辑炸弹", "网络钓鱼", "蓝精灵" ], "answer": "A,D", "solution": "Smurf攻击依赖于路由器转发广播流量。路由器不再转发广播消息,因此Smurf攻击已经失效。同样,虚拟局域网(VLAN)跳跃是一种向交换机发送命令以将端口从一个VLAN转移到另一个VLAN的方法,但现在很少见,因为交换机现在被设计为防止它们。逻辑炸弹是插入到合法软件产品中的代码插入物,当满足特定条件时触发恶意事件。网络钓鱼是指旨在通过某种类型的恶意软件感染用户的虚假电子邮件或网站。这两种攻击类型仍然是常见的。", "topic": [ "网络安全" ] }, { "id": "Wired Network-881", "type": 1, "question": "以下哪些协议支持VLSM、汇总和不连续网络?(选择三个。)", "choices": [ "RIPv1(Routing Information Protocol version 1)是一种基于距离向量算法的路由协议,用于在互联网中传递路由信息。", "IGRP(Interior Gateway Routing Protocol):内部网关路由协议。", "EIGRP(Enhanced Interior Gateway Routing Protocol)", "开放最短路径优先协议(OSPF)", "BGP(边界网关协议)", "RIPv2(Routing Information Protocol version 2)" ], "answer": "C,D,F", "solution": "RIPv1和IGRP是真正的距离向量路由协议,实际上并不能做太多事情——除了建立和维护路由表并使用大量带宽!RIPv2、EIGRP和OSPF不仅建立和维护路由表,而且提供无类路由,允许使用VLSM、汇总和不连续网络。", "topic": [ "路由协议" ] }, { "id": "Wired Network-882", "type": 1, "question": "以下哪两个选项是网络设计基础?(选择两个。)", "choices": [ "安全性", "冗余", "限制条件", "可扩展性", "心态" ], "answer": "A,C", "solution": "解释:该句子中列出的只有约束和心态是网络设计的两个基本要素。安全性和可扩展性都是网络设计的原则。六个网络设计的基本要素是心态、设计用例、业务、约束、要求和“为什么”。", "topic": [ "网络设计" ] }, { "id": "Wired Network-883", "type": 1, "question": "网络延迟可以分解为以下哪些类型?(选择所有适用项。)", "choices": [ "传播延迟(固定)", "时间延迟(可变的)", "序列化延迟(固定)", "处理延迟(固定)", "数据包延迟(固定)", "延迟变化(可变)" ], "answer": "A,C,D,F", "solution": "网络延迟可以分解为传播延迟、序列化延迟、处理延迟和延迟变化。", "topic": [ "服务质量(QoS)" ] }, { "id": "Wired Network-884", "type": 1, "question": "在排除故障时,您应该回答以下哪些问题?(选择三个。)", "choices": [ "你在正确的接口上启用了路由汇总吗?", "你是否将摘要路由与正确的EIGRP自治系统关联起来了?", "你创建了适当的汇总路由吗?", "你是否创建了到NULL0的路由?" ], "answer": "A,B,C", "solution": "当EIGRP汇总路由未显示在AS中预期的路由器上时,您需要确定是否在正确的接口上启用了路由汇总,是否将汇总路由与正确的EIGRP自治系统相关联,并且是否创建了适当的汇总路由。", "topic": [ "IPv4的EIGRP故障排除" ] }, { "id": "Wired Network-885", "type": 1, "question": "以下哪些不是由RFC 1918定义的私有地址空间中的有效IPv4地址?(选择所有适用项。)", "choices": [ "10.16.225.1", "172:33:19:7", "192.168.254.77", "10.255.255.255", "172.15.2.9" ], "answer": "B,E", "solution": "RFC 1918定义了私有地址空间的范围,包括以下几个范围:\n\n* 10.0.0.0–10.255.255.255\n* 172.16.0.0–172.31.255.255\n* 192.168.0.0–192.168.255.255\n\n选项B,172:33:19:7和选项E,172.15.2.9都不在指定的私有B类地址范围内,因此不是有效的私有地址。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-886", "type": 1, "question": "在使用星型拓扑结构的以太网网络中,以下哪些设备可以作为电缆中心,形成星型结构的象征中心?(选择所有适用项。)", "choices": [ "集线器", "路由器", "交换机", "接入点" ], "answer": "A,C", "solution": "集线器或交换机可以作为以太网星型拓扑结构中心的布线枢纽。网络中的每个设备都通过一根电缆连接到集线器或交换机。路由器用于将网络连接到彼此,它们不能作为星型拓扑结构的中心。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-887", "type": 1, "question": "除了802.11标准,哪些无线通信方法也可以在2.4 GHz范围内工作?(选择所有适用项。)", "choices": [ "蓝牙", "卫星", "长距离固定无线", "毫米波。", "近场通信(NFC)" ], "answer": "A,C", "solution": "蓝牙也在2.4 GHz频段运行,长距离固定无线电如果使用未经许可的频率也可以。卫星使用卫星波;5G蜂窝毫米波在24 GHz至86 GHz之间,而NFC使用13.56 MHz。", "topic": [ "无线和SOHO网络" ] }, { "id": "Wired Network-888", "type": 1, "question": "Cisco ASA支持以下哪些类型的日志记录?(选择所有适用项。)", "choices": [ "控制台日志记录", "终端日志记录", "ASDM日志记录", "电子邮件记录", "外部 syslog 服务器日志记录。" ], "answer": "A,B,C,D,E", "solution": "所有这些日志记录功能都受到Cisco ASA的支持。", "topic": [ "网络和主机遥测" ] }, { "id": "Wired Network-889", "type": 1, "question": "以下哪些协议是将ACI备份转发到远程服务器的有效协议?(选择所有适用项。)", "choices": [ "TFTP(Trivial File Transfer Protocol)简易文件传输协议", "FTP(文件传输协议)", "安全文件传输协议(SFTP)", "Sorry, \"SCP\" is not an option and cannot be translated without context. Please provide more information." ], "answer": "B,C,D", "solution": "ACI支持通过FTP、SFTP和SCP转发备份以及恢复备份。", "topic": [ "初始化一个ACI Fabric(ACI网络的初始化)" ] }, { "id": "Wired Network-890", "type": 1, "question": "以下哪些陈述最好地解释了双绞线电缆中的扭曲原因?(选择所有适用项。)\n\n答案:每对电线的扭曲可以减少电磁干扰和串扰。", "choices": [ "扭曲有助于防止相邻线对之间的串扰。", "扭曲的设计使得安装人员更容易将连接器连接到电缆端。", "扭曲部分增加了电缆的弯曲半径容许值,使其更容易安装。", "扭曲可以限制电磁干扰(EMI)对电缆传输信号的影响。", "扭曲有助于防止数据碰撞发生。" ], "answer": "A,D", "solution": "双绞线电缆内部的双绞线对不同线上的信号互相干扰(即所谓的串扰)起到了防止作用。双绞线还提供了对外部电磁干扰的抵抗。双绞线对碰撞没有影响。双绞线对连接器的连接也没有任何帮助。双绞线与电缆的弯曲半径容许值无关。", "topic": [] }, { "id": "Wired Network-891", "type": 1, "question": "暖通空调系统可以使用物联网(IoT)监测以下哪些内容?(选择所有适用项。)", "choices": [ "温度", "压力", "湿度", "打印机", "占用率", "相机", "门锁" ], "answer": "A,B,C,E", "solution": "暖通空调传感器可以测量气候控制区域(如数据中心)的温度和湿度;测量锅炉和压缩机等设备的大气压力;以及测量人员出入情况,以根据人员存在情况控制环境条件。打印机、相机、门锁和其他物理门禁控制设备不属于暖通空调系统的一部分。", "topic": [ "网络实现" ] }, { "id": "Wired Network-892", "type": 1, "question": "在TCP/IP协议中,哪些Open Systems Interconnection(OSI)模型的层没有专门为它们设计的协议?(选择所有适用项。)", "choices": [ "物理的", "数据链路", "网络", "运输", "会话", "展示", "应用程序" ], "answer": "E,F", "solution": "在TCP/IP协议套件中,会话层的功能主要是由传输层协议——传输控制协议(TCP)和用户数据报协议(UDP)实现的。表示层的功能通常由应用层协议实现,尽管一些功能,如加密,也可以由传输层或网络层协议执行。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-893", "type": 1, "question": "EIGRP拓扑表包含哪些属性?(选择所有适用项。)", "choices": [ "目标网络前缀", "跳数", "总路径延迟", "最大路径带宽。", "EIGRP邻居列表" ], "answer": "A,B,C,E", "solution": "EIGRP拓扑表包含目标网络前缀、路径属性(跳数、最小路径带宽、总路径延迟)以及附近的EIGRP邻居列表。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-894", "type": 1, "question": "以下哪种RAID级别提供最小量的可用磁盘空间来实现容错?(选择所有适用项。)", "choices": [ "RAID 0", "RAID 1", "RAID 5", "RAID 10" ], "answer": "B,D", "solution": "独立磁盘冗余阵列(RAID)是一种在多个硬盘驱动器上存储数据的技术,提供容错、增加性能或两者兼备。不同的RAID级别提供不同的功能水平,并具有不同的硬件要求。RAID 1提供磁盘镜像,RAID 10创建镜像条带集。两者通过维护每个存储文件的两个副本来提供容错,可用磁盘空间百分比为50%。一些镜像配置存储每个文件的多个副本,可用空间更少。RAID 0仅提供数据分带,没有容错。RAID 5将磁盘分带(块依次写入每个磁盘)与分布式存储奇偶校验信息相结合,提供至少66%的可用磁盘空间百分比的容错。", "topic": [ "网络运营" ] }, { "id": "Wired Network-895", "type": 1, "question": "以下哪些是记录网络问题或事件的原因?(选择所有适用项。)", "choices": [ "文档使得将呼叫升级到高级技术人员更容易。", "文档使得优先处理行政任务更容易。", "文档使得更容易对每个求助电话进行优先排序。", "文档使得将呼叫升级给一线技术人员更容易。" ], "answer": "A,C", "solution": "当网络问题或事件被报告时,文档工作开始。适当的文档工作可以使一线支持技术人员更容易地确定优先级,并在必要时将呼叫升级给高级技术人员。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-896", "type": 1, "question": "你正在与一个拥有Windows 10个人对等网络的小型工作组客户合作。员工计算机上有一个需要使用X:驱动器的程序。几个计算机用户需要能够访问此驱动器,实际上这是位于经理PC上的共享文件夹。你可以做什么来使其他计算机可以访问此驱动器作为X:?(选择两个。)\n\n1. Map the shared folder as a network drive on each employee computer and assign it the drive letter X:.\n2. Ensure that the manager's PC has file and printer sharing enabled and that the shared folder has the appropriate permissions for the other computers to access it.", "choices": [ "在每台客户端电脑上,打开文件资源管理器,点击“此电脑”,然后点击“映射网络驱动器”。选择X盘符,然后导航到共享资源。", "在经理的电脑上,导航到共享文件夹,然后右键单击它并选择“映射网络驱动器”。", "在经理的电脑上,确保每个将连接到经理电脑的用户都拥有一个用户账户。", "在客户端计算机上创建一个名为“Drive X:”的文件夹,然后在管理员的电脑上将“Drive X:”映射到该文件夹。" ], "answer": "A,C", "solution": "在工作组(点对点)网络中,您首先需要确保每个将使用共享资源的人在管理员的计算机上拥有用户名和密码。然后,在管理员的个人电脑上共享资源,每个员工的电脑上,进入文件资源管理器,单击“此电脑”,然后映射网络驱动器并按照屏幕提示将驱动器X:映射到该共享资源。在Windows 11中,选择略有不同。在文件资源管理器中,单击“此电脑”后,您需要单击功能区中的三个点,然后选择映射网络驱动器。", "topic": [ "操作系统" ] }, { "id": "Wired Network-897", "type": 1, "question": "以下哪些被认为是不重叠的信道?", "choices": [ "2.4GHz频段中的1、2和3通道。", "2.4GHz频段中的1、5和10信道。", "2.4GHz频段中的1、6和11信道。", "5GHz频段中的40、44和48信道。" ], "answer": "C,D", "solution": "在2.4GHz频段中,连续编号的信道太宽,无法避免重叠。只有1、6、11信道之间的间隔足够远,可以避免彼此重叠。在5GHz频段中,所有信道都被认为是不重叠的。", "topic": [ "无线网络基础" ] }, { "id": "Wired Network-898", "type": 1, "question": "一个呼叫流程图包含哪些信息?(选择两个。)", "choices": [ "第一层物理布线信息", "第三层网络路由信息", "第四层传输层信息", "第七层应用程序信息" ], "answer": "C,D", "solution": "呼叫流程图显示第七层应用协议,有时也包括第四层传输信息。第一层、第二层和第三层通常包含在拓扑图中,但不常包含在呼叫流程图中。", "topic": [ "CUBE呼叫路由和数字操作" ] }, { "id": "Wired Network-899", "type": 1, "question": "在哪些模式下,您可以输入命令 **show mac address-table** 并期望获得带有 MAC 表条目的响应?(选择两个答案。)", "choices": [ "用户模式", "启用模式", "全局配置模式", "接口配置模式" ], "answer": "A,B", "solution": "问题中的命令是一个EXEC命令,恰好只需要用户模式访问权限。因此,您可以在用户模式和特权模式下使用此命令。由于它是一个EXEC命令,您不能在配置模式下使用该命令(如问题所示)。请注意,您可以在配置模式下在EXEC命令前加上“do”(例如,“do show mac address-table”)以从任何配置模式内部发出命令。", "topic": [ "使用命令行界面" ] }, { "id": "Wired Network-900", "type": 1, "question": "以下哪些关于开放式最短路径优先(OSPF)路由协议的陈述是正确的?(选择所有适用的选项。)", "choices": [ "OSPF是一种内部网关协议。", "OSPF是一种链路状态路由协议。", "OSPF不支持无类域间路由(CIDR)。", "OSPF在自治系统内共享路由。" ], "answer": "A,B,D", "solution": "OSPF支持CIDR。其他选项都包含正确的陈述。", "topic": [ "网络实现" ] }, { "id": "Wired Network-901", "type": 1, "question": "以下哪些术语是指企业网络的一个区域,由防火墙分隔,其中包含必须从Internet和内部网络都可以访问的服务器?(选择所有适用项。)", "choices": [ "内部网络", "非军事区", "EGP", "无状态网络", "周界网络", "筛选子网" ], "answer": "B,E,F", "solution": "必须从内部网络和互联网都可以访问的服务器通常位于企业的一个区域,称为筛选子网、周界网络或非军事区(DMZ)。该区域通过防火墙与互联网和内部网络分隔开来,防止未经授权的互联网用户访问内部网络。Intranet是内部网络的另一个术语。边缘网关协议(EGP)是一种路由协议,无状态是一种防火墙;两者都不适用于此定义。", "topic": [ "网络安全" ] }, { "id": "Wired Network-902", "type": 1, "question": "CUBE的IP信任列表功能可以配置哪些类型的地址?(选择两个。)", "choices": [ "IPv4(Internet Protocol version 4)是互联网协议的第四个版本,它是一种用于在互联网上传输数据的协议。IPv4使用32位地址来标识网络上的设备,它是互联网上最常用的协议之一。", "IPv6(Internet Protocol version 6)", "域名", "电话号码" ], "answer": "A,B", "solution": "只有IPv4和IPv6地址可以使用IP信任列表功能进行显式配置。", "topic": [ "CUBE互通功能" ] }, { "id": "Wired Network-903", "type": 1, "question": "以下哪些是您可以在路由组上配置的分发算法?(选择两个。)", "choices": [ "最长空闲时间", "自上而下", "自下而上", "循环的,圆形的。", "随机化的" ], "answer": "B,D", "solution": "路由组有两个选项可用:自上而下和循环。线路组还有最长空闲选项,但这在路由组上不可用。", "topic": [ "统一通信管理器呼叫路由和数字操作" ] }, { "id": "Wired Network-904", "type": 1, "question": "在具有循环调度的三个队列和一个包含所有语音流量的低延迟队列的排队系统中,循环调度队列1主要包含UDP流量,而循环调度队列2和3主要包含TCP流量。每个队列中的数据包根据QoS设计具有各种DSCP标记。在哪些队列中使用拥塞避免(丢包管理)工具是有意义的?(选择两个答案。)", "choices": [ "左下腹部(LLQ)", "队列 1", "队列 2", "队列 3" ], "answer": "C,D", "solution": "流量控制依赖于TCP的行为,因为TCP连接由于TCP拥塞窗口计算而减缓发送数据包。语音流量使用UDP,而问题说明队列1使用UDP。因此,队列2和队列3是使用拥塞管理工具的合理选择。", "topic": [ "服务质量(QoS)" ] }, { "id": "Wired Network-905", "type": 1, "question": "以下哪些无线网络标准只能使用5 GHz频率?(选择所有适用项。)", "choices": [ "IEEE 802.11a是一种无线局域网标准,它使用5 GHz频段进行通信。", "IEEE 802.11b是一种无线局域网标准。", "IEEE 802.11g是一种无线局域网标准,它支持2.4GHz频段,最高传输速率可达54Mbps。", "IEEE 802.11n是一种无线网络标准,也被称为Wi-Fi 4。它支持更快的数据传输速度和更大的网络覆盖范围,同时提供更好的信号稳定性和可靠性。", "IEEE 802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的无线数据传输速度和更好的网络性能。" ], "answer": "A,E", "solution": "IEEE 802.11a和IEEE 802.11ac标准只能使用5 GHz频段。IEEE 802.11b和IEEE 802.11g只能使用2.4 GHz频段。IEEE 802.11n可以使用2.4 GHz或5 GHz频段。", "topic": [ "网络实现" ] }, { "id": "Wired Network-906", "type": 1, "question": "第二层交换机SW2连接了第二层交换机(SW1)、路由器(R1)、DHCP服务器(S1)和三台PC(PC1、PC2和PC3)。所有PC都是DHCP客户端。以下哪些是SW2上连接到列出设备的端口的最可能的DHCP Snooping信任状态配置?(选择两个答案。)", "choices": [ "连接到路由器的端口是不受信任的。", "连接到交换机SW1的端口是可信任的。", "连接到PC1的端口是不受信任的。", "连接到PC3的端口是可信任的。" ], "answer": "B,C", "solution": "与IT控制的设备连接的交换机端口,可以接收DHCP服务器消息的应该被DHCP Snooping功能信任。这些设备包括IT控制的DHCP服务器、IT控制的路由器和交换机。所有预期为DHCP客户端设备(如个人电脑)的设备都被视为不受信任,因为DHCP Snooping无法预先知道基于DHCP的攻击将从哪些端口发起。在这种情况下,连接到所有三台个人电脑的端口将被DHCP Snooping视为不受信任。", "topic": [ "DHCP Snooping和ARP Inspection" ] }, { "id": "Wired Network-907", "type": 1, "question": "并发多路径路由(CMR)是一种技术,提供以下哪些好处?(选择所有适用项。)", "choices": [ "增加的带宽。", "容错性", "数据封装", "负载均衡" ], "answer": "A,B,D", "solution": "CMR是一种技术,路由器使用多条路径向目的地传输数据包。这提供了负载平衡和改进的性能,通过将传输分散在多个路径上,并提供一定的容错能力,因为一个路径的故障只会危及部分数据。数据封装不涉及CMR过程。", "topic": [ "网络运营" ] }, { "id": "Wired Network-908", "type": 1, "question": "以下哪两个选项关于可解析的DNS地址是正确的?(选择两个。)", "choices": [ "Expressway-C 配置了位于外部网络上的 DNS 服务器。", "Expressway-C 配置了位于内部网络上的 DNS 服务器。", "Expressway-C 配置了可公开路由的 DNS 服务器。", "Expressway-E配置了可公开路由的DNS服务器。" ], "answer": "B,D", "solution": "Expressway-C必须在内部网络中可解析,而Expressway-E必须与相应的DNS服务器公开路由。", "topic": [ "配置 Cisco Expressway 的关键设置。" ] }, { "id": "Wired Network-909", "type": 1, "question": "以下哪些路由协议具有不可达的默认种子度量值?(选择两个。)", "choices": [ "安息。", "EIGRP(Enhanced Interior Gateway Routing Protocol)", "开放最短路径优先协议(OSPF)", "BGP(边界网关协议)" ], "answer": "A,B", "solution": "RIP和EIGRP的默认种子度量值为不可达。", "topic": [ "重新分配故障排除" ] }, { "id": "Wired Network-910", "type": 1, "question": "常用于信令RTCP端口信息的SDP属性是哪两个?(选择两个。)", "choices": [ "a=rtcp", "a=rtcp-mux", "a=rtpmap", "m=", "c=" ], "answer": "A,B", "solution": "这两个SDP属性都用于指示将用于流的RTCP端口。", "topic": [ "VoIP协议:RTP、RTCP和DTMF中继" ] }, { "id": "Wired Network-911", "type": 1, "question": "哪些网络前缀与前缀匹配模式10.168.0.0/13 ge 24匹配?(选择两个。)", "choices": [ "10.168.0.0/13", "10.168.0.0/24", "10.173.1.0/28", "10.104.0.0/24" ], "answer": "B,C", "solution": "请参见图12-6以获取解释。", "topic": [ "高级BGP" ] }, { "id": "Wired Network-912", "type": 1, "question": "Ralph正在使用一个包含四个以太网端口的交换模块的不对称数字用户线路(ADSL)路由器,所有端口都分配给VLAN2。 Ralph可以将笔记本电脑插入路由器的一个端口,并且可以无问题地访问互联网。 Ralph现在需要将ADSL路由器连接到公司网络。 但是,当Ralph将路由器插入VLAN4中的网络交换机端口时,交换机开始每分钟生成“检测到本机VLAN不匹配”错误。 为了解决问题,Ralph尝试在路由器上创建VLAN4,但是他收到“未获得许可的功能”错误。 以下哪些操作可以让Ralph解决问题?(选择所有适用项。)", "choices": [ "购买路由器的功能升级。", "在交换机上创建一个 VLAN2。", "配置路由器使用VLAN1。", "配置交换机使用VLAN1。" ], "answer": "A,B", "solution": "Ralph可以购买路由器的许可证升级,以使他能够创建VLAN4。然而,更简单和更便宜的解决方案是在交换机上创建VLAN2。只要电缆的两端插入使用相同虚拟局域网(VLAN)的端口,路由器就应该能够为网络提供服务。配置设备使用默认的VLAN1可能会干扰现有的VLAN策略。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-913", "type": 1, "question": "以下哪种集线器类型被100Base-TX物理层规范支持?(选择所有适用项。)", "choices": [ "一班", "二等班级", "三等舱", "四级班级" ], "answer": "A,B", "solution": "100Base-TX规范规定了两种集线器类型:Class I和Class II。Class I集线器执行信号转换;Class II集线器不执行信号转换。一个网络中每个冲突域只能有一个Class I集线器;一个网络中每个冲突域可以有两个Class II集线器。其他选项不存在。", "topic": [ "网络实现" ] }, { "id": "Wired Network-914", "type": 1, "question": "以下哪些关于使用MPLS Layer 3 VPN的企业设计中最可能使用的Layer 3细节是正确的?(选择两个答案。)", "choices": [ "广域网使用一个IP子网。", "广域网使用10个或更多的IP子网。", "远程站点路由器将有一个OSPF邻居。", "远程站点路由器可能会有10个或更多的OSPF邻居。" ], "answer": "B,C", "solution": "一个三层MPLS VPN在每个接入链路上创建了一个不同的子网的IP服务。对于一个总部路由器和10个远程站点,存在11个接入链路,因此使用了11个子网。", "topic": [ "广域网架构" ] }, { "id": "Wired Network-915", "type": 1, "question": "以下哪些陈述关于物理组织和逻辑组织的补丁面板安装图的差异是正确的?(选择所有正确的选项。)", "choices": [ "物理图表按照电缆下降点所在的楼层和房间进行组织。", "物理图表是精确缩放以代表实际的补丁面板硬件。", "逻辑图按照公司内部的部门和工作组等划分进行组织。", "逻辑图使用一种组织形式来表示公司部门,但不会在物理上类似于实际的补丁面板。" ], "answer": "A,C", "solution": "在这种情况下,物理图表代表连接到补丁面板的电缆降线的实际物理位置。逻辑图表使用人工分割,对应于公司的组织结构。", "topic": [ "网络运营" ] }, { "id": "Wired Network-916", "type": 1, "question": "你正在排除一个具有IPv6地址的计算机,该地址位于“FE80 :: / 10”范围内。以下哪些陈述是正确的?(选择两个。)", "choices": [ "计算机将无法使用该IP地址上网。", "这台计算机将能够使用该IP地址连接到互联网。", "计算机配置了一个链路本地单播地址。", "计算机配置了全局单播地址。" ], "answer": "A,C", "solution": "FE80::/10范围内的地址是链路本地单播地址。每个IPv6接口都分配了一个链路本地地址,但在Internet上不可路由。如果这是主机唯一的地址,它将无法上网。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-917", "type": 1, "question": "在家庭或小型办公室网络上,多功能设备宽带路由器最不可能提供以下哪两个功能?(选择两个。)", "choices": [ "无线接入点(WAP)", "交换机", "代理服务器", "动态主机配置协议(DHCP)服务器", "VPN集线器" ], "answer": "C,E", "solution": "宽带路由器通常不作为代理服务器,代理服务器是应用层设备,用于调节对互联网的访问。它们通常也不是虚拟专用网络(VPN)头端,这使得多个远程VPN客户端可以连接到网络。许多宽带路由器也是WAP,使用户可以构建LAN而无需复杂和昂贵的电缆安装。许多宽带路由器具有用于连接有线设备(如打印机和计算机)的交换端口。大多数宽带路由器使用DHCP为私有网络上的设备分配IP地址。", "topic": [ "网络实现" ] }, { "id": "Wired Network-918", "type": 1, "question": "如果假设 VLAN 6 中至少有一个交换机端口是可信任的端口,那么需要包含哪些命令才能配置 Switch SW1 使用动态 ARP 检查和 DHCP 欺骗,且仅限于 VLAN 6?(选择两个答案。)\n\n无法回答该问题,因为缺少相关的命令和配置信息。", "choices": [ "不进行不信任端口的IP ARP检查。", "IP ARP检查信任。", "IP ARP检查。", "IP ARP检查VLAN 6。" ], "answer": "B,D", "solution": "由于默认设置为不信任,交换机必须配置DAI信任一个端口。要添加该配置,交换机需要在接口配置模式下使用“ip arp inspection trust”命令。类似的(不正确的)答案“no ip arp inspection untrust”不是有效命令。", "topic": [ "DHCP Snooping和ARP Inspection" ] }, { "id": "Wired Network-919", "type": 1, "question": "物理控制器(例如WLC 5520)上用于与关键服务(如ISE和CMX)通信的接口是哪些?(选择两个。)", "choices": [ "服务端口", "管理界面", "虚拟端口", "控制器上的任何局域网接口端口", "AP-Manager接口" ], "answer": "B,E", "solution": "在较新版本的AireOS中,管理接口用于所有服务通信,并且作为CAPWAP通道终止接口。在旧版本中,AP-Manager接口用于此目的。", "topic": [ "物理和逻辑基础设施要求" ] }, { "id": "Wired Network-920", "type": 1, "question": "以下哪些是路由协议的功能?(选择两个答案。)", "choices": [ "向相邻路由器宣传已知路由。", "直接连接到路由器的子网的学习路由。", "学习路由并将邻居路由器广告的路由放入路由表中。", "根据数据包的目标IP地址转发IP数据包。" ], "answer": "A,C", "solution": "路由器执行所有四个答案中列出的操作;但是,路由协议执行列出的两个答案中的功能。与路由协议无关,路由器学习直接连接到其接口的IP子网和IP网络的路由。路由器还转发(路由)IP数据包,但该过程称为IP路由或IP转发,并且与路由协议的工作相比是一个独立的过程。", "topic": [ "广域网和IP路由的基础知识" ] }, { "id": "Wired Network-921", "type": 1, "question": "EIGRP拓扑表包含以下哪些属性?(选择所有适用项。)", "choices": [ "目标网络前缀", "跳数", "总路径延迟", "最大路径带宽。", "EIGRP邻居列表" ], "answer": "A,B,C,E", "solution": "EIGRP拓扑表包含目标网络前缀、路径属性(跳数、最小路径带宽和总路径延迟)以及附近的EIGRP邻居列表。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-922", "type": 1, "question": "主配线架(MDF)和中间配线架(IDF)的文档应包括以下哪些元素的详细信息?(选择所有适用项。)", "choices": [ "权力", "环境", "距离", "成本" ], "answer": "A,B,C", "solution": "MDF和IDF文档应考虑到位置可用的电源、需要控制温度和湿度水平的HVAC设备以及电缆运行必须跨越的距离。这种类型的文档通常用于安装和故障排除目的,因此组件和服务的成本是不必要的,可以在其他地方涵盖。", "topic": [ "网络运营" ] }, { "id": "Wired Network-923", "type": 1, "question": "以下哪些服务是由苹果创建的,以允许在本地网络上自动发现打印机?(选择两个。)", "choices": [ "你好", "无线打印技术(AirPrint)。", "TCP 打印", "虚拟打印。" ], "answer": "A,B", "solution": "苹果公司创建了Bonjour和AirPrint。Bonjour帮助许多设备在网络上相互发现,不仅仅是打印机。", "topic": [ "硬件" ] }, { "id": "Wired Network-924", "type": 1, "question": "智能摄像机通常会内置哪些类型的网络连接?(选择两个。)", "choices": [ "蓝牙", "红外数据关联(IrDA)", "RJ-45(Registered Jack-45)是一种常用于计算机网络中的连接器,用于连接以太网设备,包括计算机、路由器、交换机等。它通常有8个金属接触点,可以支持高速数据传输。", "无线网络" ], "answer": "A,D", "solution": "智能相机具有内置的无线网络连接功能,可轻松传输图片和视频。许多相机将包括Wi-Fi、蓝牙和NFC(近场通信)。IrDA使用红外线进行通信,不太流行,而RJ-45是一种网络连接器。", "topic": [ "移动设备" ] }, { "id": "Wired Network-925", "type": 1, "question": "所有mesh AP必须配置在哪种模式下才能支持mesh功能?(选择两个。)", "choices": [ "本地模式", "桥接模式", "Flex+Bridge模式", "FlexConnect 模式" ], "answer": "B,C", "solution": "要将AP配置为网状设备(MAP或RAP),它必须处于桥接模式或Flex+Bridge模式。", "topic": [ "设计无线网状网络" ] }, { "id": "Wired Network-926", "type": 1, "question": "你正在朋友家用笔记本电脑工作,点击浏览器进行研究,但是弹出一个窗口显示没有网络。你该如何解决?(选择两个。)", "choices": [ "右键单击浏览器快捷方式,选择“新建窗口”。", "在搜索框中输入“网络”,然后选择“网络状态”,再选择“显示可用网络”,从你的朋友那里获取网络名称和密码。", "点击看起来像地球仪的任务栏图标,然后选择你朋友的网络并请求密码。", "在搜索框中输入“防火墙”,选择“防火墙和网络保护”,然后点击“专用网络”。" ], "answer": "B,C", "solution": "加入朋友的网络最快的方法是点击地球图标(或Wi-Fi图标)并选择网络,但通过网络状态,然后显示可用网络也可以。右键单击浏览器快捷方式将显示您最近访问过的网站和一些其他选项。防火墙和网络保护➢私人网络将使您能够配置用于私人网络的防火墙设置。", "topic": [ "操作系统" ] }, { "id": "Wired Network-927", "type": 1, "question": "以下哪些设备执行基本相同的功能?(选择两个。)", "choices": [ "集线器", "网桥", "交换机", "路由器" ], "answer": "B,C", "solution": "交换机本质上是一个多端口的桥接器。交换机和桥接器都通过扫描数据链路层的硬件地址来处理传入的数据包,并将数据包转发到连接目标系统的端口。它们之间的主要区别在于交换机有多个端口,而桥接器只有两个。集线器和路由器分别是物理层和网络层设备,执行不同的功能。", "topic": [ "网络实现" ] }, { "id": "Wired Network-928", "type": 1, "question": "哪些接口类型需要应用信令和媒体绑定才能正确地在CUBE上源应用程序数据包?(选择两个。)", "choices": [ "千兆以太网接口", "子接口", "环回接口", "VLAN交换机虚拟接口(SVI)", "串行接口" ], "answer": "C,D", "solution": "数据包不会自然地从虚拟接口(如环回和VLAN SVI)出口。这意味着为了从这些类型的接口中源发数据包,必须定义应用信令和媒体绑定来欺骗数据包的源。", "topic": [ "CUBE呼叫路由和数字操作" ] }, { "id": "Wired Network-929", "type": 1, "question": "以下哪两个802.11修订版可以用于帮助客户端找到候选AP以进行漫游?", "choices": [ "[802.11k](glo.xhtml#glo001)", "[802.11r](glo.xhtml#glo002)", "802.11s", "[802.11v](glo.xhtml#glo003)", "802.11w" ], "answer": "A,D", "solution": "802.11k和802.11v修正案有助于帮助漫游客户端更有效地找到候选AP。802.11r修正案在漫游场景中也很有用,但它的重点是使漫游过程本身更加高效,而不是帮助客户端找到AP。", "topic": [ "为客户的移动性设计" ] }, { "id": "Wired Network-930", "type": 1, "question": "以下哪两个选择是FRA算法使用的正确标准?", "choices": [ "4GHz覆盖重叠。", "5GHz覆盖范围重叠。", "AP的COF值", "AP的发射功率水平值" ], "answer": "A,C", "solution": "灵活的无线电分配(FRA)算法为每个接入点计算覆盖重叠因子(COF)值。如果COF超过阈值,则认为该接入点提供了冗余覆盖。FRA只能将灵活(XOR)无线电从2.4GHz重新分配到5GHz频段,因此2.4GHz覆盖重叠也是FRA的一个标准。", "topic": [ "设计无线电管理" ] }, { "id": "Wired Network-931", "type": 1, "question": "以下哪些问题是生成树协议(STP)旨在防止的?(选择所有适用项。)", "choices": [ "广播风暴", "延迟冲突", "桥接环路", "相声" ], "answer": "A,C", "solution": "STP禁用交换机之间的冗余链路,以防止数据包在网络中无限循环。这被称为桥接环路。由于桥接环路,网络可能会被广播流量淹没,这被称为广播风暴。STP无法防止延迟冲突,这是以太网的时间问题,也无法防止串扰,这是一种电缆故障。", "topic": [ "网络实现" ] }, { "id": "Wired Network-932", "type": 1, "question": "哪种网络访问控制方法可以帮助设备在网络介质上平均共享带宽,而不会让两个设备同时传输?(选择两个。)", "choices": [ "TCP/IP", "CSMA/CD", "HTTPS", "TFTP", "CSMA/CA" ], "answer": "B,E", "solution": "选项B的带冲突检测的载波侦听多路访问(CSMA/CD)有助于同时从不同主机传输的数据包平均共享带宽。你可能认为CSMA/CD是唯一正确的答案,但总是要考虑所有选项中哪个是最好的答案,B和E(CSMA/CA)都是正确的。考试永远不会有明确的答案。", "topic": [ "当前的以太网规范" ] }, { "id": "Wired Network-933", "type": 0, "question": "企业边缘中使用了哪两个模块或块?", "choices": [ "互联网和校园核心", "核心和建筑物访问", "互联网和DMZ(隔离区)", "广域网和建筑物分布" ], "answer": "C", "solution": "DMZ/电子商务、互联网、远程访问VPN和WAN/MAN都是企业边缘网络模块。", "topic": [ "广域网技术和企业边缘" ] }, { "id": "Wired Network-934", "type": 0, "question": "以下哪个是正确的数值,以便在覆盖大面积时,多个具有重叠覆盖区域的AP可以配置为使用相同的信道,在AP的小区边界处,应将该AP的RSSI与使用相同信道的相邻AP的RSSI分开?", "choices": [ "比邻居高出至少19分贝。", "比邻居低至少19分贝。", "至少比邻居高82分贝毫伏。", "没有关系;相邻的AP可以使用相同的信道而不会产生影响。" ], "answer": "A", "solution": "在其单元边界处,一个接入点(AP)的信号强度应该比同一信道上任何邻居的信号强度高至少19 dB。理想情况下,在一个AP的单元边界上,不应该听到任何其他AP的信号强度高于-82 dBm;否则,CCA机制可以基于邻近AP的传输触发并标记该信道为繁忙。", "topic": [ "应用无线设计要求" ] }, { "id": "Wired Network-935", "type": 0, "question": "这个二进制数的十进制等价数是多少:\n\n11000000.10101000.00110000.11110000?", "choices": [ "192.168.48.192", "192.168.48.240", "192.168.64.224", "192.168.32.248" ], "answer": "B", "solution": "11000000表示的是192,10101000表示的是168,00110000表示的是48,而11110000表示的是240。", "topic": [ "当前的以太网规范" ] }, { "id": "Wired Network-936", "type": 0, "question": "以下哪个解决方案不能使他的计算机进行通信? \n\nRalph有两台计算机,很久以前他通过将以太网电缆的一端插入每台机器来将它们网络连接在一起。他最近在一个车库销售中买了一个旧的以太网集线器,并想使用它来扩展他的网络。该集线器有四个带编号的端口和一个标有X的第五个端口。 Ralph使用现有的电缆将一台计算机插入端口1,并购买了一根新电缆将另一台计算机插入端口4。然而,这两台计算机无法通信。", "choices": [ "将端口4的电缆移动到端口2。", "用第二根新电缆替换旧的电缆。", "将使用旧电缆的计算机插入 X 端口。", "将带有新电缆的计算机插入 X 端口。" ], "answer": "A", "solution": "问题不太可能是坏的集线器端口或坏的电缆,因此将电缆从端口4移动到端口2将无法解决问题。问题在于两台计算机之间的交叉电路。这两个系统曾经直接连接在一起,这意味着 Ralph 正在使用一根交叉线缆。集线器也提供交叉电路(除了 X 端口),而旧的集线器通常不会自动协商交叉。因此,连接具有两个交叉,这相当于将传输引脚连接到传输引脚,而不是将传输引脚连接到接收引脚。所有其他选项都消除了一个交叉电路,使计算机能够正确连接。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-937", "type": 0, "question": "网络审计中的三个主要信息来源是什么?", "choices": [ "CIO(首席信息官),网络经理,网络工程师", "网络管理器,管理软件,CDP", "网络发现、CDP、SNMP", "现有文档、现有管理软件、新的管理工具" ], "answer": "D", "solution": "网络审计的主要来源包括现有文档、现有管理软件和新的管理工具。", "topic": [ "网络设计方法论" ] }, { "id": "Wired Network-938", "type": 0, "question": "以10 Gbps传输,多模光纤电缆上的信号可以传输多远?", "choices": [ "100米", "550米", "1公里", "40公里" ], "answer": "B", "solution": "多模光纤(MMF)可以传输高达550米,具体取决于以太网规范。使用多模光纤的其他标准只能传输高达300米。如果您需要传输高达40公里,则必须使用单模光纤(SMF)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-939", "type": 0, "question": "如果交换机配置为发送syslog消息,那么交换机应该将这些消息发送给哪个ISE人物?", "choices": [ "管理", "监控", "政策服务", "pxGrid(全名为Platform Exchange Grid)是一个Cisco开发的网络安全平台,用于实现不同安全系统之间的集成和协作。" ], "answer": "B", "solution": "Cisco交换机可以配置为将syslog消息发送到MnT节点,该数据将作为身份验证报告的一部分进行关联。", "topic": [ "实现有线和无线认证" ] }, { "id": "Wired Network-940", "type": 0, "question": "以下哪个问题应该被视为优先级最低的问题?Ed是一名一线支持技术员。他接收到列在这里的帮助电话。他的工作是根据问题的严重程度对它们进行优先排序。", "choices": [ "一个影响整个部门、涉及多个局域网(LAN)的订单录入或客户服务呼叫中心资源问题。", "导致单台计算机崩溃的致命错误。", "影响整个网络的关键任务骨干路由器出现问题。", "影响单个局域网的应用服务器问题" ], "answer": "B", "solution": "影响整个网络的问题应该被赋予最高优先级,包括关键任务的骨干路由器。影响多个局域网或整个部门的问题通常被赋予次高优先级。影响局域网上共享应用服务器的应用问题应该被赋予次高优先级。如果其他问题已经报告,那么单个用户计算机的问题应该被赋予最低优先级。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-941", "type": 0, "question": "哪些协议可以用于连接到安全防火墙进行管理?", "choices": [ "HTTP和HTTPS。", "HTTPS和SSH。", "SSH和Telnet。", "所有这些答案都是正确的。" ], "answer": "B", "solution": "Secure Firewall仅使用支持加密通信的协议,如HTTPS和SSH,进行管理通信。", "topic": [ "安全防火墙虚拟部署" ] }, { "id": "Wired Network-942", "type": 0, "question": "当BGP学习的路由的下一跳不可达时会发生什么?", "choices": [ "该路由被丢弃。", "该路由被放置在BGP表中并向其他邻居进行广告。", "该路由已经被放置在BGP表中,但未被标记为有效。", "该路由被放置在BGP表和路由表中。" ], "answer": "C", "solution": "当BGP学习到的路由的下一跳不可达时,该路由将被放置在BGP表中,并且不被标记为有效。", "topic": [ "BGP故障排除" ] }, { "id": "Wired Network-943", "type": 0, "question": "真或假:BGP路由器会广告一个前缀的每个路径,以便每个邻居可以构建自己的拓扑表。\n\n真。BGP路由器会向其邻居广告一个前缀的所有路径,以便邻居可以选择最佳路径并构建自己的拓扑表。", "choices": [ "正确的,真实的", "错误的,不正确的。" ], "answer": "B", "solution": "BGP仅广告本地路由器认为最佳的路径。", "topic": [ "BGP路径选择" ] }, { "id": "Wired Network-944", "type": 0, "question": "桥接器、集线器和路由器分别主要在OSI模型的哪些层操作?", "choices": [ "物理层、数据链路层", "数据链路层,数据链路层,网络层。", "数据链路层、物理层、网络层", "物理层、数据链路层、网络层" ], "answer": "C", "solution": "桥接器(Bridges)和交换机(Switches)都是数据链路层设备。集线器(Hubs)和中继器(Repeaters)都是物理层设备。路由器(Routers)是网络层设备。", "topic": [ "开放系统互联规范" ] }, { "id": "Wired Network-945", "type": 0, "question": "当具有静态绑定的端口启动时,似乎存在转发延迟。以下哪个可能解释这种延迟的原因?", "choices": [ "静态绑定的部署即时性参数已设置为立即。", "端口封装参数设置不正确,ACI不得不动态地纠正了这个问题。", "ACI在学习端点时会遇到困难,因为它必须等待ARP数据包。", "静态绑定的部署即时性参数已设置为按需。" ], "answer": "D", "solution": "“Deployment Immediacy”参数设置为“按需”,会延迟在硬件上执行策略,直到ACI接收到相关端口的第一个数据包。这可能会导致转发方面的轻微延迟。", "topic": [ "实施租户策略" ] }, { "id": "Wired Network-946", "type": 0, "question": "以下哪种广域网(WAN)连接技术使用模拟信号传输?", "choices": [ "公共交换电话网(PSTN)", "有线电视(CATV)", "数字用户线路(DSL)", "同步光纤网络(SONET)" ], "answer": "A", "solution": "PSTN是一种模拟的电路交换网络。CATV、DSL和SONET都是数字网络。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-947", "type": 0, "question": "哪种TCP/IP协议旨在下载电子邮件,允许多个客户端同时连接到同一个邮箱?", "choices": [ "SMTP", "POP3", "IMAP", "SMB" ], "answer": "C", "solution": "Internet Message Access Protocol(IMAP)是一种安全协议,旨在下载电子邮件。它比旧的邮局协议3(POP3)有几个优点。首先,IMAP4可以在连接和断开连接的模式下工作。其次,它允许您将电子邮件存储在服务器上,而不是像POP3那样需要您下载它。第三,IMAP4允许多个客户端同时连接到同一个收件箱。简单邮件传输协议(SMTP)用于发送邮件,服务器消息块(SMB)用于在网络上共享文件。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-948", "type": 0, "question": "本地环路位于哪里?", "choices": [ "在电话和中央局交换机之间", "在两个PBX之间", "在两个VoIP路由器的环回接口之间。", "在两个公共交换电话网交换机之间" ], "answer": "A", "solution": "本地环路位于传统电话和CO交换机之间。", "topic": [ "语音和视频设计" ] }, { "id": "Wired Network-949", "type": 0, "question": "你用什么地址进行OSPFv2指定路由器(DR)的组播?", "choices": [ "224.0.0.1", "224.0.0.5", "224.0.0.6", "224.0.0.10" ], "answer": "C", "solution": "OSPFv2路由器使用224.0.0.6地址与DR进行通信。", "topic": [ "OSPF、BGP、路由操作和IP组播" ] }, { "id": "Wired Network-950", "type": 0, "question": "Alice被要求设计公司的IPv4地址方案。该公司被分配了一个Class C网络地址192.168.30.0。Alice的主管希望有4个子网,每个子网有28个主机。需要多少位用于子网?需要多少位用于主机?这个网络的新子网掩码是多少?", "choices": [ "3个子网位,5个主机位,子网掩码为255.255.255.240。", "4个子网位,3个主机位,子网掩码为255.255.255.248。", "子网掩码为255.255.255.224,有3位子网位和5位主机位。", "子网位为5位,主机位为3位,子网掩码为255.255.255.192。" ], "answer": "C", "solution": "在这种情况下,分配给公司的IP地址的最后一个字节必须被细分为3个子网位和5个主机位。这3个子网位将为Alice提供最多8个子网,5个主机位将为每个子网提供最多30个主机。新的子网掩码是255.255.255.224。224是二进制值11100000的十进制等价值,表示3个子网位和5个主机位。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-951", "type": 0, "question": "IP地址为200.10.5.68/28的主机的子网地址是多少?", "choices": [ "200.10.5.56", "200.10.5.32", "200.10.5.64", "200.10.5.0" ], "answer": "C", "solution": "这是一个非常简单的问题。/28 子网掩码是 255.255.255.240,这意味着我们的块大小在第四个八位组中是 16(0、16、32、48、64、80 等)。主机位于第 64 个子网中。", "topic": [ "IP子网划分,IP故障排除和NAT介绍" ] }, { "id": "Wired Network-952", "type": 0, "question": "主机要开始接收组播流量,应该做什么?(选择两个。)", "choices": [ "发送一个IGMP加入请求。", "发送未经请求的会员报告。", "发送一份未经请求的会员查询。", "发送一个未经请求的特定群组查询。" ], "answer": "B", "solution": "IGMP成员报告是接收者用来加入多播组或响应本地路由器成员查询消息的消息类型。", "topic": [ "多播" ] }, { "id": "Wired Network-953", "type": 0, "question": "哪个监管机构将2.4-2.5 GHz频段分配给工业、科学和医疗用途?", "choices": [ "国际电气和电子工程师协会(IEEE)", "欧洲电信标准化协会(ETSI)", "国际电信联盟无线电通信部门", "美国联邦通信委员会 (Federal Communications Commission)" ], "answer": "C", "solution": "ITU-R为全球使用分配了ISM频段。", "topic": [ "RF标准" ] }, { "id": "Wired Network-954", "type": 0, "question": "IP地址172.31.77.201/27所在子网的子网广播地址是以下哪个?", "choices": [ "172.31.201.255", "172.31.255.255", "172.31.77.223", "172.31.77.207" ], "answer": "C", "solution": "在这种情况下,住户子网ID为172.31.77.192。您可以使用几种方法基于子网ID和掩码找到子网广播地址。按照书中的十进制过程,掩码转换为255.255.255.224,使有趣的八位组成为第4个八位组,魔术数字为256-224 = 32。对于掩码= 255的三个八位组,复制子网ID(172.31.77)。对于有趣的八位组,取子网ID值(192),加上魔术数字(32),并减去1,得到223。这使得子网广播地址为172.31.77.223。", "topic": [ "分析现有子网" ] }, { "id": "Wired Network-955", "type": 0, "question": "以下哪些关于完整数据包捕获是正确的?", "choices": [ "完整数据包捕获需要大量的系统资源和工程努力,不仅要收集和存储数据,还要能够分析数据。这就是为什么在许多情况下,使用NetFlow获取网络元数据更好的原因。", "完整的数据包捕获可以在收集后的几秒钟内被丢弃,因为它们对取证活动没有必要。", "NetFlow和完整数据包捕获具有相同的目的。", "大多数嗅探器不支持收集广播和多播流量。" ], "answer": "A", "solution": "完整数据包捕获需要大量的系统资源和工程努力,不仅要收集和存储数据,还要能够分析数据。这就是为什么在许多情况下,使用NetFlow获取网络元数据更好的原因。", "topic": [ "网络和主机遥测" ] }, { "id": "Wired Network-956", "type": 0, "question": "你正在考虑建立一个WISP。使用未经许可的频率与使用经许可的频率相比,有什么优势?", "choices": [ "频率没有拥挤。", "辐射功率不受法规限制。", "性能比许可频率更好。", "设备易于获取。" ], "answer": "D", "solution": "使用未经许可的频段有其优点和缺点。优点包括设备广泛可用且价格便宜,使用未经许可的频谱不需要支付费用,且其使用广泛,因此有信息可用以帮助设置。使用未经许可的频谱的缺点是它很拥挤(因为它是免费的),许多地方规定信号的功率限制。", "topic": [] }, { "id": "Wired Network-957", "type": 0, "question": "一家企业计划开始使用公共云服务,并考虑不同的广域网选项。答案列出了四个正在考虑的选项。如果公司选择一个云服务提供商,但后来想改用另一个云服务提供商,哪个选项会有最多的问题?", "choices": [ "直接使用私有广域网连接到云服务提供商。", "在没有VPN的情况下使用互联网连接。", "使用云间交换。", "使用带有VPN的互联网连接" ], "answer": "A", "solution": "两种使用互联网的选项都可以更容易地进行迁移,因为公共云提供商通常提供易于通过互联网访问的服务。云间交换是一种专门构建的广域网服务,可连接企业以及大多数公共云提供商,具有使云迁移过程更加容易的优势。在准备迁移到新的云提供商方面,唯一正确的答案——最糟糕的选项是使用私有广域网连接到一个云提供商。虽然在其他方面有用,但使用这种策略进行迁移需要安装新的私有广域网连接到新的云提供商。", "topic": [ "云架构" ] }, { "id": "Wired Network-958", "type": 0, "question": "以下哪个指标通常不包含在操作系统的性能监控工具中,例如Windows性能监视器或MacOS活动监视器?", "choices": [ "温度", "CPU/处理器活动。", "内存消耗", "网络利用率", "存储统计数据" ], "answer": "A", "solution": "性能监控工具通常提供有关中央处理器(CPU)、内存、网络和磁盘使用情况的统计数据,但不包括计算机温度监测。", "topic": [ "网络运营" ] }, { "id": "Wired Network-959", "type": 0, "question": "当网络中的所有路由器都同意从一个点到另一个点的路径时,该网络被称为什么?", "choices": [ "动态的", "静态的", "快乐的", "收敛的" ], "answer": "D", "solution": "当路由表包含了互联网中所有网络的信息,且信息完整无误时,它们被认为是已经收敛。", "topic": [ "IP路由介绍" ] }, { "id": "Wired Network-960", "type": 0, "question": "以下哪个端口号被分配给Unix日志服务程序?", "choices": [ "389", "514", "636", "993" ], "answer": "B", "solution": "端口号514被分配给syslog,它是一个Unix标准,旨在促进由设备或进程(如sendmail SMTP服务器)生成的日志条目在IP网络上传输到称为syslog服务器的消息收集器。端口号389被分配给轻量级目录访问协议(LDAP)。端口号636被分配给LDAP over Secure Sockets Layer(SSL)。端口号993被分配给Internet消息访问协议(IMAP)over SSL。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-961", "type": 0, "question": "在远程使用您的Windows笔记本电脑时,您想要在Wi-Fi网络上建立一个安全连接。您需要建立什么类型的连接?", "choices": [ "虚拟专用网络", "拨号上网", "光纤网络服务提供商。", "热点" ], "answer": "A", "solution": "虚拟私人网络(VPN)是在不安全的网络上建立的安全网络连接。例如,如果您想通过互联网将笔记本电脑连接到公司网络以阅读电子邮件,但您也想保护连接,您可以使用VPN。拨号是一种非常慢且很少使用的连接,需要电话陆线才能建立连接。Fios是一种光纤连接的供应商名称,可提供互联网访问和其他服务,而热点是与其他设备共享移动设备连接的方式,从本质上将移动设备作为连接互联网的网关。", "topic": [ "操作系统" ] }, { "id": "Wired Network-962", "type": 0, "question": "1000BaseT的最大传输距离是多少?", "choices": [ "100米(328英尺)", "128米(420英尺)。", "1,000米(3280英尺)", "1,024米(3360英尺)" ], "answer": "A", "solution": "100BaseT和1000BaseT的最大传输距离均为100米,或328英尺。", "topic": [ "当前的以太网规范" ] }, { "id": "Wired Network-963", "type": 0, "question": "什么设备被称为通过在一端发送信号并测量信号从另一端返回所需时间来确定电缆长度的设备?", "choices": [ "狐狸和猎犬测试仪", "线路映射测试仪", "时间域反射仪", "电压事件记录器", "线路测试仪", "频谱分析仪" ], "answer": "C", "solution": "提供这种能力的技术称为时域反射测量(TDR)。测试仪器通过电缆发送信号,并测量信号反射从另一端返回所需的时间。利用这些信息和电缆的名义传播速度(NVP)——电缆制造商提供的规格,设备可以计算电缆线路的长度。其他列出的设备不是以这种方式工作的。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-964", "type": 0, "question": "以下哪个是存储设备网络,服务器可以像本地连接的驱动器一样访问?", "choices": [ "网络附加存储 (Network Attached Storage)", "SAS(统计分析系统)", "存储区域网络(SAN)", "广域网" ], "answer": "C", "solution": "存储区域网络(SAN)是一个高速网络,其目的是为服务器提供快速访问存储。网络附加存储(NAS)与SAN不同,它不是一个单独的高速网络,而是连接到局域网的单个存储设备。SAS是统计分析软件,WAN是广域网。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-965", "type": 0, "question": "“2×3 MIMO设备”正确描述了以下哪一个?", "choices": [ "一个带有两个无线电和三个天线的设备。", "一个带有两个发射器和三个接收器的设备。", "一个具有两个绑定通道和三个空间流的设备。", "一个带有两个接收器和三个发射器的设备。" ], "answer": "B", "solution": "该设备有两个发射器和三个接收器。在2×3的标识后,支持的空间流数量将被添加。", "topic": [ "RF标准" ] }, { "id": "Wired Network-966", "type": 0, "question": "以下哪个IPv6地址是主机在启动时自动分配的,并且仅可在其所在的广播域中使用?", "choices": [ "`2000::/3`", "`FC00::/7`", "`FE80::/10`", "`FF00::/8`" ], "answer": "C", "solution": "在“FE80::/10”范围内的IPv6地址被称为链路本地地址,类似于IPv4的自动私有IP寻址(APIPA)地址。(IPv4中的“169.254.0.0/16”范围是APIPA范围,用于自动配置,如果主机无法找到动态主机配置协议[DHCP]服务器。)链路本地地址是PC启动时生成的。使用链路本地地址的数据包不能被路由器转发。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-967", "type": 0, "question": "微分段技术可以提高网络性能。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "A", "solution": "当网络进行微分段时,每个子网络中的终端设备数量较少,从而减少流量并优化网络。", "topic": [ "网络安全" ] }, { "id": "Wired Network-968", "type": 0, "question": "哪种协议提供有关端点之间流量流的详细信息?", "choices": [ "系统日志", "简单网络管理协议(SNMP)", "网络流量监测技术(NetFlow)", "西班牙语" ], "answer": "C", "solution": "NetFlow标准提供会话信息,包括源地址、目的地址、应用程序和流量量。", "topic": [ "确保网络可用性" ] }, { "id": "Wired Network-969", "type": 0, "question": "在开放式系统互联(OSI)模型的哪一层协议中使用端口号来标识数据包中源和目的应用程序?", "choices": [ "应用程序", "展示", "运输", "网络" ], "answer": "C", "solution": "传输层协议,如传输控制协议(TCP)和用户数据报协议(UDP),具有包含生成数据的应用程序的端口号以及将接收数据的应用程序的端口号的头字段。应用层、表示层和网络层不使用端口号。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-970", "type": 0, "question": "在端系统上配置的以下TCP/IP参数中,哪个指定执行域名解析服务的设备的IP地址?", "choices": [ "WINS服务器地址", "默认网关", "DNS服务器地址", "子网网关" ], "answer": "C", "solution": "DNS服务器地址参数包含将域名解析为IP地址的服务器地址。Windows Internet名称服务(WINS)提供网络基本输入/输出系统(NetBIOS)名称解析。默认网关参数定义要用于访问其他网络的本地路由器。没有子网网关参数。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-971", "type": 0, "question": "用哪个命令可以测量数据包在传输到目的地址时的丢包率?", "choices": [ "`ping`", "`nslookup`", "`pathping`", "`tracert`" ], "answer": "C", "solution": "`pathping` 命令可以测量数据包在传输到目标地址时经过的每个路由器的数据包丢失率;它结合了 `ping` 和 `tracert` 命令的功能。`ping` 命令返回单个目标的响应时间。`nslookup` 命令用于解析 DNS 地址。`tracert` 命令允许您查看数据包到达目的地的路径。", "topic": [ "Windows 管理" ] }, { "id": "Wired Network-972", "type": 0, "question": "以下哪个是用于路由器冗余的IEEE标准(RFC 2338)?", "choices": [ "热备份路由协议(HSRP)", "虚拟路由器冗余协议(VRRP)", "高级数据链路控制协议(HDLC)", "多层感知机(MLP)" ], "answer": "B", "solution": "虚拟路由器冗余协议(VRRP)是一个用于路由器冗余的IEEE标准(RFC 2338);热备份路由器协议(HSRP)是思科专有协议。", "topic": [ "高可用性和灾难恢复" ] }, { "id": "Wired Network-973", "type": 0, "question": "以下哪种连接器是用于同轴电缆的一种类型?", "choices": [ "RJ-11", "RJ-45", "F type", "SC" ], "answer": "C", "solution": "同轴电缆可以使用BNC连接器和F型连接器。RJ-11和RJ-45是双绞线连接器。SC是一种光纤连接器。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-974", "type": 0, "question": "以下哪个选项为基于模块的类别化QoS添加了严格的PQ?", "choices": [ "LLQ", "FIFO", "CBWFQ", "WFQ" ], "answer": "A", "solution": "低延迟队列(LLQ)为CBWFQ添加了一个严格优先级队列。", "topic": [ "广域网技术和企业边缘" ] }, { "id": "Wired Network-975", "type": 0, "question": "以下哪个是定义无线局域网操作的通用标准?", "choices": [ "IEEE 802.1是一个标准化组织,致力于制定网络体系结构和协议的标准。", "IEEE 802.1x是一种网络认证协议。", "IEEE 802.11是一种无线局域网标准。", "IEEE 802.3是一种以太网标准。" ], "answer": "C", "solution": "IEEE 802.11标准专注于无线局域网的定义、方法和操作。它由许多部分组成,如第2章“射频标准”所述。有时您可能会看到IEEE 802.11x,它指的是802.11的许多子部分。请注意,这与定义基于端口的网络访问控制的802.1x之间的微妙差别。", "topic": [ "射频信号和调制" ] }, { "id": "Wired Network-976", "type": 0, "question": "你需要一种设备,可以防止用户访问某些网站。你应该安装哪种设备?", "choices": [ "Firewall", "IDS", "IPS", "Proxy server" ], "answer": "D", "solution": "代理服务器可以用来防止外部流量直接到达您的内部网络,也可以用来过滤您的用户被允许连接的网站。", "topic": [ "网络设备" ] }, { "id": "Wired Network-977", "type": 0, "question": "R1从EIGRP中学习了10.11.11.0/24前缀。在R1上将EIGRP重新分发到OSPF,然后将OSPF重新分发到BGP。R1向R3广告所有BGP网络前缀。R3是否接收到10.11.11.0/24前缀?", "choices": [ "正确", "错误" ], "answer": "B", "solution": "在单个路由器上,路由重分发不是可传递的。", "topic": [ "路由重分发" ] }, { "id": "Wired Network-978", "type": 0, "question": "FlexVPN包括哪些功能以加快配置过程?", "choices": [ "预定义模板", "预定义默认值", "安装脚本", "安装模板" ], "answer": "B", "solution": "FlexVPN包括预定义的默认值,用于FlexVPN配置的多个组件,例如IKEv2提议和IKEv2策略。", "topic": [ "FlexVPN配置和故障排除" ] }, { "id": "Wired Network-979", "type": 0, "question": "以下哪项是星型拓扑的缺点?", "choices": [ "当中央集中设备上的单个端口故障时,整个网络将失去连接。", "当中央集中设备完全失效时,所有连接的设备将失去与网络其余部分的连接。", "在星型拓扑结构中,相比于实现物理总线时使用的主机,必须使用更昂贵的主机类型。", "与其他拓扑结构相比,添加站点和故障排除更加困难。" ], "answer": "B", "solution": "唯一提到的缺点是网络中存在单点故障。然而,这种拓扑结构使故障排除更容易;如果整个网络出现故障,你知道首先要查找哪个位置。中央设备还确保单个端口的损失和将新设备添加到可用端口不会对连接到该设备的其他站点的网络造成干扰。", "topic": [ "网络介绍" ] }, { "id": "Wired Network-980", "type": 0, "question": "哪个错误消息表明路由器有一个第三层数据包要转发,但缺少一些第二层头部元素,以便将数据包转发到下一跳?", "choices": [ "循环冗余校验错误", "封装错误", "双工不匹配。", "速度不匹配" ], "answer": "B", "solution": "一个失败的封装错误消息表示路由器有一个第三层数据包要转发,但缺少一些层2头部元素,以便能够将数据包转发到下一个跳点。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-981", "type": 0, "question": "启用后,无线路由器的哪个功能只允许指定的计算机访问网络?", "choices": [ "Port forwarding", "WPS", "SSID", "MAC filtering" ], "answer": "D", "solution": "MAC过滤是一种安全选项,可以指定只有具有特定MAC(硬件)地址的计算机才能访问网络。端口转发是防火墙的一个功能。WPS是一种用于无线网络的简易设置机制。SSID是无线网络名称。", "topic": [ "无线和SOHO网络" ] }, { "id": "Wired Network-982", "type": 0, "question": "配置连接配置文件时需要哪些内容?", "choices": [ "隧道组", "域名", "DNS服务器", "别名" ], "answer": "B", "solution": "配置连接配置文件时,必须配置域名才能接受配置。隧道组是连接配置文件的另一个名称。DNS服务器和别名可以选择在连接配置文件中配置,但不是必需的。", "topic": [ "ASA上的无客户端远程访问SSL VPN" ] }, { "id": "Wired Network-983", "type": 0, "question": "在使用Cisco DNA Center Token API时,使用了哪种身份验证方法?", "choices": [ "MD5是一种常用的哈希算法,用于将任意长度的消息压缩成一个128位的哈希值。", "X-Auth-Token(身份验证令牌)", "SSH(Secure Shell)安全外壳协议。", "基本认证", "JSON(JavaScript Object Notation)" ], "answer": "D", "solution": "Cisco DNA Center使用基本身份验证作为初始身份验证方法。头部Content-Type X-Auth-Token用于将令牌发送回Cisco DNA Center以供未来的API调用。JSON是请求和响应的数据格式。", "topic": [ "基础网络编程概念" ] }, { "id": "Wired Network-984", "type": 0, "question": "以下哪种路由协议使用AS路径作为构建路由表的方法之一?", "choices": [ "开放最短路径优先协议(OSPF)", "Intermediate System to Intermediate System (IS-IS)。", "BGP(边界网关协议)", "安息。", "EIGRP(Enhanced Interior Gateway Routing Protocol)" ], "answer": "C", "solution": "边界网关协议(BGP)属性包括到达下一个自治系统的IP地址(下一跳属性)以及指示如何将路径末端的网络引入BGP的指示(起源代码属性)。AS路径信息有助于构建无环自治系统图,并用于识别路由策略,以便基于AS路径强制执行路由行为限制。", "topic": [ "路由协议" ] }, { "id": "Wired Network-985", "type": 0, "question": "在 **show bgp ipv4 unicast summary** 的输出中,如何确定邻居关系是否成功建立?", "choices": [ "邻居被列在输出中。", "版本列中有一个数字 4。", "State/PfxRcd列中有一个数字。", "State/PfxRcd列中有单词“Active”。" ], "answer": "C", "solution": "当“State/PfxRcd”列中有一个数字时,你可以得出邻居关系已经建立成功并且路由已经交换的结论。", "topic": [ "BGP故障排除" ] }, { "id": "Wired Network-986", "type": 0, "question": "以下哪个信息不需要配置IPv6?\n\n答案:MAC地址。", "choices": [ "IPv6地址", "子网掩码", "子网前缀长度", "默认网关" ], "answer": "B", "solution": "在配置IPv6网络中的静态IP地址时,不需要子网掩码,但需要知道子网前缀长度。这是配置IPv4和IPv6之间唯一的区别。除了IPv6地址和默认网关外,您还需要知道首选DNS服务器的地址。", "topic": [] }, { "id": "Wired Network-987", "type": 0, "question": "无线局域网的监控模式在哪里配置?", "choices": [ "它是在WLC上配置的,在WLAN的安全属性下。", "它是在ISE中配置的无线监视器模式策略集中。", "它通过在ISE中的系统设置中启用无线监视器模式进行配置。", "无线局域网不支持监控模式。" ], "answer": "D", "solution": "无线局域网不能同时使用认证和非认证的混合模式。 WLAN 必须使用 Wi-Fi Protected Access(它促进了 802.1X 认证)或开放式;它不能同时使用两种模式。", "topic": [ "安全部署" ] }, { "id": "Wired Network-988", "type": 0, "question": "在域名系统(DNS)中,区域是指授权给一个或多个DNS服务器的DNS命名空间的连续区域。以下哪种DNS资源记录类型指定了特定区域的权威DNS服务器的IP地址?", "choices": [ "PTR", "SRV", "MX", "NS" ], "answer": "D", "solution": "名称服务器(NS)资源记录标识特定DNS区域的权威服务器。指针记录(PTR)用于将IP地址解析为主机名。邮件交换(MX)记录标识特定域的邮件服务器。服务记录(SRV)标识特定应用程序的指定服务器。这些其他选项都不能标识区域的权威服务器。", "topic": [] }, { "id": "Wired Network-989", "type": 0, "question": "哪个命令可以在接口上成功使用名为ENARSI的IPv6 ACL过滤出口流量?", "choices": [ "访问组ENARSI出方向。", "访问类别 ENARSI 出站。", "ipv6访问组ENARSI出站", "ipv6流量过滤器ENARSI出站。" ], "answer": "D", "solution": "命令 **ipv6 traffic-filter ENARSI out** 成功地使用名为 ENARSI 的 IPv6 ACL 在接口上过滤出口流量。", "topic": [ "故障排除ACL和前缀列表。" ] }, { "id": "Wired Network-990", "type": 0, "question": "以下哪项不是虚拟网络计算(VNC)终端仿真产品相对于竞争对手的优势?", "choices": [ "VNC是免费的。", "VNC可以在许多操作系统上运行。", "VNC比竞争对手运行更快。", "VNC可以通过Web浏览器运行。" ], "answer": "C", "solution": "VNC支持许多操作系统,可以通过Web浏览器运行,而且是免费的。然而,它的速度并不比竞争产品更快。", "topic": [ "网络安全" ] }, { "id": "Wired Network-991", "type": 0, "question": "什么是EIGRP的后继路由?", "choices": [ "目的地前缀的最低路径度量的下一跳路由器。", "目标前缀的最低度量路径", "选择用于维护广播网络EIGRP邻居关系的路由器。", "一条满足可行性条件的路线,其中报告的距离小于可行距离。" ], "answer": "A", "solution": "EIGRP的后继路由器是继任路由的下一跳路由器(即具有最低路径度量的无环路由)。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-992", "type": 0, "question": "哪个EIGRPv6命令可以用来验证本地路由器是否为存根路由器?", "choices": [ "显示IPv6协议。", "显示IPv6 EIGRP接口的详细信息。", "显示IPv6 EIGRP邻居详细信息。", "显示 IPv6 EIGRP 拓扑。" ], "answer": "A", "solution": "使用“show ipv6 eigrp interfaces detail”命令来验证本地路由器是否为存根路由器。", "topic": [ "EIGRPv6(Enhanced Interior Gateway Routing Protocol version 6):增强型内部网关路由协议第6版。" ] }, { "id": "Wired Network-993", "type": 0, "question": "如果您需要在5公里的距离内建立10 Gbps的连接,您将运行哪个以太网规范?", "choices": [ "10GBaseER", "10GBaseT", "10GBaseSR", "10GBaseLR" ], "answer": "A", "solution": "如果你需要建立一条长度为5公里的连接,那么你只能使用光纤电缆,具体来说是单模光纤(SMF)。两种常见的SMF标准是10GBaseER和10GBaseEW。(将_E_视为_extended_。)以太网标准中的_T_指的是双绞线。SR和LR是不适用于5公里的光纤标准。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-994", "type": 0, "question": "以下哪个陈述最有可能描述了原因?\n\nexample.com的IP地址是93.184.216.34。您可以ping该IP地址,但无法ping名称example.com。", "choices": [ "example.com已经宕机。", "DHCP服务器已经停止工作。", "DNS服务器已经宕机。", "AD DS服务器已宕机。" ], "answer": "C", "solution": "DNS服务器的目的是将主机名和域名解析(转换)为IP地址。计算机通常通过IP地址进行通信,但对于人类来说,输入名称更容易。如果example.com宕机,您将无法ping到相应的IP地址。", "topic": [] }, { "id": "Wired Network-995", "type": 0, "question": "以下哪个最能描述动态路由?", "choices": [ "所有网络地址都必须手动输入到路由表中。", "只需手动输入网络地址的一部分即可放入路由表中。", "当网络发生变化时,路由表会自动更新。", "A和B。" ], "answer": "C", "solution": "在动态路由中,路由器会相互更新它们所知道的所有网络信息,并将这些信息放入路由表中。这是因为一个路由器上的协议会与相邻路由器上运行的相同协议进行通信。如果网络发生变化,动态路由协议会自动通知所有路由器。", "topic": [ "IP路由介绍" ] }, { "id": "Wired Network-996", "type": 0, "question": "需要在终端上具有管理权限才能执行以下哪些操作?", "choices": [ "安装", "更新", "连接中", "断开连接" ], "answer": "A", "solution": "安装AnyConnect需要管理员权限。使用Web部署(从ASA/ISE/Umbrella云中使用Downloader)升级AnyConnect或安装其他模块时,您不需要管理员权限。连接和断开连接不需要管理员权限。", "topic": [ "ASA和IOS上的AnyConnect VPNs" ] }, { "id": "Wired Network-997", "type": 0, "question": "用于指代生成名称解析查询并将其发送到DNS服务器的DNS客户端机制的术语是什么?", "choices": [ "请求者", "货运代理人", "权威", "解析器" ], "answer": "D", "solution": "域名系统(DNS)的客户端组件称为解析器。请求者是发出请求的任何系统的通用术语,只有DNS服务器可以是权威服务器或转发器。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-998", "type": 0, "question": "以下哪种电缆类型不受电磁干扰影响,但需要专用工具进行安装?", "choices": [ "六类网线", "生成树协议(Spanning Tree Protocol)", "光纤", "同轴的" ], "answer": "C", "solution": "光纤电缆是唯一不受电磁干扰(EMI)影响的答案。光纤不使用铜线或电力,而是使用玻璃或塑料纤维和光。任何铜电缆都会在一定程度上受到EMI的影响。常规的UTP电缆,如Cat 5e或Cat 6,非常容易受到影响,同轴电缆稍微少一些,而屏蔽双绞线(STP)则比这还要少。STP安装困难,必须接地;因此,在网络中很少发现它。为了真正保护免受EMI的影响,光纤是最好的选择。通常在安装过程中使用特殊工具来正确地拼接纤维并有效地测试连接。", "topic": [] }, { "id": "Wired Network-999", "type": 0, "question": "以下哪些协议包含在FCoE数据包中?", "choices": [ "Ethernet", "IP", "TCP", "UDP", "None of the above" ], "answer": "A", "solution": "以太网上的光纤通道(FCoE)使用以太网帧代替光纤通道协议栈的底部两层(FC0和FC1)。剩余的层(FC2、FC3和FC4)使用标准的光纤通道协议。FCoE不使用传输控制协议(TCP)、互联网协议(IP)、用户数据报协议(UDP)或任何其他TCP/IP协议。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1000", "type": 0, "question": "你在家庭办公室中拥有一个非常小的网络,希望将网络访问限制在你实际拥有的主机上。你应该利用什么来实现这个目标?", "choices": [ "静态IP地址", "禁用DNS", "默认子网掩码。", "空的默认网关" ], "answer": "A", "solution": "静态分配IP地址的优点在于,您可以确定哪个主机与哪个IP地址相关联,然后使用过滤器限制网络访问仅限于这些主机。禁用DNS将限制网络上的所有主机无法访问互联网,但不会限制网络访问。默认子网掩码不会限制网络访问,但会引起其他问题。空的默认网关不会限制网络访问。", "topic": [ "保护操作系统" ] }, { "id": "Wired Network-1001", "type": 0, "question": "让他们尝试的第一件事是检查他们的Wi-Fi设置并确保他们已经输入了正确的Wi-Fi密码。", "choices": [ "检查手机是否处于飞行模式。", "检查Wi-Fi是否已启用。", "调整Wi-Fi信号接收能力。", "恢复出厂设置。" ], "answer": "B", "solution": "用户应该检查确保Wi-Fi已启用。缺乏无线连接的常见原因是设备处于飞行模式,但由于用户有蜂窝信号,因此手机肯定不在此模式下。其他无线信号类型(Wi-Fi和蓝牙)可以单独禁用,因此请检查它们两个。在智能手机上调整接收能力不是可用选项,恢复出厂设置将清除手机的数据。", "topic": [] }, { "id": "Wired Network-1002", "type": 0, "question": "如果Windows用户尝试打印文档并收到错误消息“打印子系统不可用”,作为打印机的局域网管理员,您应该首先检查以下哪个?", "choices": [ "已安装正确的打印机驱动程序。", "打印机已添加。", "打印机池服务正在运行。", "打印机从插孔获得电源。" ], "answer": "C", "solution": "如果出现“打印子系统不可用”或类似的消息,则很可能意味着打印池已停止。您可以在计算机管理的服务部分中打开打印池,或通过在命令提示符中发出命令“net start spooler”来打开打印池。", "topic": [] }, { "id": "Wired Network-1003", "type": 0, "question": "Alice在公司的IT帮助台工作,该公司有500名内部销售人员,他们在早上9点开始工作。用户正在运行Windows 10,并从动态主机配置协议(DHCP)服务器获取其Internet协议(IP)地址配置设置。每天早上,Alice会接到很多用户的故障报告,这些用户在打开计算机后经历极慢的性能。他们的性能逐渐在一个小时内得到改善。以下哪种情况最有可能导致减速?", "choices": [ "广播风暴", "路由环路", "流氓DHCP服务器", "环路转发。", "非对称路由" ], "answer": "A", "solution": "最可能导致网络减速的原因是广播风暴。DHCP依赖广播消息为用户分配IP地址,因此在早上9点时,500个用户同时开启计算机可能会产生异常高数量的广播数据包。这可能会降低网络性能,直到所有用户完成DHCP地址分配。路由环路、交换机环路和非对称路由可能会降低网络性能,但这种降低不会仅限于早上。一个恶意的DHCP服务器可能会引起问题,但不是这里描述的问题。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1004", "type": 0, "question": "LDAP协议使用哪个端口?", "choices": [ "22", "139", "389", "3389" ], "answer": "C", "solution": "轻量级目录访问协议(LDAP)旨在访问存储在信息目录中的信息,通常称为LDAP目录或LDAP数据库。LDAP使用端口389。端口22用于安全外壳协议(SSH),139用于NetBIOS,3389用于远程桌面协议(RDP)。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1005", "type": 0, "question": "以下哪些是在企业边缘使用的分组交换和电路交换技术的例子?", "choices": [ "帧中继和异步传输模式(ATM)", "ISDN和T1", "电缆和数字用户线路(DSL)", "模拟语音和T1" ], "answer": "A", "solution": "Frame Relay和ATM通常用于连接企业边缘的广域网服务。", "topic": [ "广域网设计" ] }, { "id": "Wired Network-1006", "type": 0, "question": "传输层协议头中的端口号标识以下哪些组件?", "choices": [ "一个传输层协议", "一个应用程序", "一个网关", "一个代理服务器" ], "answer": "B", "solution": "传输层协议头中指定的端口号用于标识生成数据包的应用程序或将接收数据的应用程序。端口号不用于标识传输层协议、网关或代理服务器。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1007", "type": 0, "question": "思科身份服务引擎(ISE)是:", "choices": [ "运动医学方法来治疗肿胀和疼痛的肌肉", "一个网络管理平台", "一个网络安全和策略平台", "一个集成了终端虚拟化的统一计算系统。" ], "answer": "C", "solution": "思科身份服务引擎(ISE)是一个网络安全和策略平台。使用思科ISE,网络管理员可以从一个中心位置维护和提供安全策略给所有网络设备。", "topic": [ "思科身份服务引擎架构" ] }, { "id": "Wired Network-1008", "type": 0, "question": "电子邮件客户端将使用哪个TCP/IP端口将电子邮件推送到其电子邮件服务器?", "choices": [ "23", "25", "110", "143" ], "answer": "B", "solution": "电子邮件是通过简单邮件传输协议(SMTP)从客户端推送到服务器的。SMTP使用25号端口。当试图记住SMTP是发送还是接收电子邮件时,请想到S代表发送。端口23由Telnet使用,现在被认为是不安全和过时的。端口110由POP3(邮局协议3)使用,端口143由IMAP(Internet邮件访问协议)使用,两者都用于检索电子邮件。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1009", "type": 0, "question": "以下哪种QoS排队特性是LLQ的例子?", "choices": [ "支持实时排队和最小带宽保证。", "基于DSCP值提供动态分配。", "通常会有四到六个队列,每个队列都有相应的重要性级别,最重要的队列会先得到服务。", "适用于延迟较低、拥塞非常小的大型链接,但不需要优先级或流量类别的要求。" ], "answer": "A", "solution": "一个LLQ支持实时排队和最小带宽保证。", "topic": [ "网络服务和管理" ] }, { "id": "Wired Network-1010", "type": 0, "question": "哪个syslog严重级别表示系统无法使用?", "choices": [ "紧急情况", "警报", "关键的,重要的。", "错误" ], "answer": "A", "solution": "紧急的系统日志严重级别是最关键的,意味着系统可能已经崩溃或无法使用。", "topic": [ "确保网络可用性" ] }, { "id": "Wired Network-1011", "type": 0, "question": "以下哪种IPv6机制可以实现端到端的IPv6和IPv4功能?", "choices": [ "Dual stack", "ISATAP", "GRE", "mGRE" ], "answer": "A", "solution": "双栈是指设备同时运行IPv4和IPv6协议栈。当网络中的所有设备都以这种方式运行时,称为端到端双栈。", "topic": [ "网络服务和管理" ] }, { "id": "Wired Network-1012", "type": 0, "question": "以下哪种日志类型是Windows管理员应该首先查看服务器活动信息的地方?", "choices": [ "系统日志", "安装日志", "应用程序日志", "安全日志" ], "answer": "A", "solution": "系统日志记录服务器的启动活动以及其服务和设备驱动程序的持续状态。当出现问题或服务器状态发生变化时,系统日志可以提供关于发生了什么以及何时发生的信息。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1013", "type": 0, "question": "以下哪个不是可用的客户端/服务器插件?", "choices": [ "远程桌面协议(RDP)", "虚拟网络计算机(VNC)", "CIFS(Common Internet File System)是一种用于在计算机网络上共享文件和打印机的协议。它是一种基于客户端/服务器模型的协议,通常用于在Windows操作系统之间共享文件和资源。", "SSH(Secure Shell)安全外壳协议。" ], "answer": "C", "solution": "RDP、VNC和SSH都有客户端/服务器插件可用。CIFS无需客户端/服务器插件即可支持。", "topic": [ "ASA上的无客户端远程访问SSL VPN" ] }, { "id": "Wired Network-1014", "type": 0, "question": "从第三层IPv4组播地址映射到第二层MAC地址需要映射多少位?", "choices": [ "16位", "23位二进制数", "24位", "32位" ], "answer": "B", "solution": "IP组播地址的低23位映射到第二层MAC地址的最后23位。", "topic": [ "OSPF、BGP、路由操作和IP组播" ] }, { "id": "Wired Network-1015", "type": 0, "question": "以下哪一个正确地确定了RRM算法的范围?", "choices": [ "所有的接入点都连接到一个控制器。", "所有的接入点都连接到所有的控制器。", "所有接入点都加入了RF组中的控制器。", "特定型号的所有AP" ], "answer": "C", "solution": "RRM监控和调整单个RF组中的所有AP。RF组可能包含一个或多个控制器。", "topic": [ "理解无线资源管理(RRM)" ] }, { "id": "Wired Network-1016", "type": 0, "question": "你最有可能在什么情况下看到“请求超时”消息?", "choices": [ "发生未知错误时", "当你错误地使用了 `arp -a` 命令时", "当已知错误发生时", "当你使用混合路由协议时" ], "answer": "A", "solution": "如果在返回源主机时出现未知错误导致数据包丢失,你最有可能看到“请求超时”的消息。请记住,如果错误是由已知问题引起的,你可能会看到“目标不可达”的消息。", "topic": [ "IP路由介绍" ] }, { "id": "Wired Network-1017", "type": 0, "question": "多厂商SDK在Cisco DNA Center平台上的输出是什么?", "choices": [ "设备驱动程序", "设备封装", "软件驱动程序", "软件包" ], "answer": "B", "solution": "思科DNA中心允许客户通过多供应商SDK将其非思科设备通过DNA中心进行管理。思科DNA中心通过设备包与第三方设备通信。设备包使用多供应商SDK开发,并基于CLI、SNMP或NETCONF实现南向接口。", "topic": [ "思科企业网络管理平台和API" ] }, { "id": "Wired Network-1018", "type": 0, "question": "以下哪个组织开发了开放式系统互联(OSI)模型?", "choices": [ "国际电信联盟(ITU-T)", "国际电报电话咨询委员会(CCITT)", "美国国家标准学会(ANSI)", "电气和电子工程师学会(IEEE)", "国际标准化组织(ISO)" ], "answer": "E", "solution": "ISO开发并发布了OSI模型,作为软件和硬件开发人员的概念模型。ITU-T(以前称为CCITT)协调国际电信网络和服务的发展和进步。ANSI是一个私人组织,管理和协调基于美国的标准化和符合性评估系统。IEEE发布定义数据链路和物理层标准的标准。这些标准被统称为802系列。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1019", "type": 0, "question": "以下哪些是可用于执行网络配置文件的遥测类型?", "choices": [ "已使用和开放的端口", "吞吐量", "会话持续时间", "所有这些答案都是正确的。" ], "answer": "D", "solution": "使用的端口、开放的端口、吞吐量和会话持续时间都是可以用来进行网络配置文件分析的遥测类型。", "topic": [ "网络基础设施设备遥测和分析" ] }, { "id": "Wired Network-1020", "type": 0, "question": "您已安装了一个802.11ac Wi-Fi网络。该网络有三个重叠的无线接入点。为了避免通信问题并提供最佳带宽,接入点应设置为什么信道宽度?", "choices": [ "20兆赫。", "40兆赫。", "80兆赫。", "在802.11ac中这并不重要。" ], "answer": "B", "solution": "802.11ac是在5 GHz频段中,可以是20、40或80 MHz宽。使用80 MHz信道宽度时,实际上有两个信道,信道36-48和信道149-161。由于您有三个接入点,应使用40 MHz信道宽度,提供四个可能的信道:36-40、44-48、149-153和157-161。20 MHz信道宽度提供了九个信道,但您不需要那么多,而且更窄的信道宽度会降低每个客户端的性能。20 MHz信道是36、40、44、48、149、153、157、161和165。", "topic": [] }, { "id": "Wired Network-1021", "type": 0, "question": "真或假:如果两个交换机连接并配置了命令 **switchport mode dynamic auto**,那么交换机将建立一个干道链路。 \n\n答案:假。如果两个交换机都配置为 **switchport mode dynamic auto**,它们将不会建立干道链路。相反,它们将使用动态协商协议(如 DTP)来确定它们之间的链路类型。如果其中一个交换机被配置为 **switchport mode dynamic desirable** 或 **switchport mode trunk**,则它将尝试建立干道链路。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。动态自动需要另一端发起请求才能形成干线链路。", "topic": [ "VLAN干道和EtherChannel捆绑" ] }, { "id": "Wired Network-1022", "type": 0, "question": "在已知IP地址的情况下,用哪种协议请求主机的MAC地址?", "choices": [ "地址解析协议(ARP)", "动态主机配置协议(DHCP)", "ARPv6(地址解析协议版本6)", "DNS(Domain Name System)域名系统。" ], "answer": "A", "solution": "地址解析协议(ARP)用于在已知IP地址的情况下请求MAC地址。", "topic": [ "网络协议和网络设备基础知识" ] }, { "id": "Wired Network-1023", "type": 0, "question": "以下哪个是网络主机的有效IPv4地址?", "choices": [ "127.0.0.1", "169.254.0.0/16", "172.17.58.254", "255.10.15.7" ], "answer": "C", "solution": "在列出的答案中,172.17.58.254是唯一一个有效的IPv4网络主机地址。网络上的主机是使用IP地址与其他计算机或设备通信的任何计算机或网络设备。172.17.58.254是一个B类私有IP地址,因此符合网络主机的有效IPv4地址的描述。\n\n其他错误答案:127.0.0.1是IPv4本地回环地址。使用TCP/IP的每台计算机都会获得此地址,用于测试。此地址无法用于与网络上的其他主机通信。169.254.0.0/16表示IP地址169.254.0.0和默认子网掩码255.255.0.0,表示网络号为169.254;它不是有效的主机IP地址,因为它以0.0结尾。网络的第一个IP地址始终保留给网络号;它不能被主机使用。否则,如果地址是169.254.0.1,地址将起作用,但因为它是APIPA地址,它只能与使用APIPA地址的其他系统通信。255.10.15.7无效。该地址在保留的E类范围内。对于正常的主机IP地址,第一个八位组要么在1到126之间,要么在128到223之间,但不能在224到255之间。", "topic": [] }, { "id": "Wired Network-1024", "type": 0, "question": "关于网络分段和Web身份验证,哪个陈述是正确的?", "choices": [ "网络分段永远不应与Web身份验证一起使用;它们是互斥的技术。", "VLAN更改可以使用,TrustSec SGT也可以使用,但是VLAN更改和SGT不能同时使用。", "只有TrustSec SGT可以与Web身份验证一起使用,以提供分段。", "VLAN更改应仅用于能够识别更改并请求新DHCP地址的设备。" ], "answer": "D", "solution": "Web身份验证主要用于设备无法执行更强的用户身份验证时,例如设备没有802.1X支持程序。如果设备没有支持程序,则不应更改其VLAN。没有支持程序,设备通常无法识别更改并请求新的IP地址。但是,仍然可以使用VLAN更改。有一些技巧,例如实现非常短的DHCP租赁时间,以帮助在没有支持程序的设备上启用VLAN更改。TrustSec标签(SGT)始终是微分段的好选择,并且它们与任何分段技术都不是互斥的。", "topic": [ "Web身份验证" ] }, { "id": "Wired Network-1025", "type": 0, "question": "在这个场景中,你负责管理一个由四个内部局域网(LAN)组成的互联网。每个内部LAN都使用双绞线千兆以太网连接用户到交换机。这四个交换机中的每一个都连接到一个单独的路由器。所有四个路由器都连接到同一个骨干网络,该网络有一个额外的路由器,使用T-1广域网(WAN)链路将公司网络连接到互联网。今天,四个内部LAN中的一个LAN的用户报告说,当他们今天早上来的时候,他们无法访问互联网或其他三个内部LAN上的资源。但是,他们可以毫无问题地访问自己的LAN上的资源。在这种情况下,哪个网络组件最有可能是问题的根源?", "choices": [ "问题局域网上的开关", "互联网路由器", "连接问题局域网和骨干网的路由器", "主干网络上的电缆" ], "answer": "C", "solution": "在这种情况下,只有一个局域网上的用户在连接到互联网和其他内部局域网时遇到问题。这将问题隔离到该局域网内的一个组件。由于用户可以成功连接到本地资源,因此问题不在于个人计算机、连接用户到网络的交换机或骨干网络电缆。因此,最有可能的问题在于连接问题局域网与骨干网络的路由器。由于其他内部局域网上的用户没有报告连接互联网的问题,因此问题很可能不涉及互联网路由器。", "topic": [] }, { "id": "Wired Network-1026", "type": 0, "question": "IPv6使用的地址位数比IPv4多多少位?", "choices": [ "32", "64", "96", "128" ], "answer": "C", "solution": "IPv6使用128位地址,而IPv4使用32位地址,因此它们之间的差异是96。", "topic": [ "Internet协议第六版(IPv6)设计" ] }, { "id": "Wired Network-1027", "type": 0, "question": "如果你正在使用一种名为10Base2的电缆介质,这意味着什么?", "choices": [ "你正在通过HDMI传输以太网。", "你正在使用光纤传输以太网。", "你正在使用粗同轴电缆传输以太网。", "你正在捆绑多个连接。", "你真的很老,使用细同轴电缆作为你的局域网介质。" ], "answer": "E", "solution": "10Base2是最早的以太网网络物理介质之一,是一种细型同轴电缆。", "topic": [ "当前的以太网规范" ] }, { "id": "Wired Network-1028", "type": 0, "question": "基线通常包括以下哪些内容?", "choices": [ "处理器", "记忆", "存储子系统", "有线/无线利用率", "以上所有选项。" ], "answer": "E", "solution": "可以对任何被认为对运营至关重要的指标进行基准线测量。", "topic": [ "确保网络可用性" ] }, { "id": "Wired Network-1029", "type": 0, "question": "您需要为一位在Windows Pro计算机上远程工作的员工配置虚拟专用网络(VPN)。在Windows设置中,哪个类别组提供了建立拨号或VPN连接的选项?", "choices": [ "网络和共享中心", "网络和互联网", "系统", "账户" ], "answer": "B", "solution": "网络和互联网是设置类别,提供设置VPN或拨号连接的选项。网络和共享中心是控制面板实用程序。系统设置类别处理显示、声音、电源、通知和其他设置。账户类别有助于管理用户和同步设置。在Windows 11中,但不在Windows 10中,Windows备份包含在账户类别中。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1030", "type": 0, "question": "以下哪个参数可以让你指定 `ping` 工具传输的消息数量?", "choices": [ "`-n`", "`-t`", "`-i`", "`-a`" ], "answer": "A", "solution": "使用`ping`工具时,使用`-n`参数可以指定每次执行时工具应传输的消息数。`-t`参数会导致`ping`工具不断向目标发送消息,直到手动停止。`-i`参数指定`ping`传输的消息的生存时间(TTL)值。`-a`参数将指定为目标的Internet协议(IP)地址解析为主机名。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1031", "type": 0, "question": "以下哪个Power over Ethernet(PoE)规范使用10Base-T或100Base-TX双绞线网络上的备用线对设备供电?", "choices": [ "备选项 A", "备选项 B", "4PPoE", "以上所有选项。" ], "answer": "B", "solution": "备选方案B的PoE变体可以利用CAT 5或更好的10Base-T或100Base-TX电缆中的备用线对连接设备供电。备选方案A和4PPoE变体不能以这种方式使用备用线对设备供电;它们使用同时传输数据的线对来供电。对于千兆以太网或更快的安装,备选方案B也可以使用数据线对。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1032", "type": 0, "question": "有几个用户向你报告了他们的VoIP和流媒体视频连接出现问题。在每种情况下,音频或视频连接会频繁中断,导致令人沮丧的中断。以下哪个术语描述了有线网络上的连接问题,可能会导致这些症状?", "choices": [ "抖动", "延迟", "瓶颈。", "衰减" ], "answer": "A", "solution": "当数据流中的单个数据包由于网络拥塞、不同的路由或排队问题而延迟时,所产生的连通性问题称为抖动。虽然这种情况可能不会对异步应用程序造成问题,但实时通信,如VoIP或流媒体视频,可能会受到中断,从而得名。延迟描述的是网络传输的一般延迟,而不是单个数据包的延迟。衰减是信号在通过网络介质时的衰减。瓶颈是一种情况,所有流量都会延迟,由于故障或不足的组件。这三个选项都不能解释用户报告的问题。", "topic": [] }, { "id": "Wired Network-1033", "type": 0, "question": "以下哪个也被称为白名单?", "choices": [ "隐式允许。", "最小权限原则", "隐式拒绝", "需要知道。" ], "answer": "C", "solution": "使用这种方法,除非特别允许的规则,否则所有流量都将被拒绝。这也被称为白名单或允许列表,因为您正在创建一个允许流量的白名单或允许列表,并拒绝所有其他流量。", "topic": [ "网络加固技术" ] }, { "id": "Wired Network-1034", "type": 0, "question": "以下哪个TCP/IP协议是作为Telnet的替代品而设计的?", "choices": [ "中小型企业(Small and Medium-sized Businesses)", "SSH(Secure Shell)是一种加密的网络协议,用于在不安全的网络中安全地传输数据。它通常用于远程登录到服务器或其他网络设备,并提供了一种安全的方式来执行命令和传输文件。", "安全文件传输协议(SFTP)", "FTP安全传输协议(FTPS)" ], "answer": "B", "solution": "安全外壳协议(SSH)可用于在端口22上设置安全会话,以进行远程登录或远程执行程序和传输文件。由于它是安全的,最初设计为取代不安全的“telnet”命令。服务器消息块(SMB)、文件传输协议(FTP)和FTP安全(FTPS)协议用于在网络上共享文件。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1035", "type": 0, "question": "在交换机中使dACLs生效,必须在IOS中启用哪个功能?", "choices": [ "EPM日志记录", "设备追踪", "dot1x系统认证控制。", "RADIUS可扩展认证协议中的VSA(Vendor-Specific Attributes)" ], "answer": "B", "solution": "必须启用设备跟踪才能捕获终端的IP地址。", "topic": [ "实现有线和无线认证" ] }, { "id": "Wired Network-1036", "type": 0, "question": "BGP会话使用哪个TCP端口号?", "choices": [ "110", "123", "179", "443" ], "answer": "C", "solution": "BGP使用TCP端口179。", "topic": [ "BGP故障排除" ] }, { "id": "Wired Network-1037", "type": 0, "question": "以下哪种协议用于交换目录服务信息?", "choices": [ "远程桌面协议(RDP)", "LDAP(轻型目录访问协议)", "简单网络管理协议(SNMP)", "中小型企业(Small and Medium-sized Businesses)" ], "answer": "B", "solution": "轻量级目录访问协议(LDAP)是一种应用层协议,用于管理和访问存储在目录服务中的信息。远程桌面协议(RDP)用于与另一台计算机建立图形远程控制会话。简单网络管理协议(SNMP)用于将分布在网络中的管理代理收集的信息传输到中央管理服务器。服务器消息块(SMB)是Windows系统使用的主要文件共享协议。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1038", "type": 0, "question": "用户报告称他们无法看到他们的网络共享文件夹或电子邮件,甚至无法连接打印机,但本地应用程序正常工作。你询问自上次访问以来发生了什么变化,用户提到他们清理了他们的桌子。可能的问题是什么?", "choices": [ "用户可能没有登录。", "打印机、电子邮件和文件服务器可能处于离线状态。", "网络电缆可能未连接。", "组策略已重新配置。" ], "answer": "C", "solution": "考虑到用户最近清理了他们的桌子,很可能移动了电缆。首先要检查的是网络电缆。你知道他们已经登录,因为他们正在本地工作。如果服务器离线或问题是由重新配置的组策略引起的,你会收到其他投诉。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1039", "type": 0, "question": "哪个命令可以在Nexus 9000系列交换机上启用Bash shell?", "choices": [ "运行bash。", "特性:Bash Shell", "运行bash sudo su。", "用户名为foo,shell类型为bash。" ], "answer": "B", "solution": "通过运行命令 **feature bash-shell**,您可以启用Bash shell。命令 **run bash** 加载Bash并从用户的主目录开始。", "topic": [ "自动化和脚本工具" ] }, { "id": "Wired Network-1040", "type": 0, "question": "以下哪个是混合网络的例子?", "choices": [ "以太网交换机", "环形拓扑结构", "总线拓扑结构", "星型拓扑结构" ], "answer": "A", "solution": "这个问题的最佳答案是以太网交换机,它使用星型物理拓扑结构和逻辑总线技术。", "topic": [ "网络介绍" ] }, { "id": "Wired Network-1041", "type": 0, "question": "以下哪种QoS排队特性是FIFO的例子?", "choices": [ "支持实时排队和最小带宽保证。", "基于DSCP值提供动态分配。", "通常会有四到六个队列,每个队列都有相应的重要性级别,最重要的队列会先得到服务。", "适用于延迟较低、拥塞非常小的大型链接,但不需要优先级或流量类别的要求。" ], "answer": "D", "solution": "“先进先出”(FIFO)排队是默认排队方式,当没有使用其他排队方式时使用。虽然FIFO被认为适用于延迟较低、非常少拥塞的大型链路,但它没有优先级或流量类别。", "topic": [ "网络服务和管理" ] }, { "id": "Wired Network-1042", "type": 0, "question": "以下哪种协议不用于远程控制计算机?", "choices": [ "远程桌面协议(RDP)", "TFTP(Trivial File Transfer Protocol)简易文件传输协议", "SSH(Secure Shell)安全外壳协议。", "远程登录协议(Telnet)" ], "answer": "B", "solution": "Trivial File Transfer Protocol(TFTP)通常用于将引导映像文件下载到执行预启动执行环境(PXE)启动的计算机。它不用于远程控制。远程桌面协议(RDP)由Windows中的远程桌面服务使用,以提供客户端对远程位置的服务器进行图形控制。安全外壳(SSH)和Telnet都是基于字符的工具,使用户能够在远程计算机上执行命令。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1043", "type": 0, "question": "你正在更改SOHO路由器的一些配置设置,发现WPA3不可用。你可以采取什么措施来解决这个问题?", "choices": [ "配置端口转发。", "配置内容过滤。", "更新SSID。", "更新路由器的固件。" ], "answer": "D", "solution": "就像电脑一样,路由器偶尔需要更新软件以添加新功能或修复安全漏洞。在路由器上,这被称为固件更新,因为它正在更新嵌入在路由器电路板上的芯片中的软件(即路由器的固件)。端口转发将指定端口号的流量发送到指定的计算机。内容过滤检查指定内容的数据包,并根据这些标准拒绝或允许数据包进入或离开网络。SSID(服务集标识符)是网络的名称。", "topic": [ "安全" ] }, { "id": "Wired Network-1044", "type": 0, "question": "哪个协议使用389端口?", "choices": [ "SMTP的中文全称为“简单邮件传输协议”,是一种用于电子邮件传输的协议。", "POP3(邮局协议版本3)", "LDAP(轻型目录访问协议)", "安全超文本传输协议(HTTPS)" ], "answer": "C", "solution": "端口389是默认端口,由轻量级目录访问协议(LDAP)使用。端口636用于安全LDAP。", "topic": [] }, { "id": "Wired Network-1045", "type": 0, "question": "你在办公楼里需要打电话,但当你看着手机时,信号只有一格。你应该怎么办?", "choices": [ "请求加入他们的Wi-Fi并使用它打电话。", "靠近外墙移动。", "靠近电梯。", "前往较低楼层。" ], "answer": "B", "solution": "多重墙壁和地板隔绝了你和外界的联系,更不用说办公楼内的所有电子设备可能会干扰你的信号。向远离干扰墙壁和设备的外墙或窗户移动,看看连接是否会改善。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1046", "type": 0, "question": "假设您需要设置一个自主AP,以便向客户端提供三个不同的SSID。该AP将连接到有线网络基础设施。以下哪个陈述关于AP是正确的?", "choices": [ "它只能支持一个SSID,必须通过接入链路传输。", "它可以在一个接入链路上支持多个SSID。", "它可以通过802.1Q干道链路支持多个SSID。", "一个自主的接入点需要一个集中式控制器来支持SSID。" ], "answer": "C", "solution": "需要一个主干链路来承载多个服务集标识符(SSID)到多个虚拟局域网(VLAN)。", "topic": [ "实现自主和云部署" ] }, { "id": "Wired Network-1047", "type": 0, "question": "管理员定义了基于目标端口80和443匹配流量的构造,允许通过这些端口的流量以及返回流量。预计该策略将应用于客户端EPG和Web EPG之间的通信。如何将该策略应用于这两个EPG,以允许客户端与Web EPG建立通信?", "choices": [ "在两个EPG上的消费者方向上。", "在两个EPG上都是提供者方向。", "在客户端EPG中的提供者方向,在Web EPG中的消费者方向。", "在客户端EPG的消费者方向上,在Web EPG的提供者方向上。" ], "answer": "D", "solution": "当客户端从另一个系统请求服务时,客户端是服务器端服务的消费者,而服务器是服务的提供者。", "topic": [ "租户建筑模块" ] }, { "id": "Wired Network-1048", "type": 0, "question": "这些协议中,哪一个需要在传输数据之前建立连接?", "choices": [ "TCP", "UDP", "IP", "OSPF" ], "answer": "A", "solution": "在传输数据之前,TCP需要通过三次握手建立连接。", "topic": [ "网络协议和网络设备基础知识" ] }, { "id": "Wired Network-1049", "type": 0, "question": "DMPVN的哪个组件可以在IPsec隧道上启用动态路由协议?", "choices": [ "OSPF", "NHRP", "IPsec", "GRE" ], "answer": "D", "solution": "IPsec隧道中的通用路由封装使得动态路由协议的使用成为可能。", "topic": [ "动态多点虚拟专用网络(DMVPN)" ] }, { "id": "Wired Network-1050", "type": 0, "question": "iSCSI initiator使用以下哪种技术在网络上定位iSCSI目标?", "choices": [ "活动目录", "ICMP(Internet控制消息协议)", "DNS(Domain Name System)域名系统。", "iWINS(我赢)", "iSNS(Internet Storage Name Service)" ], "answer": "E", "solution": "Internet存储名称服务(iSNS)是一种应用程序,为iSCSI initiator提供网络上目标的自动发现。 iSNS还可以作为Fibre Channel设备的发现服务。 Active Directory,Internet控制消息协议(ICMP)和域名系统(DNS)无法注册iSCSI目标。 iWINS不存在。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1051", "type": 0, "question": "在路由器配置中使用命令“ip access-list 1 permit 172.16.4.0 0.0.1.255”添加了一个单行ACL。配置还包括在VTY配置模式下使用“access-class 1 in”命令。以下哪个答案准确描述了路由器如何使用ACL 1?\n\n路由器将使用ACL 1来控制入站VTY连接,只允许来自172.16.4.0/23网络的流量通过。", "choices": [ "子网172.16.4.0/23中的主机可以telnet进入路由器。", "CLI用户无法仅从路由器telnet到172.16.4.0/23子网中的主机。", "子网172.16.4.0/23中的主机可以登录,但无法进入路由器的特权模式。", "路由器只会转发源地址在子网172.16.4.0/23中的数据包。" ], "answer": "A", "solution": "“ip access-class 1 in”命令启用ACL 1,用于处理Telnet和SSH连接到该路由器的入站流量,基于这些传入数据包的源IP地址。它不会影响路由器到其他主机的Telnet或SSH尝试。它不会影响用户后来达到启用模式。它也与过滤本应通过路由器路由的数据包无关。请注意,ACL匹配所有源IP地址在子网172.16.4.0/23中的数据包,其中包括从172.16.4.0到172.16.5.255的数字范围。", "topic": [ "保护网络设备" ] }, { "id": "Wired Network-1052", "type": 0, "question": "以下哪种FHRP支持负载均衡?", "choices": [ "ODR", "VRRP", "HSRP", "GLBP" ], "answer": "D", "solution": "网关负载平衡协议为多个虚拟化功能适配器提供负载平衡支持。", "topic": [ "IP服务" ] }, { "id": "Wired Network-1053", "type": 0, "question": "以下哪个是物联网设备在僵尸网络中可以扮演的角色?", "choices": [ "指挥与控制", "处理程序", "僵尸", "经纪人" ], "answer": "C", "solution": "物联网设备很容易成为僵尸网络的招募对象,僵尸网络是攻击者控制和指挥的一组系统,用于发动拒绝服务攻击。", "topic": [ "网络加固技术" ] }, { "id": "Wired Network-1054", "type": 0, "question": "Alice被指示创建一个具有8个子网和每个子网30个主机的IPv4网络。她被分配了一个C类网络地址。她将不得不使用以下哪个子网掩码?", "choices": [ "子网掩码为255.255.255.128。", "子网掩码为255.255.255.192。", "子网掩码为255.255.255.224。", "子网掩码为255.255.255.240。", "子网掩码为255.255.255.248。", "子网掩码为255.255.255.252表示该网络可以容纳2个可用的IP地址。" ], "answer": "C", "solution": "为了创建一个具有8个子网和每个子网30个主机的网络,Alice需要在最后一个八位字节中分配3个位用于子网标识符。这将导致子网掩码中最后一个八位字节的二进制值为11100000,转换为十进制值为224。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1055", "type": 0, "question": "哪个SNMP组件包含代理?", "choices": [ "托管设备", "代理人", "NMS管理器", "MIB" ], "answer": "A", "solution": "托管设备包含SNMP代理。", "topic": [ "IP组播和网络管理" ] }, { "id": "Wired Network-1056", "type": 0, "question": "一位用户打电话给公司的IT帮助台报告说她在Windows工作站上收到了一个错误消息。错误消息显示她的计算机在网络上有一个重复的IP地址。Ralph担心网络上的DHCP服务器存在配置问题。他怀疑有DHCP服务器配置了重叠的范围,导致两个DHCP服务器将相同的IP地址分配给不同的客户端。他担心他们即将接到大量报告同样问题的电话。Alice安慰Ralph,告诉他这不可能是DHCP问题,必须有两台手动配置了相同IP地址的计算机。Alice是怎么知道这一点的?", "choices": [ "因为Windows计算机在接受DHCP服务器提供的IP地址之前会检查路由表。", "因为DHCP服务器使用DNS查询来检查重复的IP地址。", "因为DHCP客户端使用ARP广播来检查重复的IP地址。", "因为在给定的子网上只能有一个DHCP服务器。" ], "answer": "C", "solution": "当动态主机配置协议(DHCP)客户端被DHCP服务器提供一个内部协议(IP)地址时,在接受该地址之前,客户端会使用该地址广播地址解析协议(ARP)请求。如果本地网络上的另一台计算机正在使用提供的地址,则计算机会响应ARP请求,DHCP客户端会拒绝该地址。然后DHCP服务器会提供另一个地址。域名服务(DNS)查询和路由表检查不是检查重复IP地址的可靠方法。在同一本地网络上可能有两个DHCP服务器,但它们必须配置不重叠的范围。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1057", "type": 0, "question": "您为用户安装了一个新的网络接口卡(NIC),他问它是做什么用的。以下哪个最能描述这个设备的功能?", "choices": [ "多媒体", "通信", "输入/输出", "存储" ], "answer": "B", "solution": "网络接口卡(NIC)是一种通信设备,它使计算机能够与网络上的其他计算机进行通信。它不提供多媒体、输入/输出(如USB端口所做的那样)或存储功能。", "topic": [ "扩展卡、存储设备和电源供应。" ] }, { "id": "Wired Network-1058", "type": 0, "question": "假设客户希望无线网络上的用户在获得无线网络访问权限之前进行用户名和密码认证。以下哪些项目可以利用来添加这种安全要求,以满足客户的需求?", "choices": [ "半径(网络安全中的一种认证协议)", "TACACS(终端访问控制器访问控制系统)", "简单网络管理协议(SNMP)", "AES服务器" ], "answer": "A", "solution": "顾客需要用户认证,因此您可以利用RADIUS、AAA或NAC(Cisco ISE)服务器来满足这个需求。", "topic": [ "无线的" ] }, { "id": "Wired Network-1059", "type": 0, "question": "以下哪种方法是在部署后的调查中确认漫游性能良好的好方法?", "choices": [ "客户端在关联到下一个接入点之前扫描少于三个信道。", "在前一个接入点上的最后一个数据包和下一个接入点上的第一个数据包之间的时间间隔不超过50毫秒。", "在下一个接入点上,探测请求和关联请求之间的时间应在30毫秒或更短。", "漫游区域内AP之间的数据包丢失率低于10%" ], "answer": "B", "solution": "在AP之间漫游时,50毫秒的间隙很可能足够小,以至于对应用程序和用户来说是不可见的。这个间隙必须针对数据流量进行测量,而不是针对管理帧进行测量,因为这些帧构成了不相关于应用程序体验的开销。在漫游决策之前应该进行信道扫描,它们的数量对漫游阶段的持续时间没有直接影响。10%的数据包丢失很可能会对大多数应用程序造成干扰,并且不是有效漫游的标志。", "topic": [ "进行现场勘测" ] }, { "id": "Wired Network-1060", "type": 0, "question": "哪个命令用于将静态默认路由重新分发到OSPF中?", "choices": [ "重新分配静态(资源)", "重新分配OSPF 1子网。", "默认信息生成", "将所有流量路由到距离为110的默认网关。" ], "answer": "C", "solution": "命令 **default-information originate** 用于将静态默认路由重新分发到OSPF中。", "topic": [ "OSPFv2故障排除" ] }, { "id": "Wired Network-1061", "type": 0, "question": "以下哪个域名系统(DNS)资源记录用于将主机名解析为IPv6地址?", "choices": [ "MX", "PTR", "AAAA", "CNAME" ], "answer": "C", "solution": "AAAA资源记录将主机名映射到IPv6地址,用于名称解析。邮件交换(MX)记录指定域应使用的邮件服务器。指针记录(PTR)也包含主机名和IP地址,但它们用于反向名称解析,即将IP地址解析为主机名。规范名称(CNAME)记录指定给定主机名的别名。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1062", "type": 0, "question": "Alice应该检查该用户的计算机的IP配置属性,以确保它们与网络的要求相匹配。如果有任何不匹配或错误的设置,她应该帮助用户更正这些设置,并确保用户能够重新连接到网络上的主机。", "choices": [ "运行“ipconfig”命令以查看本地配置。", "检查域名系统(DNS)服务器,看看它是否解析IP主机名。", "检查Windows Internet名称服务(WINS)服务器,看看它是否解析网络基本输入/输出系统(NetBIOS)名称。", "验证路由器是否正常工作。" ], "answer": "A", "solution": "由于只有一个用户报告了问题,并且他已经承认对他的IP配置进行了更改,Alice应该从使用“ipconfig”命令检查配置开始。如果路由器、DNS服务器或WINS服务器引起了问题,那么不止一个用户会遇到困难。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1063", "type": 0, "question": "你的一个客户购买了一种可以执行防火墙职责、路由任务、数据包检查和防病毒扫描的设备。以下哪种设备被购买了?", "choices": [ "UTM设备", "动态主机配置协议(DHCP)服务器", "代理服务器", "IDS设备" ], "answer": "A", "solution": "一个统一威胁管理(UTM)设备是一个可以完成多个安全设备工作的设备。UTM通常充当防火墙、路由器、数据包分析器和病毒扫描器等多种功能。", "topic": [] }, { "id": "Wired Network-1064", "type": 0, "question": "在动态主机配置协议(DHCP)服务器上,应配置以下哪个选项以向客户端提供默认网关地址?", "choices": [ "路由器", "时间服务器", "名称服务器", "本地打印机服务器" ], "answer": "A", "solution": "路由器选项指定本地网络上路由器的地址,包括默认网关路由器。时间服务器选项指定向网络提供时间信号的服务器的地址。名称服务器选项指定网络上最多10个名称解析服务器(非DNS服务器)的地址。LPR服务器选项指定网络上线打印机服务器的地址。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1065", "type": 0, "question": "以下哪个陈述最好地定义了带外管理?", "choices": [ "带外管理是一种从远程位置访问网络设备的方法。", "带外管理是一种通过直接电缆连接访问网络设备的方法。", "带外管理是一种通过与设备连接的生产网络以外的系统连接来访问网络设备的方法。", "带外管理是一种通过生产网络访问网络设备的方法,使用任何在该设备连接的生产网络上运行的工具。" ], "answer": "C", "solution": "带外管理是指使用替代通信渠道来管理网络设备。这个通道可以是调制解调器连接、直接电缆连接、无线或蜂窝连接,或专用以太网连接。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1066", "type": 0, "question": "一些用户在连接他们本地网络上的应用服务器时遇到问题。您前往他们的部门,并开始通过在其中一个用户工作站上使用ping工具测试连接来排除问题。您发现可以使用计算机名称成功ping通服务器,但使用计算机的完全限定域名(FQDN)ping失败。基于这些测试,您可以确定以下哪个是问题最可能的来源?", "choices": [ "电磁干扰", "动态主机配置协议(DHCP)", "DNS(Domain Name System)域名系统。", "访问控制列表 (ACL)。" ], "answer": "C", "solution": "只有域名系统(DNS)服务器执行FQDN解析,因此这很可能是问题的源头。在不使用DNS的情况下,可以成功地使用计算机名称对本地网络上的设备进行ping。动态主机配置协议(DHCP)不可能是问题,否则您将无法ping通服务器。电磁干扰(EMI)会阻碍所有网络通信,访问控制列表(ACL)是一种授权机制,对“ping”测试没有影响。", "topic": [] }, { "id": "Wired Network-1067", "type": 0, "question": "以下哪种最能描述思科WLC提供设备管理员AAA的方式?", "choices": [ "WLC提供基于角色的访问控制(RBAC),以菜单为基础。只有管理员有访问权限的菜单才会显示,其他所有菜单都会被隐藏。", "WLC提供基于角色的访问控制(RBAC),以菜单为基础进行控制。WLC管理员可以看到该菜单中的所有配置项,但任何被拒绝的设置都会变灰。", "WLC提供基于角色的访问控制(RBAC),以菜单为基础进行控制。WLC管理员可以看到该菜单中的所有配置项,但在应用更改之前会进行授权。", "WLC提供基于角色的访问控制(RBAC),以每个命令为基础。WLC管理员可以看到所有菜单,但被拒绝的任何命令都不会显示在菜单中。" ], "answer": "C", "solution": "WLC提供基于角色的访问控制(RBAC),以菜单为基础。WLC管理员可以看到该菜单中的所有配置项,但在应用更改之前进行授权。因此,如果名为admin1的用户没有访问CONTROLLER菜单的权限,admin1可以看到菜单及其所有项目,并在Web页面上进行更改,但当admin1单击应用时,将出现授权失败消息。", "topic": [ "使用Cisco WLC配置设备管理员AAA" ] }, { "id": "Wired Network-1068", "type": 0, "question": "你需要在一根以太网交叉线缆的末端安装一个连接器。现有的末端有一个白色和绿色的线连接到针脚1。在新的末端,你需要将哪种颜色的线连接到针脚1?", "choices": [ "白/绿", "绿色的", "白/橙色", "橙色" ], "answer": "C", "solution": "交叉线会在每端翻转1号和3号引脚。因此,这一端需要将白/橙线作为1号引脚。这种线缆的正确顺序应该是白/橙、橙、白/绿、蓝、白/蓝、绿、白/棕、棕。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1069", "type": 0, "question": "你正在手动配置一个TCP/IP主机。另一个管理员给你路由器的IP地址。TCP/IP术语是什么?", "choices": [ "默认网关", "子网掩码", "DNS服务器", "动态主机配置协议(DHCP)服务器" ], "answer": "A", "solution": "路由器是你通往其他网络的门户,在TCP/IP术语中被称为默认网关。如果没有这个配置选项,你将无法访问外部网络。子网掩码告诉主机它所在的网络。DNS服务器将主机名解析为IP地址,DHCP服务器为主机提供IP配置信息。", "topic": [ "TCP/IP介绍" ] }, { "id": "Wired Network-1070", "type": 0, "question": "以下哪种机制是思科开发的组到RP映射机制?", "choices": [ "平衡式回归(BSR)", "静态RP", "自动RP(Auto-RP)", "幻影角色扮演游戏", "任播-RP" ], "answer": "C", "solution": "Auto-RP是思科专有的机制,可自动在PIM网络中分发组到RP映射。", "topic": [ "多播" ] }, { "id": "Wired Network-1071", "type": 0, "question": "以下缩写中哪一个是2000:0300:0040:0005: 6000:0700:0080:0009的最短有效缩写?", "choices": [ "9", "2000:300:40:5:6000:700:80:9", "2000:300:4:5:6000:700:8:9", "2000:3:4:5:6:7:8:9" ], "answer": "B", "solution": "这个问题有很多四位数,容易犯一个常见错误:删除十六进制数字的末尾0。为了缩写IPv6地址,只应删除四位数中的前导0。许多四位数有末尾0(在四位数右侧的0),因此请确保不要删除这些0。", "topic": [ "IP版本6的基础知识" ] }, { "id": "Wired Network-1072", "type": 0, "question": "以下哪种设备用于在同一虚拟局域网(VLAN)中物理连接计算机?", "choices": [ "一座桥。", "一个集线器", "一个开关", "一个路由器" ], "answer": "C", "solution": "将路由器替换为交换机将把一个互联网络转变为一个单一的大子网,而VLAN存在于交换结构的逻辑元素之上。虽然VLAN是网络层子网的功能等效物,但单个VLAN中的系统仍然通过交换机连接,而不是路由器。桥连接数据链路层的网络段,并有选择地在这些段之间转发流量。然而,桥不像交换机那样提供两个系统之间的专用连接,并且它们不能将一个大型路由互联网络转换为单个交换网络。因此,它们在实现VLAN方面没有作用。集线器是物理层设备,通过所有端口传播所有传入流量。用集线器替换互联网络上的路由器将创建一个具有大量流量和冲突的单个共享网络。因此,集线器不连接VLAN中的计算机。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1073", "type": 0, "question": "以下哪种方式不是AP可以了解可能加入的WLC的有效方式?", "choices": [ "已准备好的条目", "从先前连接的控制器中列出。", "动态主机配置协议(DHCP)", "子网广播。", "DNS(Domain Name System)域名系统。", "来自另一个接入点的无线邻居消息。" ], "answer": "F", "solution": "AP可以通过列出的任何方法学习控制器地址,但不能使用无线邻居消息。AP确实会通过无线发送邻居消息,但这些消息用于发现相邻的AP,而不是潜在的WLC加入。", "topic": [ "无线基础设施" ] }, { "id": "Wired Network-1074", "type": 0, "question": "以下哪个Unix/Linux工具是协议分析器?协议分析器是一种从网络中捕获数据包并检查其内容的工具。", "choices": [ "`nmap`是一款网络扫描和主机检测工具。", "网络抓包工具。", "路径ping", "`iptables`(互联网数据包过滤系统)" ], "answer": "B", "solution": "Unix/Linux的`tcpdump`实用程序是一种协议分析器。它是一个命令行工具,可以捕获网络数据包并显示其内容。`iptables`、`nmap`和`pathping`实用程序无法捕获和分析数据包。`iptables`管理Unix/Linux内核防火墙规则,`nmap`是一个端口扫描器,`pathping`是一个Windows路由跟踪工具。", "topic": [] }, { "id": "Wired Network-1075", "type": 0, "question": "当在使用Cisco DNA Center APIs时指定**timestamp**参数时,时间应该使用什么格式?", "choices": [ "UNIX时间", "OS/2(操作系统/2)", "OpenVMS(开放式虚拟存储系统)", "系统时间" ], "answer": "A", "solution": "Cisco DNA Center API中的“timestamp”参数是以UNIX纪元时间表示的,单位为毫秒。", "topic": [ "思科企业网络管理平台和API" ] }, { "id": "Wired Network-1076", "type": 0, "question": "vPC对等设备使用什么协议来同步转发平面信息并实现必要的配置检查?", "choices": [ "地址解析协议(ARP)", "Fabric服务", "Internet组管理协议(IGMP)", "对等连接" ], "answer": "B", "solution": "vPC对等体使用Cisco Fabric Services协议来同步转发平面信息并实施必要的配置检查。", "topic": [ "实施数据中心交换协议" ] }, { "id": "Wired Network-1077", "type": 0, "question": "以下哪个不是众所周知的BGP社区?", "choices": [ "不得宣传广告。", "互联网", "不导出", "私有路由" ], "answer": "D", "solution": "其他社区是普遍的全球社区。", "topic": [ "高级BGP" ] }, { "id": "Wired Network-1078", "type": 0, "question": "一个T-3租用线路连接相当于多少个T-1连接?", "choices": [ "7", "14", "28", "112" ], "answer": "C", "solution": "一条T-3租用线路相当于28条T-1连接。每个T-1由24个通道组成,因此T-3总共有672个通道(28×24),总传输速率为44.736 Mbps。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1079", "type": 0, "question": "哪种服务可以收集和记录由服务器和网络设备产生的所有系统生成的消息?", "choices": [ "系统日志服务器", "DNS服务器", "打印服务器", "认证服务器" ], "answer": "A", "solution": "Syslog服务器使用Syslog协议运行,该协议被许多不同的操作系统和设备使用。这些系统生成的消息从平凡的“系统已启动”到关键警报不等。DNS服务器将域名解析为IP地址。打印服务器通过网络为多个用户提供打印服务,并管理打印作业,认证服务器在授予对资源的访问权限之前验证身份。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1080", "type": 0, "question": "以下哪个命令显示接口是否设置为内联 TAP 模式?", "choices": [ "显示内联式触控。", "显示内联集合。", "显示接口IP摘要", "显示内联式监测接口。" ], "answer": "B", "solution": "\"show inline-set\" 命令可以确认一个接口是否被设置为内联抓包模式。", "topic": [ "仅检测模式下的部署" ] }, { "id": "Wired Network-1081", "type": 0, "question": "以下哪个可以发送最远的数据?", "choices": [ "多模光纤", "单模光纤", "生成树协议(Spanning Tree Protocol)", "同轴的" ], "answer": "B", "solution": "单模光纤电缆可以传输数据长达数百公里,比其他答案都更远。", "topic": [] }, { "id": "Wired Network-1082", "type": 0, "question": "Firepower Management Center如何处理使用相同用户名/密码组合同时登录FMC门户、API浏览器和API的情况?", "choices": [ "所有的登录都可以同时使用。", "无论使用何种访问方式,FMC仅支持一次会话。", "FMC支持一个会话连接到FMC Web UI,另一个会话连接到API Explorer或已登录到REST API。", "这些答案都不正确。" ], "answer": "B", "solution": "无论使用何种方法访问FMC,只支持使用一个用户名进行并发登录。", "topic": [ "思科平台" ] }, { "id": "Wired Network-1083", "type": 0, "question": "在思科企业架构模型中,以下哪个是SP边缘模块?", "choices": [ "公共交换电话网(PSTN)服务", "边缘分布", "服务器农场", "核心层" ], "answer": "A", "solution": "SP边缘包括互联网、公共交换电话网和广域网模块。", "topic": [ "网络设计模型" ] }, { "id": "Wired Network-1084", "type": 0, "question": "你负责管理一个拥有域名系统(DNS)服务器、代理服务器和互联网路由器的网络。一个用户报告说她无法连接到自己的局域网(LAN)或其他内部LAN上的主机,也无法访问互联网上的主机。没有其他人报告过问题。导致用户无法访问网络的问题最有可能出现在哪个位置?", "choices": [ "路由器", "DNS服务器", "代理服务器", "用户的计算机配置" ], "answer": "D", "solution": "由于只有一个用户报告了困难,问题很可能出现在用户的计算机及其配置上。DNS服务器、代理服务器或路由器问题会影响不止一个用户。", "topic": [] }, { "id": "Wired Network-1085", "type": 0, "question": "以下哪个是“IPv4兼容”的IPv6地址?", "choices": [ "::180.10.1.1", "f000:0:0:0:0:0:180.10.1.1", "180.10.1.1::", "2010::180.10.1.1" ], "answer": "A", "solution": "IPv4-compatible IPv6地址的格式为::d.d.d.d。", "topic": [ "IPv6设计" ] }, { "id": "Wired Network-1086", "type": 0, "question": "当数据被封装时,正确的顺序是什么?", "choices": [ "数据、帧、数据包、分段、比特", "分段、数据、数据包、帧、比特", "数据、分段、数据包、帧、比特", "数据、分段、帧、数据包、比特" ], "answer": "C", "solution": "封装顺序为数据、段、数据包、帧、比特。", "topic": [ "开放系统互联规范" ] }, { "id": "Wired Network-1087", "type": 0, "question": "真或假:使用动态端口分配,端口速度可以降低,但交换机的转发能力会大幅下降。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "只有在一些子端口未被使用的情况下,这才是真实的。", "topic": [ "实施访问策略" ] }, { "id": "Wired Network-1088", "type": 0, "question": "当用户尝试使用非默认登录域进行身份验证时,登录到ACI CLI的用户应该使用哪种特殊的登录语法来认证到该fabric?", "choices": [ "不需要特殊的语法。", "用户名 @ API IP地址", "apic# _域名_ \\\\\\ _用户名_", "apic# _用户名_ @ _apic-ip地址_" ], "answer": "C", "solution": "通过非默认登录域登录CLI需要使用特殊的登录语法:apic# _domain_ \\\\\\ _username_。", "topic": [ "探索ACI" ] }, { "id": "Wired Network-1089", "type": 0, "question": "Content-Type头属性指定请求正文中数据的格式,以便接收方可以将其解析为适当的格式。当您指定请求正文和输出的内容类型时,使用Content-Type application/x-www-form-urlencoded会做什么?", "choices": [ "它表示请求体以键值对元组的形式进行编码。", "它表示请求体的格式为multipart/form-data。", "它将输出类型设置为XML。", "它表示请求体的格式是XML。" ], "answer": "A", "solution": "使用application/x-www-form-urlencoded格式,键和值被编码为键值对,由和号(&)分隔,键和值之间用等号(=)分隔。答案B是不正确的,因为multipart/form-data是一种特殊类型的请求体,其中每个值都作为数据块发送。答案C和D是不正确的,因为请求体格式没有指定为XML。", "topic": [ "网络APIs" ] }, { "id": "Wired Network-1090", "type": 0, "question": "哪个选项或命令可以让你识别出被遮蔽的规则?", "choices": [ "防火墙引擎调试", "分析点击次数", "显示规则冲突。", "显示访问列表。" ], "answer": "C", "solution": "访问控制策略编辑器中的“显示规则冲突”选项允许您识别重复和重叠的规则(也称为阴影规则)。", "topic": [ "访问控制策略" ] }, { "id": "Wired Network-1091", "type": 0, "question": "在分层网络模型中,哪一层负责快速传输?", "choices": [ "网络层", "核心层", "分发层", "接入层" ], "answer": "B", "solution": "分层模型的核心层负责快速传输。", "topic": [ "网络设计模型" ] }, { "id": "Wired Network-1092", "type": 0, "question": "您正在配置运行IPv4的网络上的主机。计算机连接到网络需要哪些元素?", "choices": [ "IP地址", "IP地址和子网掩码", "IP地址、子网掩码和默认网关", "IP地址、子网掩码、默认网关和DNS服务器地址" ], "answer": "B", "solution": "要在IPv4网络上进行通信,主机必须配置有效的IP地址和子网掩码。只有当主机连接到远程网络时才需要默认网关。DNS服务器是可选的,但非常有用,因为它们将主机名解析为IP地址。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1093", "type": 0, "question": "这句话的意思是:波分复用是一种在单个网络介质上传输多个光纤信号的技术。这种复用技术有几种类型,包括粗波分复用(CWDM)、密集波分复用(DWDM)和双向波分复用(BWDM或仅称为WDM)。以下哪一项是这些复用类型之间不同的方式之一?", "choices": [ "它们在单个媒介上携带不同数量的信道。", "它们使用不同的波长间距。", "它们提供不同程度的信号放大。", "它们使用不同形式的幅度调制。" ], "answer": "B", "solution": "不同类型的波分复用使用不同的波长间距,使它们能够在单个介质上容纳不同数量的信道。WDM(或BWDM)携带两个波长进行双向通信。CWDM可以携带多达16个信道,而DWDM可以携带40个或80个信道(取决于所使用的间距)。各种放大技术(包括EFDA和Raman)可以扩展每种类型中可用波长的数量。", "topic": [] }, { "id": "Wired Network-1094", "type": 0, "question": "在与服务提供商谈判新合同时,您对服务的合同可靠性达成了分歧。提供商愿意保证服务可用时间为99%,但您被告知要求99.9%。当您最终达成协议时,协商的语言将包含在以下哪个文件中?", "choices": [ "SLA", "AUP", "NDA", "BYOD" ], "answer": "A", "solution": "服务级别协议(SLA)是提供者和订阅者之间的合同,规定了合同服务可用的时间百分比。可接受使用政策(AUP)规定员工是否以及如何利用公司拥有的硬件和软件资源。保密协议(NDA)规定员工可以在公司外讨论哪些公司信息。自带设备政策(BYOD)规定员工可以在公司网络上使用哪些个人电子设备,并记录连接和保护它们的程序。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1095", "type": 0, "question": "哪种设备不能帮助进行网络分割?", "choices": [ "路由器", "交换机", "集线器", "网桥" ], "answer": "C", "solution": "路由器、交换机和桥接器都是帮助将大型网络分割成多个较小网络的设备,也称为网络分段。集线器不会分段网络,它们只是将网络段连接在一起。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1096", "type": 0, "question": "以下哪个术语描述了信号在网络媒介中传输时逐渐减弱的现象?", "choices": [ "吸收", "延迟", "衰减", "相声" ], "answer": "C", "solution": "衰减是信号在有线或无线介质中传输时随着距离增加而变弱的现象。传输距离越长,信号衰减越严重。吸收是无线信号在穿过不同材料时发生变化的趋势。延迟是信号从源到目的地所需的时间测量。串扰是有线网络上发生的一种干扰,当信号泄漏到相邻的线路上时发生。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1097", "type": 0, "question": "延迟的变化是什么?", "choices": [ "抖动", "带宽变化率", "延迟", "出口延迟" ], "answer": "A", "solution": "当数据到达时存在增加和减少的延迟,传输路径上就会出现抖动。这对于对抖动敏感的应用程序,如语音和视频,非常不利。", "topic": [ "确保网络可用性" ] }, { "id": "Wired Network-1098", "type": 0, "question": "使用OSPFv2的一家公司拥有15个路由器和40个子网的小/中型网络。与多区域设计相比,以下哪项被认为是使用单区域设计的优点?", "choices": [ "它减少了大多数路由器的处理开销。", "状态更改对于其他路由器可能不需要在所有其他路由器上运行SPF。", "它可以让计划和操作更简单。", "它允许路由汇总,减小IP路由表的大小。" ], "answer": "C", "solution": "正确答案是使用单区域设计的一个优点。三个错误答案是使用多区域设计的优点,所有的原因在更大的互联网中都更加重要。", "topic": [ "理解OSPF概念" ] }, { "id": "Wired Network-1099", "type": 0, "question": "哪个命令可以使您验证从所有BGP邻居学习的IPv4 BGP路由?", "choices": [ "显示BGP路由表。", "显示 BGP IPv4 单播。", "显示BGP IPv4单播摘要。", "显示BGP IPv4单播邻居。" ], "answer": "B", "solution": "你可以使用命令 **show ip route bgp** 验证从所有 BGP 邻居学习到的 IPv4 BGP 路由。", "topic": [ "BGP故障排除" ] }, { "id": "Wired Network-1100", "type": 0, "question": "一个用户打电话给你,抱怨他无法访问公司内部网络服务器。你尝试使用相同的地址,但是收到了“主机未找到”的错误。几分钟后,另一个用户报告了同样的问题。你仍然可以发送电子邮件和传输文件到另一个服务器。问题最有可能的原因是什么?", "choices": [ "中心设备已拔掉电源。", "服务器没有将协议路由到您的工作站。", "用户的工作站未连接到网络。", "网络服务器已经宕机。" ], "answer": "D", "solution": "因为其他人也遇到了这个问题,很可能是与网络或服务器有关。因为你可以在另一个服务器上传输文件,所以不可能是网络的问题。因此,这个问题与Web服务器有关。", "topic": [ "网络故障排除方法论" ] }, { "id": "Wired Network-1101", "type": 0, "question": "在Cisco IOS路由器上,用什么命令在接口上启用SLAAC?", "choices": [ "IPv6地址自动配置", "IPv6地址动态主机配置协议(DHCP)。", "IPv6地址前缀 EUI-64。", "IPv6 ND RA抑制。" ], "answer": "A", "solution": "要启用SLAAC,您可以使用“ipv6地址自动配置”命令。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1102", "type": 0, "question": "您正在使用音调发生器和定位器测试双绞线电缆的运行情况。当您将音调发生器应用于电缆一端的特定引脚时,您在另一端的两个引脚上检测到一个音调。您发现了以下哪种故障?", "choices": [ "拆分对子", "打开", "短的", "相声" ], "answer": "C", "solution": "短路是指电缆一端的两个或多个引脚连接了一根电线,或者两根或多根电线的导体在电缆内部接触。这会导致在一端的单个引脚上施加的音调在另一端的多个引脚上被听到。其他三个选项不会导致这种情况发生。开路会表现为无法检测到电线上的音调,表明电缆内部存在断路或连接器中的引脚存在问题。分裂对是一种连接方式,其中两根电线在电缆的两端以完全相同的方式错误映射。串扰是一种干扰类型,由一根电线上的信号渗透到其他电线上引起。", "topic": [] }, { "id": "Wired Network-1103", "type": 0, "question": "以下哪种布线拓扑结构提供了网络中最多的冗余路径?", "choices": [ "星星", "戒指", "网格", "公共汽车" ], "answer": "C", "solution": "网状拓扑是指每个节点直接连接到其他每个节点,因此通过网络提供完全冗余。在星型拓扑中,每个节点都连接到一个中央枢纽,为每个节点提供到网络其余部分的单一路径。在环型拓扑中,每个节点连接到其他两个节点,提供两条可能的网络路径。在总线型拓扑中,节点被串联在一条线上,不提供冗余。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1104", "type": 0, "question": "在以太网半双工模式下,哪个陈述是正确的?", "choices": [ "发生不了碰撞。", "当发生碰撞时,两个站点会立即重新发送。", "当发生碰撞时,两个站点会等待一段随机时间后重新发送。", "为避免碰撞,站点在传输之前会等待一个随机时间。" ], "answer": "C", "solution": "CSMA/CD允许站点检测到冲突。当发生冲突时,每个站点会在重新传输之前等待一个随机时间,称为退避时间。", "topic": [ "网络协议和网络设备基础知识" ] }, { "id": "Wired Network-1105", "type": 0, "question": "由于安装人员在连接器之前剥离了每端近一英尺的电缆护套并解开了线对,Ed 发现在一些新安装的双绞线电缆上出现了问题。以下哪个问题更可能由于解开的电线而影响网络的使用?", "choices": [ "抖动", "衰减", "相声", "电磁干扰" ], "answer": "C", "solution": "串扰是一种干扰类型,当一个导体上传输的信号泄漏到附近的另一个导体上时,在基于铜的网络上会发生这种干扰。扭绞线缆在一个护套内压缩了八个或更多的导体,特别容易受到串扰的影响。扭转每个单独的导线对可以减少串扰的程度。解开扭绞的线对会使它们更容易受到串扰的影响。抖动、衰减和电磁干扰(EMI)都会影响有线网络的性能,但它们与未扭绞的线对没有直接关系。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1106", "type": 0, "question": "以太网头部中的前导码字段有什么作用?", "choices": [ "它被用作填充数据,以确保帧至少具有传输所需的最小字节数。", "它被用作填充数据,以确保帧具有1500字节以进行传输。", "它用于确保帧的传输没有数据损坏。", "它用于同步发送方和接收方之间的信号。" ], "answer": "D", "solution": "前导码字段由8个交替的1和0组成,用于同步发送方和接收方的信号。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1107", "type": 0, "question": "哪个命令可以用来验证路由器接口配置的IP地址?", "choices": [ "ipconfig", "show ip interface", "arp -a", "show ip arp" ], "answer": "B", "solution": "你可以使用“show ip interface”命令验证路由器接口配置的IP地址。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1108", "type": 0, "question": "以下哪个术语描述了交换机的功能是正确的?", "choices": [ "第二层路由器", "以太网集线器", "多端口桥接器", "第三层转发器" ], "answer": "C", "solution": "交换机最好被描述为一个多端口桥,因为它读取传入数据包的硬件地址,并将其通过目标节点的端口转发出去。虽然交换机在OSI模型的第2层(数据链路层)起作用,但它不是路由器,后者在第3层(网络层)连接网络。集线器和中继器是物理层(第1层)设备,不能执行交换机的功能。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1109", "type": 0, "question": "以下哪些是常用的远程访问 SSL VPN 实现?", "choices": [ "Tor浏览器", "反向代理技术", "端口转发技术和智能隧道。", "代理(客户端)例如AnyConnect安全移动客户端" ], "answer": "D", "solution": "像AnyConnect安全移动客户端这样的代理(客户端)被用于SSL VPN实现。", "topic": [ "虚拟专用网络(VPN)介绍" ] }, { "id": "Wired Network-1110", "type": 0, "question": "以下哪个是从AAA客户端发送到AAA服务器的TACACS+消息?", "choices": [ "START", "REPLY", "CHALLENGE", "REQUEST" ], "answer": "A", "solution": "TACACS+客户端只发送两种消息类型:START和CONTINUE。REPLY是从AAA服务器发送到AAA客户端的。", "topic": [ "AAA的基本原理" ] }, { "id": "Wired Network-1111", "type": 0, "question": "如果企业需要与所有MPLS客户VPN共享公司互联网服务,应该使用哪种MPLS L3VPN拓扑结构?", "choices": [ "全网状拓扑", "集线器和辐点式网络", "多级枢纽和辐射模式", "外联网和共享服务" ], "answer": "D", "solution": "外部网络和共享服务的MPLS L3VPN拓扑结构允许在MPLS环境中不同的VRF和VPN之间正确共享资源。在这种情况下,共享的资源是互联网服务。这是通过设置正确的路由目标导入和导出来实现的。", "topic": [ "网络虚拟化" ] }, { "id": "Wired Network-1112", "type": 0, "question": "你正在与客户——一家医生办公室合作,开发一个网络,使医生的工作人员可以在办公室的任何房间使用他们的平板电脑,而不必担心网络布线。你将为医生办公室建立什么类型的网络?", "choices": [ "局域网", "虚拟局域网", "无线局域网(WLAN)", "广域网" ], "answer": "C", "solution": "无线局域网(WLAN)将是这个办公室的最佳解决方案。 WLAN是在同一位置通过无线电波而不是电缆进行通信的设备组。 WLANS可以有多个无线接入点(WAP),最好重叠,以便用户不会遇到信号丢失。 Wi-Fi是WLAN的一种类型。 LAN是不正确的,因为它需要在每个房间中断开和重新连接电缆。使用安全协议建立虚拟局域网(VLAN)以隔离网络。WAN是不正确的,因为这是一个单一办公室的网络,而不是地理上分散的计算机。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1113", "type": 0, "question": "假设一个终端用户几分钟前尝试连接一个无线网络,但失败了。用户确定选择了正确的SSID进行连接。以下哪项操作应该执行以确定问题的根本原因?", "choices": [ "要求用户重新启动设备并继续尝试连接。", "要求用户移动到建筑物的另一个楼层,然后再尝试一次。", "禁用用户的 WLAN 和 SSID,然后重新启用它并要求她再次尝试。", "对用户的MAC地址进行放射性追踪并分析输出。" ], "answer": "B", "solution": "在线状态表示客户端已经通过WLC所需的每个阶段和策略,并成功加入了无线网络。", "topic": [ "无线连接故障排除" ] }, { "id": "Wired Network-1114", "type": 0, "question": "以下哪种虚拟专用网络(VPN)连接类型是将家庭用户连接到企业网络的最佳解决方案?", "choices": [ "主机到站点", "站点到站点", "主机到主机", "外联网" ], "answer": "A", "solution": "主机到站点的VPN是一种远程访问解决方案,使用户能够在家或旅行时访问公司网络。站点到站点VPN使一个网络连接到另一个网络,使两个网络上的用户都能访问另一个网络上的资源。这通常比广域网(WAN)链路更经济实惠,是分支机构连接的更好选择。主机到主机VPN使两个个人用户能够建立受保护的连接。外部VPN旨在为客户、供应商和其他外部合作伙伴提供连接到您的公司网络的能力,但访问权限受到限制。", "topic": [] }, { "id": "Wired Network-1115", "type": 0, "question": "系统的正确关闭被称为以下哪个?", "choices": [ "有状态的", "优美的", "无状态的", "快速的" ], "answer": "B", "solution": "现今许多企业级UPS系统都提供了在断电时关闭所连接的服务器的功能。一个正确的关闭被称为优雅关闭。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-1116", "type": 0, "question": "以下哪个协议是设计用于访问存储在信息目录中的信息,例如员工电话簿?", "choices": [ "FTP(文件传输协议)", "LDAP(轻型目录访问协议)", "远程桌面协议(RDP)", "CIFS(Common Internet File System)是一种用于在计算机网络上共享文件和打印机的协议。它是一种基于客户端/服务器模型的协议,通常用于在Windows操作系统之间共享文件和资源。" ], "answer": "B", "solution": "轻量级目录访问协议(LDAP)旨在访问存储在信息目录中的信息,通常称为LDAP目录或LDAP数据库。这通常包括员工数据和网络配置数据。FTP旨在传输文件。RDP是远程桌面协议,而CIFS用于共享文件和打印机。", "topic": [ "TCP/IP介绍" ] }, { "id": "Wired Network-1117", "type": 0, "question": "以下哪种网络交换机攻击类型可以通过洪水防护来预防?", "choices": [ "DNS污染", "战车驾驶", "MAC泛洪攻击", "邪恶的孪生。" ], "answer": "C", "solution": "通过向交换机发送包含许多不同虚假媒体访问控制(MAC)地址的数据包,攻击者可以导致交换机中的合法条目被设备老化并替换为虚假条目。当入站数据包的目的地在表中找不到时,交换机会在整个网络中广播它们,从而更容易被捕获和攻击。洪泛保护是一种机制,可以防止表中的确认MAC地址被替换。交换机中的洪泛保护无法防止域名系统(DNS)污染、战车驾驶或恶意双胞胎攻击。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1118", "type": 0, "question": "TPC算法用于以下哪个目的?", "choices": [ "调整传输控制协议速率", "检测传输范围覆盖中的问题", "调整发送主信道", "调整发射功率水平" ], "answer": "D", "solution": "传输功率控制(TPC)算法调整RF组中每个AP使用的功率水平。", "topic": [ "设计无线电管理" ] }, { "id": "Wired Network-1119", "type": 0, "question": "以下哪个IEEE标准要求使用CSMA/CA?Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)是一种媒体访问控制(MAC)机制,旨在防止两个使用相同网络介质的系统同时传输。", "choices": [ "802.3是以太网标准的编号。", "802.1X是一种网络认证协议。", "802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的数据传输速度和更好的网络性能。", "以上所有选项。" ], "answer": "C", "solution": "IEEE 802.11ac标准和802.11工作组中的所有无线局域网(WLAN)标准一样,使用CSMA / CA进行媒体访问控制。802.1X标准定义了一种身份验证机制,不需要媒体访问控制机制。IEEE 802.3(以太网)标准使用不同的媒体访问控制机制:带冲突检测的载波侦听多路访问(CSMA / CD)。", "topic": [] }, { "id": "Wired Network-1120", "type": 0, "question": "以下哪种IPv6设计方法用于迁移到IPv6,可以使网络在企业互联网边缘提供IPv6入站或出站访问?", "choices": [ "利用覆盖网络(如VXLAN)来支持数据中心内的IPv6主机。", "利用基于负载均衡器、纯DNS或经典NAT64的翻译机制。", "首先迁移企业网络的某些模块,同时利用翻译/隧道机制来维护IPv6和IPv4之间的通信。", "首先将核心迁移到双栈模式,然后随着时间允许逐步迁移其他模块。" ], "answer": "B", "solution": "为了在企业互联网边缘提供IPv6的入站或出站访问,需要一种基于负载均衡器、纯DNS或经典NAT64的翻译机制。", "topic": [ "网络服务和管理" ] }, { "id": "Wired Network-1121", "type": 0, "question": "真或假:在EIGRP路由器之间使用MD5身份验证时,只要密码相同,路由器上使用的密钥链序列号可以不同。 \n\n答案:真。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误,密钥链序列号是使用密码构建的哈希的一个组成部分。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-1122", "type": 0, "question": "在部署CPU ACL时,应该考虑哪个因素?", "choices": [ "在大多数情况下,ACL的最终策略规则应该是明确的“拒绝所有”。", "ACL的最终策略规则在大多数情况下应该是明确的“允许任何”。", "CPU访问控制列表必须允许来自控制器本身的控制平面功能,例如控制器间、RRM和DHCP通信。", "CPU访问控制列表(ACL)也应启用控制平面 policing。" ], "answer": "B", "solution": "由于CPU ACL将限制所有与CPU(管理控制平面)之间的通信,建议的方法是明确拒绝您希望限制的某些流量类型,但允许所有其他流量。", "topic": [ "设备加固" ] }, { "id": "Wired Network-1123", "type": 0, "question": "以下哪个组件通常不会在无线局域网(WLAN)中找到?", "choices": [ "无线局域网路由器", "无线局域网网关", "无线局域网服务器", "无线局域网客户端" ], "answer": "C", "solution": "无线局域网(WLAN)通常有三种类型的节点:客户端、路由器和网关。它们通常不包括服务器,而且往往是流动性的,设备根据需要进出。它们可能包括打印机。 WLAN可用于将无线用户连接到有线网络。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1124", "type": 0, "question": "以下哪一项关于避雷器不正确?", "choices": [ "它被连接在发射机和天线之间。", "它可以防止大的瞬态能量峰值。", "它可以保护天线免受雷击。", "它将能量引导到地面,而不是发射设备。", "每个户外天线都需要一个。" ], "answer": "C", "solution": "避雷器无法保护天线免受直接雷击的影响。", "topic": [ "理解天线" ] }, { "id": "Wired Network-1125", "type": 0, "question": "EIGRP的默认种子度量是什么?", "choices": [ "20", "100", "32,768", "infinity" ], "answer": "D", "solution": "EIGRP的默认种子度量值为无穷大。", "topic": [ "路由重分发" ] }, { "id": "Wired Network-1126", "type": 0, "question": "真或假:SD-WAN只能在互联网或MPLS网络上运行。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "SD-WAN是传输无关的,可以使用任何类型的基于IP的底层传输网络,例如互联网、卫星、专用电路、3G/4G LTE和MPLS。", "topic": [ "Fabric Technologies(面料技术)" ] }, { "id": "Wired Network-1127", "type": 0, "question": "以下哪个选项使用HTTP操作在包含YANG数据的NETCONF数据存储上提供创建、检索、更新和删除(CRUD)操作?", "choices": [ "XML(可扩展标记语言)", "JSON(JavaScript Object Notation)", "网络配置协议(NETCONF)", "RESTCONF(Representational State Transfer Configuration Protocol)" ], "answer": "D", "solution": "RESTCONF使用HTTP操作在NETCONF数据存储上提供创建、检索、更新和删除(CRUD)操作。", "topic": [ "自动化" ] }, { "id": "Wired Network-1128", "type": 0, "question": "您已经升级了交换机和接入点的固件。您需要更新哪些文档?", "choices": [ "基线和配置文档", "物理网络图", "逻辑网络图。", "接线图。" ], "answer": "B", "solution": "物理网络图包含网络中所有物理设备和连接路径,并应准确地呈现网络的物理详细连接方式。此文档还将包含网络中所有交换机和接入点的固件版本。", "topic": [ "数据中心架构和云概念" ] }, { "id": "Wired Network-1129", "type": 0, "question": "你预计干墙板(或石膏板墙)会有多少衰减水平?", "choices": [ "大约1到2分贝。", "大约3到4分贝。", "大约6到8分贝。", "大约10到12分贝。" ], "answer": "B", "solution": "衰减取决于墙体结构,但3 dB是一个普遍接受的值。", "topic": [ "进行离线场地调查" ] }, { "id": "Wired Network-1130", "type": 0, "question": "哪个描述符合虚拟路由器冗余协议(VRRP)对象跟踪?", "choices": [ "它监控交通流量和链路利用率。", "它确保最佳的VRRP路由器成为该组的虚拟路由器主机。", "它会使得流量动态地转移到更高带宽的链路。", "它可以防止中间人攻击。" ], "answer": "B", "solution": "VRRP对象跟踪提供了一种方式,通过改变VRRP优先级来跟踪对象的状态(如接口或IP路由状态),以确保最佳的VRRP路由器成为组的虚拟路由器主机。", "topic": [ "在数据中心实现路由" ] }, { "id": "Wired Network-1131", "type": 0, "question": "当存在四个“9”的容错能力时,以下哪个代表了提供的正常运行时间百分比?", "choices": [ "999百分之一。", "99.99百分比", "99.999百分之一。", "90.9%(百分之九十点九)" ], "answer": "B", "solution": "四个九表示99.99%的时间。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-1132", "type": 0, "question": "哪种网络设计用例侧重于当公司或企业被分成两个或更多实体时?", "choices": [ "扩展性", "剥离(选项中可能是某个公司或组织剥离某些资产或业务的意思)", "设计失败", "合并" ], "answer": "B", "solution": "解释:Divest是指作为网络设计师将业务或公司及其相应的架构拆分为两个或更多个独立的功能架构。Scaling是网络设计用例,重点关注所涉及技术或整体架构的可扩展性。这可能只是一个单一的平面区域0 OSPF设计,它不再符合业务要求,这种情况下,您可以利用多个区域、多个区域类型和LSA过滤技术来增加可扩展性。在设计故障用例中,存在问题,您必须解决它。例如,未对跨越树协议(STP)和第一跳冗余协议(FHRP)的关键角色进行对齐。如果您的STP根桥和FHRP默认网关未对齐到正确的设备,则会出现次优路由问题,最终导致设计故障。合并是指将两个或更多不同的网络集成到一起,包括它们自己的网络设计理念,创建一个单一的端到端架构。", "topic": [ "网络设计" ] }, { "id": "Wired Network-1133", "type": 0, "question": "以下哪个陈述不是真的?", "choices": [ "为了发现某些子网中的应用程序、主机或用户,您可以信任来自该子网的流量以加快发现过程。", "安全防火墙使用自适应配置选项来执行应用程序控制。", "自适应配置文件选项应始终启用以确保卓越的检测。", "可信连接不受深度检查或发现的限制。" ], "answer": "A", "solution": "如果你想要发现某些子网或端口,不要使用访问控制规则或预过滤规则来信任来自这些子网或端口的连接,因为信任的连接不受深度检查或发现的限制;因此,在发现过程中它们不包含详细信息。", "topic": [ "网络发现策略" ] }, { "id": "Wired Network-1134", "type": 0, "question": "一个用户无法访问网络,并收到一个错误消息,指出系统上存在重复的IP地址。你感到困惑,因为你有一个DHCP服务器。接下来你需要做什么?", "choices": [ "手动配置IP地址。", "确保此计算机设置为自动获取IP地址。", "从另一台计算机ping该IP地址,以查找重复计算机的名称。", "在命令提示符处输入 `ipconfig /release`,然后输入 `ipconfig /renew`。" ], "answer": "B", "solution": "网络上的每个设备都必须拥有一个唯一的IP地址。许多网络使用DHCP服务器分配IP地址,因为手动跟踪它们会创建大量的工作。如果有两个相同的IP地址尝试使用DHCP访问网络,则至少其中一个已手动配置其IP地址。确保此计算机设置为自动获取IP地址应该是您的第一步。如果不是,则您已找到问题所在。如果是,则可以使用“ping -a _ipaddress_”命令,将重复的IP地址替换为变量“_ipaddress_”中的IP地址。这将返回另一台计算机的主机名。每个网络管理员都应该有一个计算机名称和位置的列表。然后,您可以确保另一台计算机也设置为自动获取IP地址。手动配置IP地址是导致问题的原因。在这种情况下,“ipconfig /release”和“ipconfig /renew”命令将无法帮助。", "topic": [ "软件故障排除" ] }, { "id": "Wired Network-1135", "type": 0, "question": "什么类型的网络设备有助于减小冲突域的大小?", "choices": [ "集线器", "交换机", "负载均衡器", "路由器" ], "answer": "B", "solution": "交换机使用MAC地址表来限制仅两个通信设备之间的第二层通信。", "topic": [ "数据包转发" ] }, { "id": "Wired Network-1136", "type": 0, "question": "以下哪些需要直接与节点ID相关联?", "choices": [ "接口配置文件", "AAEPs", "切换个人资料", "接口策略" ], "answer": "C", "solution": "交换机配置文件是一个逻辑对象,从配置的角度表示一个或多个物理交换机,并直接指向节点ID。使用交换机配置文件为ACI中的无状态网络提供了部分基础。", "topic": [ "访问策略" ] }, { "id": "Wired Network-1137", "type": 0, "question": "以下哪个陈述关于主动扫描是正确的?", "choices": [ "客户端通过一系列频道主动调谐其无线电,并等待接收来自AP的802.11信标帧。", "客户端通过一系列频道主动调谐其无线电,并发送802.11探针请求帧,然后等待接入点的回复。", "客户端通过一系列频道调谐其无线电,并发送802.11动作帧以发现回应的接入点。", "一个AP会主动地通过一系列的信道来调谐它的无线电,以发现发送802.11信标帧的任何客户端。" ], "answer": "B", "solution": "客户端使用主动扫描来主动发现任何相邻的接入点。客户端将其无线电调整到各个信道并发送802.11探针请求,然后等待一段时间以查看是否从活动的接入点接收到任何探针响应帧。", "topic": [ "为客户的移动性设计" ] }, { "id": "Wired Network-1138", "type": 0, "question": "以下哪个工具不仅在Unix或Linux系统上运行?", "choices": [ "`tcpdump`", "`dig`", "`iptables`", "`ifconfig`", "`route`" ], "answer": "E", "solution": "在列出的实用工具中,`tcpdump`、`dig`、`iptables`和`ifconfig`都是仅在Unix或Linux系统上运行的工具。`route`实用程序可以在Unix或Linux和Windows上运行。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1139", "type": 0, "question": "哪些属性比其他属性更具优先权?", "choices": [ "动态访问策略(DAP)属性", "用户属性", "组策略属性", "连接配置文件默认组策略属性" ], "answer": "A", "solution": "通过动态访问策略(DAP)应用的属性始终会覆盖来自任何其他来源的属性,包括用户属性、组策略属性和连接配置文件默认组策略属性。", "topic": [ "ASA上的无客户端远程访问SSL VPN" ] }, { "id": "Wired Network-1140", "type": 0, "question": "哪种流量调节工具可以用来丢弃或标记超出所需流量速率的流量?", "choices": [ "Policers", "Shapers", "WRR", "以上选项均不正确。" ], "answer": "A", "solution": "Policers会丢弃或重新标记超出所需流量速率的进出流量。", "topic": [ "服务质量(QoS)" ] }, { "id": "Wired Network-1141", "type": 0, "question": "在朋友家中设置一个无线局域网,使用符合IEEE 802.11g标准的设备。您已经在一个开放的网络上安装并成功测试了这些设备,现在您准备添加安全性。以下哪种协议应该选择以为无线网络提供最大的安全性?", "choices": [ "WEP(Wired Equivalent Privacy)是一种无线网络安全协议,用于保护无线网络的数据传输安全。", "WPA2(Wi-Fi Protected Access II)", "IPsec(Internet Protocol Security)", "传输层安全协议(Transport Layer Security)", "L2TP(Layer 2 Tunneling Protocol)是一种用于虚拟专用网络(VPN)的协议,它可以通过公共网络(如互联网)安全地传输数据。" ], "answer": "B", "solution": "WiFi Protected Access 2(WPA2)将为无线网络提供最大的安全性,部分原因是它使用经常更改的长加密密钥。Wired Equivalent Privacy(WEP)存在许多漏洞,包括短的、不变的加密密钥,使其比WPA不够安全。IPsec是一个网络层安全标准,不提供IEEE 802.11无线网络所需的安全性。传输层安全性(TLS)是一种在应用层加密Web服务器和客户端交换的数据的协议。它不为无线局域网提供足够的安全性。第2层隧道协议(L2TP)是一种虚拟私人网络协议;它不为无线网络提供足够的安全性。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1142", "type": 0, "question": "存在感出现在哪个协作架构层?", "choices": [ "沟通和协作", "协作服务", "基础设施", "媒体服务" ], "answer": "B", "solution": "存在于协作服务下。", "topic": [ "网络设计方法论" ] }, { "id": "Wired Network-1143", "type": 0, "question": "以下哪个用于唯一标识AP及其与其关联的无线客户端维护的基本服务集?", "choices": [ "SSID", "BSSID", "Ethernet MAC address", "Radio MAC address" ], "answer": "B", "solution": "BSS或小区中心的AP使用基本服务集标识符(BSSID)来标识自身(和BSS)。它还使用SSID来标识无线网络,但这不是AP或BSS的唯一标识。最后,无线电MAC地址用作BSSID值的基础,但该值可以被更改以形成AP支持的每个SSID的BSSID。", "topic": [ "无线网络基础" ] }, { "id": "Wired Network-1144", "type": 0, "question": "您的网络目前运行着802.11b和802.11g设备的混合。年底时,您有额外的预算来升级部分无线基础设施,但不是全部。您想要升级到最新的技术,但仍然保持向后兼容性。您应该选择哪个标准?", "choices": [ "802.11g是一种无线网络标准,它支持2.4GHz频段,最高传输速率为54Mbps。", "802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的数据传输速度和更好的网络性能。", "802.11ax是一种Wi-Fi网络标准,也被称为Wi-Fi 6。它是一种高效的无线网络技术,可以提供更快的速度、更好的性能和更可靠的连接。", "802.11r是一种无线局域网(WLAN)标准,也称为快速BSS转换(FT)或快速漫游。它允许移动设备在不同的接入点之间进行快速、无缝的漫游,提高了无线网络的可靠性和性能。" ], "answer": "C", "solution": "802.11b/g和802.11n都在2.4 GHz频率下传输,因此它们是兼容的。较新的802.11ac是一个5 GHz标准,因此与802.11b/g不兼容。802.11ax在2.4 GHz和5 GHz频率下传输,最高可达7 GHz。802.11r不是与Wi-Fi速度相关的标准,也不在A+考试目标中。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1145", "type": 0, "question": "以下哪个术语是指访问存储区域网络上的 iSCSI 设备的客户端?", "choices": [ "发起人", "目标", "控制器", "适配器" ], "answer": "A", "solution": "iSCSI实现的客户端称为“initiator”。连接到initiator的存储设备称为“target”。“Controller”和“adapter”不是用于iSCSI客户端或服务器的术语。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1146", "type": 0, "question": "IPv4 ACL的正确操作顺序是什么?", "choices": [ "自上而下的处理,执行最长匹配,隐式拒绝所有。", "执行最长匹配,自上而下处理,隐式拒绝所有。", "隐式拒绝所有,一旦匹配立即执行,自上而下的处理。", "自上而下的处理,匹配后立即执行,隐式拒绝所有。" ], "answer": "D", "solution": "IPv4 ACL的正确操作顺序是自上而下的处理,匹配后立即执行,隐式拒绝所有。", "topic": [ "故障排除ACL和前缀列表。" ] }, { "id": "Wired Network-1147", "type": 0, "question": "在Windows服务器上,以下哪个事件日志可以记录有关成功和失败访问尝试的信息?", "choices": [ "系统", "应用程序", "安全性", "设置" ], "answer": "C", "solution": "当您在Windows系统上启用审计策略时,可以指定是否审计成功或失败的事件(或两者都包括),包括访问尝试。此审计信息记录在安全事件日志中。系统、应用程序和设置事件日志通常不记录成功和失败的访问尝试。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1148", "type": 0, "question": "你的网络用户之一有一台不支持蓝牙的旧笔记本电脑。他们最近收到了一个需要与笔记本电脑配对使用的蓝牙耳机。使耳机与用户的笔记本电脑兼容的最快最便宜的方法是什么?", "choices": [ "购买一个支持Wi-Fi的耳机。", "购买一个USB蓝牙适配器。", "购买一个Mini PCIe蓝牙适配器。", "更换笔记本电脑。" ], "answer": "B", "solution": "一个USB蓝牙适配器应该可以解决问题。虽然有Mini PCIe蓝牙适配器,但安装比插入USB设备要棘手。市场上实际上没有任何与Wi-Fi兼容的耳机——耳机正是蓝牙设计的目的。更换笔记本电脑是一个更昂贵的选择。", "topic": [ "笔记本电脑和移动设备硬件" ] }, { "id": "Wired Network-1149", "type": 0, "question": "使用DNA Center的直接REST API需要哪种类型的标头?", "choices": [ "一个包含基本认证字符串的授权头。", "一个带有基本认证字符串的身份验证头。", "一个携带令牌的身份验证头部。", "一个OAuth令牌授权头。" ], "answer": "A", "solution": "DNA Center REST API需要一个带有基本访问认证的授权头。答案B是不正确的,因为授权头用于DNA Center REST API访问的基本认证。答案C是不正确的,因为DNA Center不使用Bearer令牌认证;它使用HTTP认证。答案D是不正确的,因为DNA Center不使用OAuth令牌认证;它使用HTTP认证。", "topic": [ "思科平台" ] }, { "id": "Wired Network-1150", "type": 0, "question": "比较两种选项,哪个回答最准确,解释为什么一种方法比另一种方法更好?\n\n一种方法是使用**service password-encryption**全局命令将密码加密,而另一种方法是存储密码的计算哈希值而不是存储密码本身。其中更好的方法是使用加密方法,因为它提供了更高的安全性,可以保护密码不被未经授权的人员访问。而存储哈希值的方法虽然可以提供一定的安全性,但如果哈希算法被破解,密码仍然可能被攻击者获取。", "choices": [ "使用哈希是首选,因为加密的IOS密码可以很容易地被解密。", "使用哈希是首选,因为加密需要大量的CPU计算。", "使用加密更好,因为它提供了更强的密码保护。", "使用加密更可取,因为哈希需要大量的 CPU 计算。" ], "answer": "A", "solution": "“service password-encryption”命令可以加密路由器或交换机上本应以明文显示的密码。虽然这在概念上是个好主意,但是该算法可以很容易地被互联网上的网站破解。思科早就提供了替代命令,用哈希值存储密码,而不是明文密码,例如“enable secret”和“username secret”命令。这些命令更受欢迎,部分原因是它们避免了明文密码和易于解密密码的问题。", "topic": [ "保护网络设备" ] }, { "id": "Wired Network-1151", "type": 0, "question": "MGID的正确功能是什么?", "choices": [ "它识别参与多播传递的接入点。", "它是分配给每个多播源的标识符。", "这是分配给WLC上每个组播接口的标识符。", "它识别每个组播组地址和已注册的接收者。" ], "answer": "D", "solution": "MGID是一个唯一的标识符或索引,用于多播组和已注册接收组流量的无线客户端接收者的表格。", "topic": [ "实现多播" ] }, { "id": "Wired Network-1152", "type": 0, "question": "你的ISP刚刚在你的社区铺设了光纤电缆,你想从有线网络切换到更快的光纤连接。以下哪个陈述关于你如何获取互联网连接是正确的?", "choices": [ "你将继续使用你的有线调制解调器。", "你需要切换到使用DSL调制解调器。", "你需要切换到使用ONT。", "你需要转换为使用PoE。" ], "answer": "C", "solution": "光纤网络连接使用光网络终端(ONT)来终止光纤,并将其转换为您家中铜缆线上的数字连接。电缆调制解调器和DSL调制解调器将铜线连接到铜线。在这种情况下,以太网供电(PoE)不相关。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1153", "type": 0, "question": "Cisco Expressway上的单个链接最多可以应用多少个管道?", "choices": [ "无限制", "一根管道", "两个管道", "十个管道" ], "answer": "C", "solution": "每个链接可能有最多两个与之相关联的管道。", "topic": [ "带宽管理" ] }, { "id": "Wired Network-1154", "type": 0, "question": "SD-Access使用VXLAN数据封装而不是LISP数据封装的主要原因是什么?", "choices": [ "VXLAN支持IPv6。", "VXLAN支持第二层网络。", "VXLAN的头部要小得多。", "VXLAN听起来更好。" ], "answer": "B", "solution": "尽管LISP是SD-Access网络的控制平面,但它并不使用LISP数据封装作为数据平面;相反,它使用VXLAN封装,因为它能够封装原始的以太网头,这使得SD-Access能够支持第2层和第3层的覆盖网络。", "topic": [ "Fabric Technologies(面料技术)" ] }, { "id": "Wired Network-1155", "type": 0, "question": "以下哪个是UPS在任何时刻可以提供的最大功率?", "choices": [ "最大负载", "伏特安培。", "通用产品代码 (UPC)", "容量" ], "answer": "D", "solution": "容量是UPS在任何时刻可以提供的最大功率。因此,如果它的容量为650伏安(VA),而您试图从UPS提取800 VA,它可能会自动关闭。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-1156", "type": 0, "question": "用于查看BGP邻居及其hello间隔的命令是什么?", "choices": [ "显示BGP邻居。", "显示BGP _AFI SAFI_邻居。", "显示 BGP _AFI SAFI_ 概要。", "显示_afi_ BGP接口简要信息。" ], "answer": "B", "solution": "命令 **show bgp** _afi safi_ **neighbors** 显示所有邻居的能力、会话计时器和其他有用的故障排除信息。", "topic": [ "BGP(Border Gateway Protocol):边界网关协议,是一种用于在互联网中交换路由信息的协议。" ] }, { "id": "Wired Network-1157", "type": 0, "question": "你会使用什么工具来找到光纤连接中的断点并测试网络上的光纤连通性?", "choices": [ "万用表", "光时域反射仪(OTDR)", "线路测试仪", "音频探针" ], "answer": "B", "solution": "光时域反射仪(OTDR)是一种光电仪器,用于提供关于光纤的详细信息。它通过向要测试的特定光纤发出一系列光脉冲来工作,并可以告诉您光纤是否发生断裂以及断裂发生的位置。", "topic": [ "电缆连接问题和工具" ] }, { "id": "Wired Network-1158", "type": 0, "question": "哪种数据类型不是YANG基本数据类型?", "choices": [ "二进制", "枚举", "百分之", "空的" ], "answer": "C", "solution": "YANG定义了一组内置类型,并通过机制定义了额外类型。其中包括二进制、枚举和空等20多种基本类型。百分比不是内置数据类型。", "topic": [ "模型驱动的可编程性" ] }, { "id": "Wired Network-1159", "type": 0, "question": "在将外部OSPF路由重新分发到BGP中,需要哪个额外的命令?", "choices": [ "ospf-external-prefixes redistributable", "match external", "bgp redistribute-internal", "none" ], "answer": "B", "solution": "使用基本的重分发命令无法将外部OSPF路由重新分发到BGP中;还必须使用命令“match external”。", "topic": [ "路由重分发" ] }, { "id": "Wired Network-1160", "type": 0, "question": "SNMP通过处理从安装或嵌入在网络设备中的代理收集的信息,并在中央控制台上显示信息来工作。以下哪个术语用于描述SNMP代理存储有关其属性信息的数据库?答案是MIB(Management Information Base)。", "choices": [ "MIB", "Trap", "Syslog", "SIEM" ], "answer": "A", "solution": "管理信息库(MIB)是SNMP代理中存储有关受管理设备属性的ASN.1信息的数据库。其他三个选项不执行此功能。陷阱是SNMP代理在发生异常事件时向网络管理控制台发送的警报消息。Syslog是消息日志记录组件的标准。安全信息和事件管理(SIEM)是一种组合工具,它使用从日志和网络设备收集的信息,提供对网络安全状况的实时分析。", "topic": [] }, { "id": "Wired Network-1161", "type": 0, "question": "你目前正在解决网络问题。哪种类型的图表可以让你从高层次的概述中查看信息流?(选择最佳答案。)", "choices": [ "逻辑图。", "物理图示", "符号图表", "知识库文章" ], "answer": "A", "solution": "逻辑图是系统的高层概述,以便您可以看到信息的流动。物理图显示具体细节,虽然它可以用于跟踪信息的流动,但不用作高层概述。符号图不是一种图表类型。知识库文章详细介绍了症状的解决方案,不用于查看信息的流动。", "topic": [ "文档和专业精神" ] }, { "id": "Wired Network-1162", "type": 0, "question": "当Megan在工作时,她的笔记本电脑运行得非常好,但是当她带着它上路时,它无法连接到互联网。在公司内部,所有计算机都使用静态IP地址。你应该怎么做来解决这个问题?", "choices": [ "告诉梅根去购买无线蜂窝卡和服务。", "告诉梅根使用DHCP。", "告诉梅根配置TCP/IP属性的备用配置选项卡。", "在用户的TCP/IP属性的备用配置选项卡中配置静态IP地址,并在常规选项卡中启用DHCP。" ], "answer": "D", "solution": "问题在于Megan需要在外出时通过DHCP获取IP地址。但是将网络适配器设置为自动获取IP地址是不够的。为了连接到内部公司网络,必须将备用配置选项卡配置为用户配置的静态IP地址。这个解决方案使Megan能够通过自动获取IP地址连接到网络,并允许她使用静态IP地址连接到内部公司网络。", "topic": [] }, { "id": "Wired Network-1163", "type": 0, "question": "真或假:NHRP是为DMVPN开发的Cisco专有协议。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "NHRP是在RFC 2332标准中定义的,用于将IP地址映射到Frame Relay和ATM地址。", "topic": [ "DMVPN隧道" ] }, { "id": "Wired Network-1164", "type": 0, "question": "网络访问工作中心列出的网络设备和设备管理工作中心列出的网络设备有什么区别?", "choices": [ "设备管理的网络资源必须使用TACACS+,而该配置仅可通过设备管理工作中心进行。", "设备管理没有网络资源;只有网络访问的网络资源。", "完全没有。它们是相同的设备,这两个工作中心显示相同的页面。", "设备管理的网络资源必须使用RADIUS,并且该配置仅在“设备管理”工作中心中可用。" ], "answer": "C", "solution": "每个ISE用户界面中的工作中心都提供了一个共同的地方,用于执行与该工作中心相关的所有活动。网络资源是与ISE交互的路由器、交换机和其他设备,对于网络访问和设备管理工作中心来说,它们是相同的设备。", "topic": [ "使用ISE进行设备管理AAA。" ] }, { "id": "Wired Network-1165", "type": 0, "question": "在ASA上,当在AnyConnect配置文件编辑器中为IKEv2 VPN配置服务器列表时,以下哪项不需要配置?", "choices": [ "完全限定域名(FQDN)或IP地址。", "IKE身份验证", "用户组", "主要协议" ], "answer": "B", "solution": "在AnyConnect配置文件编辑器中配置服务器列表时,只有IKE身份验证是可选的。 FQDN或IP地址,用户组和主要协议都是必需的。", "topic": [ "ASA和IOS上的AnyConnect VPNs" ] }, { "id": "Wired Network-1166", "type": 0, "question": "真或假:EIGRP汇总发生在网络前缀跨越所有网络接口时。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。前缀的汇总是在配置了汇总的接口上广告流量时发生的。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-1167", "type": 0, "question": "iOS设备的常见任务类型是什么?", "choices": [ "Shell(外壳)", "无线局域网控制器(Wireless LAN Controller)", "Nexus(谷歌Nexus)", "通用的" ], "answer": "A", "solution": "解释:在配置TACACS+配置文件时,IOS设备使用shell common任务类型。", "topic": [ "使用Cisco IOS配置设备管理AAA" ] }, { "id": "Wired Network-1168", "type": 0, "question": "原始的802.1D规范将什么端口成本值分配给1 Gbps接口?", "choices": [ "1", "2", "4", "19" ], "answer": "C", "solution": "原始的802.1D规范将1 Gbps接口的值设置为4。", "topic": [ "生成树协议" ] }, { "id": "Wired Network-1169", "type": 0, "question": "什么类型的网络覆盖大面积地理区域,通常支持数千个用户,经常使用其他实体拥有的线路?", "choices": [ "局域网", "广域网", "平移自适应网络(PAN)", "男人" ], "answer": "B", "solution": "广域网(WAN)覆盖大范围地理区域,通常支持数千个用户。WAN可以是单个公司的不同位置,也可以连接几个不同的公司以共享信息。WAN线路通常是从WAN提供商租用的。互联网被认为是一个非常大的WAN。局域网(LAN)覆盖相对较小的区域,如家庭或企业。个人区域网络(PAN)通常由一个人使用,由他们的计算机及其蓝牙设备组成。都市区域网络(MAN)类似于WAN,但覆盖的区域要小得多,如大学或城市。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1170", "type": 0, "question": "以下哪个是指某个设备的标准性能水平或整个网络的正常运行能力?", "choices": [ "基准线", "目标", "正常的", "利用率" ], "answer": "A", "solution": "在网络中,基线可以指特定设备的标准性能水平,也可以指整个网络的正常运行能力。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-1171", "type": 0, "question": "正确或错误:ACI默认情况下保留数据包中的dot1q CoS位。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "默认情况下,ACI仅尝试保留DSCP设置。", "topic": [ "实施访问策略" ] }, { "id": "Wired Network-1172", "type": 0, "question": "哪种类型的网络通常局限于小范围,例如单个房间、楼层或建筑物?", "choices": [ "广域网", "局域网", "男人", "可以,能够,能。" ], "answer": "B", "solution": "本地区域网络(LAN)顾名思义,是指包含在小范围地理区域内的一组计算机。广域网(WAN)连接地理距离较远的LAN。都会区域网络(MAN)不局限于小范围,通常比LAN大但比WAN小。校园区域网络(CAN)通常包括相邻建筑物的一组,例如公司或大学的建筑物。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1173", "type": 0, "question": "以下哪些是IPv6相对于IPv4的增强功能?", "choices": [ "更大的地址空间,全局私有IP地址,多播。", "更大的地址空间,全球唯一的IP地址,无广播。", "更大的地址空间,全局私有IP地址,多播。", "更大的地址空间、地址自动配置、增强的广播。" ], "answer": "B", "solution": "IPv6增加了地址空间,允许使用全球唯一的IP地址。广播不再使用。", "topic": [ "Internet协议第六版(IPv6)设计" ] }, { "id": "Wired Network-1174", "type": 0, "question": "以下哪个 **access-list** 命令匹配来自子网 172.16.4.0/23 中主机发送的所有数据包?", "choices": [ "访问列表1允许172.16.0.5 0.0.255.0。", "允许访问列表1中的172.16.4.0/23网络。", "允许访问列表1中的172.16.5.0。", "访问控制列表 1 允许 172.16.5.0 到 172.16.5.127 的地址。" ], "answer": "B", "solution": "一个错误的答案,使用通配符掩码0.0.255.0,匹配所有以172.16开头,最后一位是5的数据包。一个错误的答案只匹配特定的IP地址172.16.5.0。一个错误的答案使用了只有一个通配符位(二进制)的通配符掩码0.0.0.128,恰好匹配地址172.16.5.0和172.16.5.128。正确的答案匹配地址范围为172.16.4.0-172.16.5.255。", "topic": [ "基本IPv4访问控制列表" ] }, { "id": "Wired Network-1175", "type": 0, "question": "172.16.0.0/19的网络地址提供了多少个子网和主机?", "choices": [ "7个子网,每个子网有30个主机。", "7个子网,每个子网有2,046个主机。", "7个子网,每个子网有8,190个主机。", "每个子网有30个主机,共有8个子网。", "8个子网,每个子网有2,046个主机。", "8个子网,每个子网有8,190个主机。" ], "answer": "F", "solution": "CIDR地址为/19的IP地址是255.255.224.0。这是一个B类地址,因此只有3个子网位,但它提供了13个主机位,或者8个子网,每个子网有8,190个主机。", "topic": [ "IP子网划分,IP故障排除和NAT介绍" ] }, { "id": "Wired Network-1176", "type": 0, "question": "在分层网络模型中,安全过滤、地址聚合和媒体转换发生在哪一层?", "choices": [ "网络层", "核心层", "分发层", "接入层" ], "answer": "C", "solution": "分层模型的分发层负责安全过滤、地址和区域聚合以及媒体转换。", "topic": [ "网络设计模型" ] }, { "id": "Wired Network-1177", "type": 0, "question": "假设您需要将轻量级AP连接到网络,以下哪种链接类型是必要的?", "choices": [ "访问模式链接", "干道模式链路", "LAG模式链接", "EtherChannel 链路" ], "answer": "A", "solution": "一个轻量级的接入点只需要连接到一个VLAN,因此使用访问模式。", "topic": [ "构建无线局域网" ] }, { "id": "Wired Network-1178", "type": 0, "question": "你的初级助理想要开始在办公楼中测量一个小隔间的空间。助理应该在哪里放置第一个AP来开始AP-on-a-stick测量?", "choices": [ "在建筑楼的拐角处", "在地板的几何中心", "一个小隔间区块的中心", "在两个小隔间区块之间的走廊上方" ], "answer": "A", "solution": "从一个强大的障碍开始通常是最容易的方法。任何其他的起点都会导致更多的尝试和错误,才能找到正确的位置和重叠。", "topic": [ "进行现场勘测" ] }, { "id": "Wired Network-1179", "type": 0, "question": "以下哪个不是可以识别主机上应用程序的工具?", "choices": [ "网络代理", "应用层防火墙", "使用NBAR", "使用NetFlow" ], "answer": "D", "solution": "NetFlow没有应用层数据。", "topic": [ "网络和主机分析" ] }, { "id": "Wired Network-1180", "type": 0, "question": "在以下哪种云模型中,单个组织可以同时作为所有云服务的提供者和消费者?", "choices": [ "公共云", "私有云", "混合云", "临时云" ], "answer": "B", "solution": "在私有云中,使用云服务的组织可以是提供这些服务的基础设施的唯一所有者。私有云也可以由第三方全部或部分拥有。在公共云模型中,一个组织作为提供者,另一个组织使用提供者的服务。混合云是公共和私有基础设施的组合,以便使用者组织只是基础设施的部分所有者。没有临时云模型这样的东西。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1181", "type": 0, "question": "如果网络设计需要最具可扩展性的设计(包括纵向和横向扩展),以下哪种接入-分发连接模型是最佳的?", "choices": [ "基于多层次的STP", "交换机集群化", "路由访问", "第二层接入" ], "answer": "C", "solution": "说明:路由接入连接模型支持扩展和横向扩展。", "topic": [ "可扩展的企业校园架构设计" ] }, { "id": "Wired Network-1182", "type": 0, "question": "在思科无线局域网控制器上,802.11n和802.11ac支持的默认状态以及默认信道宽度是哪一个?", "choices": [ "禁用;20兆赫信道", "启用;20兆赫信道", "启用;40兆赫信道", "禁用;40 MHz信道", "启用;80兆赫信道" ], "answer": "B", "solution": "802.11n和802.11ac支持默认启用。只有在启用40 MHz或更宽的信道之前,才会使用20 MHz信道。", "topic": [ "理解无线资源管理(RRM)" ] }, { "id": "Wired Network-1183", "type": 0, "question": "以下哪个是中央网络控制器的例子?", "choices": [ "纳吉欧斯", "Grafana(格拉法纳)", "思科DNA中心", "普罗米修斯" ], "answer": "C", "solution": "我们在第8章中看到了一个使用Cisco DNA Center的网络控制器的示例。Cisco DNA Center可以用于完全配置、管理和监控网络。", "topic": [ "基础设施自动化" ] }, { "id": "Wired Network-1184", "type": 0, "question": "在更传统的OSPFv2配置中,工程师使用OSPF配置模式中的“network”命令,现在改为使用OSPFv2接口配置。以下哪个命令配置了在这种新配置中分配给接口的区域号?", "choices": [ "接口配置模式下的区域命令", "接口配置模式下的ip ospf命令", "接口配置模式下的“router ospf”命令", "接口配置模式下的网络命令" ], "answer": "B", "solution": "使用OSPFv2接口配置模式时,配置看起来与传统配置非常相似,只有几个例外。不再需要使用“network”路由器子命令。相反,应该使用“ip ospf” _process-id_ **area** _area-id interface_子命令来配置应启用OSPF的每个接口。该命令指定应在接口上启用的OSPF路由进程,并指定OSPFv2区域。", "topic": [ "实现OSPF" ] }, { "id": "Wired Network-1185", "type": 0, "question": "在输入命令“router ospf 1”后,以下哪个**网络**命令告诉路由器开始在IP地址为10.1.1.1、10.1.100.1和10.1.120.1的接口上使用OSPF?", "choices": [ "网络 10.1.0.0 0.0.255.255 区域 0。", "网络 10.0.0.0 0.255.255.0 区域 0。", "网络 10.1.1.0 0.x.1x.0 区域 0。", "网络 10.1.1.0 255.0.0.0 区域 0。", "网络 10.0.0.0 255.0.0.0 区域 0。" ], "answer": "A", "solution": "“network 10.1.0.0 0.0.255.255 area 0”命令匹配以10.1开头的所有IP地址,在所有接口上启用区域0的OSPF。使用通配符掩码0.255.255.0的答案是非法的,因为它表示由二进制1分隔的多个二进制0字符串。使用x的答案在语法上是不正确的。使用通配符掩码255.0.0.0的答案意味着“匹配所有最后三个八位组为0.0.0的地址”,因此三个接口都不匹配。", "topic": [ "实现OSPF" ] }, { "id": "Wired Network-1186", "type": 0, "question": "802.11ac支持的最大空间流数量是多少?", "choices": [ "1", "2", "4", "8", "16" ], "answer": "D", "solution": "802.11ac支持最多八个空间流,但Wave 1仅支持三个,Wave 2支持四个。", "topic": [ "RF标准" ] }, { "id": "Wired Network-1187", "type": 0, "question": "以下哪些IP地址可以在互联网上进行路由?", "choices": [ "127.0.0.1", "192.168.1.1", "129.52.50.13", "10.52.50.13" ], "answer": "C", "solution": "唯一列出的公共地址(需要进入互联网)是129.52.50.13。\n\n其他答案都是私有IP地址,意味着它们应该在防火墙后面。127.0.0.1是IPv4本地回环IP地址。192.168.1.1是SOHO网络设备常用的私有IP地址。10.52.50.13是私有地址。(请注意,10网络在较大的网络中很常见。)", "topic": [] }, { "id": "Wired Network-1188", "type": 0, "question": "以下哪个是Loop-Free U拓扑的主要设计考虑?", "choices": [ "如果一个分布式交换机或上行链路出现故障,这将给设计引入单点故障。", "大量接入层流量可能会通过交换机之间的链路到达活动FHRP。", "无法将相同的VLAN扩展到超过一对接入交换机。", "STP限制了在一个VLAN或STP实例中利用所有可用上行链路的能力。" ], "answer": "C", "solution": "Loop-Free U拓扑的主要设计问题是无法将相同的VLAN扩展到超过一对接入交换机。", "topic": [ "第二层技术" ] }, { "id": "Wired Network-1189", "type": 0, "question": "在美国,联邦通信委员会(FCC)实施规则来管理无线电通信。在点对多点的WISP连接中,2.4 GHz频段可以传输的最大等效辐射功率(EIRP)是多少瓦?", "choices": [ "2瓦特", "4瓦特", "158瓦特", "125毫瓦。" ], "answer": "B", "solution": "无线互联网服务提供商(WISPs)在2.4 GHz频段操作时,其点对多点连接的有效等向辐射功率(EIRP)限制为4瓦特。它们在2.4 GHz频段的点对点连接功率在4瓦特至158瓦特之间变化。5 GHz频段的最大EIRP为125毫瓦。FCC的最大限制可以在`www.air802.com/fcc-rules-and-regulations.html`找到。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1190", "type": 0, "question": "EIGRP SoO从路由的角度具体缓解了什么问题?", "choices": [ "当在仅包含MPLS VPN链接的站点中使用OSPF作为PE-CE路由协议时,可能会出现路由环路和竞争问题。", "当在同时包含MPLS VPN和后门链接的站点中使用EIGRP作为PE-CE路由协议时,可能会出现路由环路和竞争问题。", "当在同时包含MPLS VPN和后门链接的站点中使用OSPF作为PE-CE路由协议时,可能会出现路由环路和竞争问题。", "在仅包含MPLS VPN链接的站点中,当EIGRP用作PE-CE路由协议时,可能会出现路由环路和竞争问题。" ], "answer": "B", "solution": "EIGRP源站点(SoO)专门用于帮助避免或减轻在利用EIGRP作为PE-CE路由协议的复杂拓扑中包含MPLS VPN和后门链接的路由环和竞争问题的影响。", "topic": [ "网络虚拟化" ] }, { "id": "Wired Network-1191", "type": 0, "question": "你的初级IT管理员发现了你的思科交换机上一个端口在不断地在up和down之间切换。他们观察到了什么?", "choices": [ "端口抖动", "端口切换", "端口闪烁", "端口标记" ], "answer": "A", "solution": "这被称为端口抖动,也称为链路抖动。它可能是由于有故障或非标准的网络电缆、非能效以太网(EEE)设备或未能正常工作或同步的小型可插拔(SFP)设备引起的。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1192", "type": 0, "question": "认证服务器使用的三个A是什么?", "choices": [ "认证、激活、接受", "授权、访问、分配", "接受,访问,会计。", "身份验证、授权、计费。" ], "answer": "D", "solution": "认证服务器为安全提供了AAA框架。认证要求实体在获得访问权限之前证明他们是谁。授权授予经过身份验证的用户访问资源的权限。计费跟踪用户活动。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1193", "type": 0, "question": "当一个新的思科Meraki AP首次上电时,它会自动连接到以下哪一个?", "choices": [ "思科无线局域网控制器", "位于10.0.0.1的TFTP服务器。", "思科梅拉基云网络", "什么都不需要做;作为一个自主的接入点,它等待您配置其IP地址。" ], "answer": "C", "solution": "该AP将连接到Cisco Meraki云网络以进行注册。此时,您必须浏览到云网络并声明该AP,以便将其与您的Meraki仪表板和帐户关联。", "topic": [ "实现自主和云部署" ] }, { "id": "Wired Network-1194", "type": 0, "question": "PC1、PC2和路由器R1都连接到同一个VLAN和IPv6子网。PC1想要将其第一个IPv6数据包发送到PC2。PC1将使用什么协议或消息来发现应该将此IPv6数据包封装在其中的以太网帧发送到哪个MAC地址?", "choices": [ "ARP", "NDP NS", "NDP RS", "SLAAC" ], "answer": "B", "solution": "PC1需要发现PC2的MAC地址。与IPv4不同,IPv6不使用ARP,而是使用NDP。具体而言,PC1使用NDP邻居请求(NS)消息请求PC2发送NDP邻居广告(NA)。SLAAC与地址分配有关,而不是发现邻居的MAC地址。", "topic": [ "实施IPv6路由。" ] }, { "id": "Wired Network-1195", "type": 0, "question": "什么命令可以使你将路由器接口配置为DHCPv6中继代理?", "choices": [ "IPv6转发器", "IPv6辅助地址", "IPv6 DHCP中继目的地。", "IPv6 DHCP客户端" ], "answer": "C", "solution": "\"ipv6 dhcp relay destination\"命令可以使你将路由器接口配置为DHCPv6中继代理。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1196", "type": 0, "question": "你的朋友想要使用手机在一家受欢迎的咖啡店付款。他们注意到手机需要与咖啡店的读卡器保持约4英寸的距离。你需要为你的朋友配置哪种无线电波通信类型?", "choices": [ "近场通信(NFC)", "无线网络", "红外数据关联(IrDA)", "蓝牙" ], "answer": "A", "solution": "近场通信(NFC)是一种无线技术,使用有限范围内的无线电频率(RF)信号,大约为4英寸(10厘米)。蓝牙和Wi-Fi具有更大的范围,而IrDA使用红外线并需要视线通信。IrDA已不再流行。", "topic": [ "移动设备" ] }, { "id": "Wired Network-1197", "type": 0, "question": "当地建筑法规可能要求数据网络使用plenum电缆的情况包括:在需要在空气流通的区域内安装电缆,例如空气处理设备或天花板空间。这是因为plenum电缆具有更高的防火性能,可以减少火灾风险。", "choices": [ "当电缆运行距离超过物理层规范指定的最大长度时", "当电缆必须穿过空气管道时", "当电缆靠近产生电磁干扰(EMI)的设备时", "当多个电缆通过同一管道时" ], "answer": "B", "solution": "一个plenum空间是建筑物中的一个区域,作为其通风系统的一部分提供空气循环,例如加热或空调管道。Plenum电缆具有由阻燃材料制成的护套,当其燃烧时不会释放有毒烟雾。当网络电缆安装在plenum空间中时,许多当地建筑法规要求安装者使用符合特定标准的plenum等级电缆。当安装在其他电缆或EMI源附近,或超过指定长度时,plenum电缆不提供任何好处。", "topic": [] }, { "id": "Wired Network-1198", "type": 0, "question": "以下哪个不是叶脊式数据中心拓扑结构优于标准三层拓扑结构的原因?", "choices": [ "叶脊结构采用全网格交换拓扑。", "在叶脊拓扑结构中,所有数据流都需要相同数量的跳数。", "叶脊拓扑比三层拓扑实现成本更低。", "叶脊拓扑结构使用软件定义网络来引导流量,而不是使用生成树协议阻止端口。" ], "answer": "C", "solution": "叶脊拓扑结构在其两层交换机中使用全网状拓扑结构。这比三层拓扑结构更昂贵,但通过要求在任意两个路由器之间的路径中跳数相同来减少延迟。使用软件定义网络可提供自适应路径确定,无需使用层2端口阻塞的生成树协议(STP)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1199", "type": 0, "question": "以下哪个术语是交换机的另一个术语?", "choices": [ "多播集线器", "多口集线器", "多端口桥接器", "多宿主路由器" ], "answer": "C", "solution": "交换机是数据链路层设备,基本上为连接到其端口之一的每个设备执行桥接功能。因此,它可以被描述为多端口桥接器。多端口中继器是集线器的另一个术语,而多宿主路由器是冗余的,因为所有路由器都定义为多宿主,即连接到多个网络。没有多播集线器这样的设备。", "topic": [] }, { "id": "Wired Network-1200", "type": 0, "question": "在路由器接口上,需要使用哪个命令将DHCP Discover消息转发到不同子网上的DHCP服务器?", "choices": [ "IP地址动态获取(DHCP)", "IP帮助地址", "IP DHCP转发器", "IP DHCP服务器" ], "answer": "B", "solution": "要将DHCP发现消息转发到不同子网中的DHCP服务器,您可以使用“ip helper-address”命令。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1201", "type": 0, "question": "当交换机接收到一个帧并且目标硬件地址未知或不在过滤表中时,它会执行什么操作?", "choices": [ "将交换机转发到第一个可用的链接。", "丢帧", "除了源端口之外,向网络发送帧以查找设备。", "向原始站点发送一条消息,请求名称解析。" ], "answer": "C", "solution": "除了源端口外,交换机会将所有具有未知目标地址的帧广播。如果设备回答了该帧,交换机将更新MAC地址表以反映设备的位置。", "topic": [ "交换和虚拟局域网" ] }, { "id": "Wired Network-1202", "type": 0, "question": "一个由一个WLC和32个轻量级AP组成的集中式无线网络被建立起来。以下哪个最能描述这种结果的架构?", "choices": [ "WLC到32个LAP之间有一个直接的第二层路径,所有设备都使用相同的IP子网。", "WLC到32个LAP之间采用直接的第三层路径,且所有设备使用相同的IP子网。", "32个LAP之间串联的CAPWAP隧道,一个CAPWAP隧道连接到WLC。", "32个CAPWAP隧道——每个LAP与WLC之间有一个隧道,没有IP子网限制。" ], "answer": "D", "solution": "因为网络是由WLC和LAPs构建的,所以需要CAPWAP隧道。每个LAP都需要连接到WLC的一个CAPWAP隧道,总共需要32个隧道。CAPWAP将无线流量封装在额外的IP头中,因此隧道数据包可以在Layer 3网络上进行路由。这意味着只要子网可达,LAPs和WLC可以驻留在任何IP子网上。对于LAPs和WLC生活在同一个Layer 2 VLAN或Layer 3 IP子网上没有任何限制。", "topic": [ "理解思科无线网络架构" ] }, { "id": "Wired Network-1203", "type": 0, "question": "你在一家分布在全国各地的公司工作,需要经常前往这些分支机构。每个分支机构都有一些访问公司总部网络的手段。有些使用帧中继,有些使用虚拟专用网络(VPN),还有一些甚至使用拨号接入。在一次旅行中,你告诉一个分支机构经理,你打算晚上从酒店房间连接到总部网络。经理警告你这违反了公司政策,但你并不确定。你应该在公司文档的哪里查找以确认这一点?", "choices": [ "远程访问策略", "服务水平协议", "可接受使用政策", "特权用户协议" ], "answer": "A", "solution": "远程访问策略规定了用户何时以及如何被允许从远程位置访问公司网络。服务级别协议(SLA)是提供者和订阅者之间的合同,规定了服务的可用性保证。可接受使用政策(AUP)规定了员工是否以及如何利用公司拥有的硬件和软件资源。特权用户协议规定了用户在管理帐户和其他权限方面所拥有的能力和限制。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1204", "type": 0, "question": "以下哪种设备通常在租用线宽带网络(WAN)服务的分界点提供诊断测试功能?", "choices": [ "SIP中继线路", "媒体转换器", "智能插座", "AAAA服务器" ], "answer": "C", "solution": "智能接口盒是位于租用线路分界点的设备,可以提供额外的功能,如信号转换、诊断测试和其他能力。会话初始化协议(SIP)干线是连接到互联网协议语音服务提供商的连接。媒体转换器是一种本地区域网络设备,可将不同类型的电缆连接到同一网络。AAAA服务器为远程访问服务器提供认证、授权、计费和审计服务。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1205", "type": 0, "question": "以下哪一项是Multicast Direct的独特特点?", "choices": [ "WLC将所有的组播流量定向到其下一跳路由器。", "特定的组播流将被重定向为无线客户端的单播流。", "来自无线客户端的组播流将被定向到锚控制器。", "WLC将提供易于使用的基于Web的界面,以帮助客户接收组播流量。" ], "answer": "B", "solution": "多播直播(也称为VideoStream或Media Stream)允许WLC接收多播视频流并将其重定向为单播流发送到各个接收无线客户端。其目的是提高通过无线介质传递视频的质量。", "topic": [ "实现多播" ] }, { "id": "Wired Network-1206", "type": 0, "question": "在安全防火墙上配置和部署DNS策略需要哪种许可证?", "choices": [ "威胁许可证", "恶意软件许可证", "DNS许可证", "无需额外许可证。这是基本的防火墙功能;您可以直接启用DNS策略。" ], "answer": "A", "solution": "需要威胁许可证。", "topic": [ "域名系统(DNS)策略" ] }, { "id": "Wired Network-1207", "type": 0, "question": "Alice正在进行一些计算,以确认公司校园内两栋建筑之间新安装的光纤电缆存在问题。为了确认电缆存在问题,Alice查阅了电缆安装商提供的接线图,并开始计算电缆安装因素导致的光功率损失,例如所使用的电缆类型、电缆长度导致的衰减以及接头的数量和类型。以下哪个术语描述了Alice正在执行的计算?", "choices": [ "协议分析", "路由环路", "光学链路预算", "接收信号强度指示(RSSI)" ], "answer": "C", "solution": "Alice的计算被称为光链路预算。通过将各种损耗因素以分贝(dB)为单位相加,她可以确定预算是否低,从而导致链路上的通信问题。协议分析是对网络数据包内容的检查。路由环路是数据包在网络中无限循环的情况。RSSI是一种无线网络统计数据,不适用于光纤连接。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1208", "type": 0, "question": "在帮助台工作时,你接到一个电话,得知用户的PC IP地址和掩码(10.55.66.77,掩码255.255.255.0)。当使用分类逻辑思考时,你确定了网络(N)、子网(S)和主机(H)位的数量。在这种情况下,以下哪个是正确的?", "choices": [ "N=12", "S=12", "H=8", "S=8", "N=24" ], "answer": "C", "solution": "网络部分的大小始终为8、16或24位,具体取决于它是A类、B类还是C类。作为A类地址,N=8。掩码255.255.255.0转换为前缀格式为/24。子网位数是前缀长度(24)和N之间的差异,因此在这种情况下S=16。主机部分的大小是一个数字,当它加到前缀长度(24)上时,得到32,因此在这种情况下H=8。", "topic": [ "分析子网掩码" ] }, { "id": "Wired Network-1209", "type": 0, "question": "以下哪个不是服务器负载均衡机制的类型?", "choices": [ "DNS轮询", "网络地址转换", "内容切换", "多层交换。" ], "answer": "B", "solution": "负载均衡是一种将进入的流量分配到多个服务器的方法。网络地址转换(NAT)是一种路由机制,使私有网络上的计算机可以共享一个或多个公共Internet协议(IP)地址。因此,它不是一种负载均衡方法。域名系统(DNS)轮询、多层交换和内容交换都是使服务器集群共享客户端流量的机制。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1210", "type": 0, "question": "以下哪个陈述关于漫游是正确的?", "choices": [ "所有无线客户端使用相同的算法来触发漫游条件。", "当漫游时,无线客户端可以扫描可用的信道以寻找新的接入点。", "无线客户端必须在同一信道上从一个接入点漫游到另一个接入点。", "802.11标准定义了一组用于客户端漫游的算法。" ], "answer": "B", "solution": "漫游算法根本没有标准化。相反,每个制造商可能都有自己对算法的解释。当无线客户端预期漫游时,它们可以扫描一组可用信道,以寻找新的接入点。思科的接入点和控制器还可以提前向兼容思科客户端(CCX版本3及更高版本)提供可行接入点列表,以便客户端无需扫描信道即可节省时间。", "topic": [ "使用无线接入点进行规划覆盖" ] }, { "id": "Wired Network-1211", "type": 0, "question": "你即将参考供应商的指导说明。你应该处于解决问题的最佳实践方法论的哪个步骤?", "choices": [ "建立一个可能原因的理论。", "确定问题。", "制定行动计划来解决问题并实施解决方案。", "记录发现、行动和结果。" ], "answer": "C", "solution": "最佳实践方法的第四步是制定行动计划,其中包括参考供应商的说明。CompTIA解决问题的最佳实践方法包括以下步骤:\n\n1. 确定问题。\n2. 建立可能原因的理论(质疑显而易见的)。\n3. 测试理论以确定原因。\n4. 制定解决问题并实施解决方案的行动计划。\n5. 验证完整的系统功能,并在适当的情况下实施预防措施。\n6. 记录调查结果、行动和结果。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1212", "type": 0, "question": "在OSI模型的哪一层中,可以找到负责将数据传递到互联网最终目的地的协议?", "choices": [ "数据链路", "网络", "会话", "应用程序" ], "answer": "B", "solution": "在TCP/IP网络中,网络层的Internet协议(IP)是负责将数据传递到最终目的地的协议。数据链路层协议仅涉及局域网(LAN)上的设备之间或通过广域网(WAN)连接的两个点之间的通信。会话层和应用层不参与实际数据传递。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1213", "type": 0, "question": "哪个APIC CLI命令可以向APIC或ACI交换机发出信号,以生成一个系统消息并传输到syslog服务器?", "choices": [ "moquery", "grep", "logit", "syslog" ], "answer": "C", "solution": "logit** 用于通过提交测试系统消息来测试织物中的 syslog 配置。", "topic": [ "使用Syslog和SNMP监控ACI" ] }, { "id": "Wired Network-1214", "type": 0, "question": "真或假:在OSPF中使用命令**default information-originate**广告的默认路由将始终显示为OSPF区间路由。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。OSPF广告的默认路由始终显示为外部路由。", "topic": [ "OSPF(Open Shortest Path First)开放式最短路径优先协议。" ] }, { "id": "Wired Network-1215", "type": 0, "question": "在OSI模型的传输层中,以下哪种协议提供面向连接的服务,并保证传输的可靠性?", "choices": [ "TCP", "HTTP", "UDP", "IP" ], "answer": "A", "solution": "传输控制协议(TCP)在传输层提供面向连接的服务,具有可靠的传输保证。用户数据报协议(UDP)在传输层提供无连接服务。超文本传输协议(HTTP)在应用层运行,而互联网协议(IP)是一种无连接的网络层协议。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1216", "type": 0, "question": "以下哪个陈述关于IP地址是正确的?", "choices": [ "在桥接网络中,主机应该使用 BVI 的 IP 地址作为默认网关。", "桥聚合组中的任何主机的子网掩码应与 BVI 的 IP 地址不同。", "BVI的IP地址被用作源IP地址,用于来自威胁防御系统的数据包。", "所有威胁防御的物理接口都需要一个IP地址。" ], "answer": "C", "solution": "BVI的IP地址被用作源IP地址,用于来自威胁防御的数据包。", "topic": [ "透明模式下的防火墙部署" ] }, { "id": "Wired Network-1217", "type": 0, "question": "在2.4 GHz频段,FCC将点对多点链路的等效辐射功率限制在以下哪个最大值?", "choices": [ "100 mW", "20 dBm", "50 mW", "36 dBm" ], "answer": "D", "solution": "在2.4GHz频段中,EIRP始终限制在+36 dBm以内,除了点对点链接的情况。", "topic": [ "RF标准" ] }, { "id": "Wired Network-1218", "type": 0, "question": "当顾客将手机放在设备旁边支付购买时,快餐店使用的是什么类型的通讯技术?", "choices": [ "RFID", "NFC", "Wi-Fi", "HAV" ], "answer": "B", "solution": "近场通信(NFC)需要设备彼此之间距离约为10厘米以内才能传输数据。在这种情况下,设备是在卡模拟模式下工作,但NFC也可以用于在两个类似的设备之间传输,例如两个手机,或读取智能标签。射频识别(RFID)是另一种使用无线电波传输信息的技术。Wi-Fi是基于802.11的无线网络,而硬件辅助虚拟化(HAV)是一种允许虚拟机(VM)更直接访问物理处理器功能的虚拟化技术。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1219", "type": 0, "question": "你正在解决一台无法与网络上其他计算机通信的计算机故障。 **ipconfig** 命令显示了一个 APIPA IP 地址(169.254.21.184)。最有可能的问题是什么?", "choices": [ "DNS解析", "重复的IP地址", "DHCP故障。", "清除 ARP 缓存。" ], "answer": "C", "solution": "最可能的问题是DHCP故障。当客户端计算机无法找到DHCP服务器时,169.254.0.0等链路本地IP地址(如APIPA)通常会启动。可能发生这种情况的原因有几种:缺乏网络连接、客户端配置不正确、DHCP服务器故障等等。解决这种情况的最佳方法是从客户端开始,检查其网络电缆(或无线连接),然后检查其TCP/IP配置。您还可以尝试在客户端上配置静态IP地址,以查看是否允许客户端在网络上通信。如果这些事情不能解决问题或给您任何线索,您可以查看网络交换机、DHCP服务器等等。", "topic": [] }, { "id": "Wired Network-1220", "type": 0, "question": "假设您刚刚收到消息,没有用户能够连接到新安装的AP。当您从WLC搜索AP的名称时,以下哪些信息对于验证是重要的?(选择所有适用项。)", "choices": [ "AP具有有效的IP地址。", "AP已被找到。", "该AP列出了2.4GHz和5GHz频段的有效信道号。", "AP具有有效的MAC地址。" ], "answer": "B", "solution": "客户端尚未通过认证阶段,因此可能未能正确地进行身份验证。如果 WLAN 使用 WPA2-Personal,则客户端的预共享密钥可能不正确。", "topic": [ "无线连接故障排除" ] }, { "id": "Wired Network-1221", "type": 0, "question": "以下哪个syslog消息严重级别表示需要立即采取行动?", "choices": [ "0", "1", "2", "3", "4" ], "answer": "B", "solution": "每个syslog消息都包含一个单个数字的严重程度代码。严重程度代码1是警报消息,表示需要立即采取行动。代码0是最严重的,表示系统无法使用的紧急情况。严重程度代码2是关键条件消息,代码3是错误条件。代码4是警告消息。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1222", "type": 0, "question": "Ralph是一名网络顾问,他的客户希望他为公司的新分支机构设计本地区域网络(LAN)。该站点由一栋已经安装了无屏蔽双绞线(UTP)电缆的建筑组成,客户在选择物业时认为这是一个重要的卖点。他希望Ralph使用现有的电缆安装最快的LAN。在检查了现场后,Ralph注意到电缆是类别5(CAT5),使用星型拓扑结构安装,并且每个电缆运行距离都不到100米。以下哪种以太网物理层规范可以让Ralph在不更换电缆的情况下为新网络提供最快的传输速度?", "choices": [ "10GBase-T", "100Base-TX", "1000Base-T", "1000Base-LX", "1000Base-SX" ], "answer": "C", "solution": "1000Base-T是可以在CAT5 UTP电缆上运行的最快的以太网规范。10GBase-T需要至少Category 5e(CAT5e)或Category 6(CAT6)UTP电缆。100Base-TX可以使用CAT5电缆,但速度只有1000Base-T的十分之一。1000Base-LX和1000Base-SX是光纤规范,不能在CAT5 UTP或任何铜电缆上运行。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1223", "type": 0, "question": "在互联网服务提供商(ISP)和用户之间的服务级别协议(SLA)中,以下哪个元素通常不会出现?", "choices": [ "提供的服务范围定义(指互联网服务提供商提供的服务内容)。", "由ISP提供的设备规格清单。", "互联网服务提供商提供的技术支持类型和时间表。", "当用户访问ISP的服务时,将使用的应用程序类型。" ], "answer": "D", "solution": "ISP为用户提供接入互联网的服务。用户在互联网上使用的应用程序通常不是服务级别协议(SLA)的一部分。SLA通常明确规定ISP将提供哪些服务、提供哪些设备以及作为协议一部分提供的技术支持服务。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1224", "type": 0, "question": "哪个 WLAN 控制器接口用于带外管理?", "choices": [ "管理接口", "服务端口接口", "AP管理界面", "虚拟接口" ], "answer": "B", "solution": "服务端口接口是一种可选接口,用于静态配置带外管理。", "topic": [ "无线局域网设计" ] }, { "id": "Wired Network-1225", "type": 0, "question": "您正在使用音调发生器和定位器测试双绞线电缆。当您将音调发生器应用于电缆一端的前七根线中的每一根时,您成功地在另一端的相应引脚上检测到音调。然而,当您将音调发生器连接到第八根线时,您未能在另一端检测到音调。您发现了以下哪种故障类型?", "choices": [ "短路", "断路。", "拆分对子", "相声" ], "answer": "B", "solution": "第八根电线无法检测到音调,说明电缆内部某处存在断路或一个或两个连接器中存在不良引脚连接。这种故障称为开路。其他三个选项都不是描述的故障。短路是指一根电线连接到电缆一端的两个或多个引脚。分裂对是一种连接方式,其中两根电线在电缆两端被错误地映射为完全相同的方式。串扰是一种干扰类型,由一根电线上的信号渗透到其他电线上引起的。", "topic": [] }, { "id": "Wired Network-1226", "type": 0, "question": "DMVPN第1阶段和DMVPN第2阶段在中心路由器上的配置差异是什么?", "choices": [ "使用ip nhrp shortcut命令。", "使用命令ip nhrp redirect", "使用命令ip nhrp version 2", "配置没有任何区别。" ], "answer": "D", "solution": "在使用DMVPN第一阶段和第二阶段的情况下,中心路由器的配置没有任何区别。", "topic": [ "DMVPN隧道" ] }, { "id": "Wired Network-1227", "type": 0, "question": "Cisco ASA支持以下哪些类型的日志记录?(选择所有适用项。)", "choices": [ "控制台日志记录", "终端日志记录", "电子邮件记录", "所有这些答案都是正确的。" ], "answer": "D", "solution": "Cisco ASA支持控制台、终端和电子邮件日志记录,以及记录到缓冲区和syslog服务器。", "topic": [ "网络基础设施设备遥测和分析" ] }, { "id": "Wired Network-1228", "type": 0, "question": "账户锁定策略旨在保护以下哪种类型的攻击?", "choices": [ "社交工程学", "欺骗攻击", "暴力破解", "中间人攻击" ], "answer": "C", "solution": "暴力破解密码攻击是指攻击者尝试尽可能多的密码,以猜测或推断正确的密码。账户锁定策略旨在通过限制错误密码尝试的次数来防止这种类型的攻击。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1229", "type": 0, "question": "在哪个故障排除步骤中,您会记录您的活动并告知用户发生了什么以及原因?", "choices": [ "识别问题", "建立一个可能原因的理论。", "测试该理论以确定原因。", "制定解决问题的行动计划并确定可能的影响。", "实施解决方案或必要时升级。", "验证整个系统的功能性,并在适用的情况下实施预防措施。", "记录发现、行动和结果。" ], "answer": "G", "solution": "故障排除过程的最后一步是记录解决方案,并向用户解释发生了什么以及为什么。实际上,文档应该在问题报告时开始编写,并在整个故障排除过程中更新。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1230", "type": 0, "question": "以下哪一项在思科室外网状网络中不需要?", "choices": [ "BSS功能", "每个接入点的以太网布线", "一个工作组桥接器", "一个回程网络" ], "answer": "B", "solution": "在网状网络中,每个网状AP都建立一个独立的BSS。AP通过无线回程链接彼此中继客户端流量,而不是有线以太网。因此,不需要将以太网电缆连接到每个AP。", "topic": [ "无线网络基础" ] }, { "id": "Wired Network-1231", "type": 0, "question": "一个客户想要在美国的许多不同地点访问互联网。以下哪种技术是使客户能够这样做的最佳技术?", "choices": [ "红外线", "蜂窝网络广域网", "蓝牙", "802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的数据传输速度和更好的网络性能。" ], "answer": "B", "solution": "使用蜂窝 WAN,手机或其他移动设备通过标准蜂窝连接发送数据。", "topic": [] }, { "id": "Wired Network-1232", "type": 0, "question": "vPC 何时会暂停端口通道?", "choices": [ "QoS配置不匹配。", "MTU配置不匹配。", "SVI配置不匹配。", "ACL配置不匹配。" ], "answer": "B", "solution": "一共有两种一致性检查失败类型:一种会导致整个端口通道崩溃(这些是类型1),另一种只会导致单个VLAN或一组VLAN无法在端口通道上激活(类型2)。MTU是类型1的一致性检查失败,而QoS、SVI和ACL都是类型2。", "topic": [ "实施数据中心交换协议" ] }, { "id": "Wired Network-1233", "type": 0, "question": "路由器用什么类型的地址将数据发送到目的地?", "choices": [ "IP", "MAC", "Memory", "Loopback" ], "answer": "A", "solution": "路由器是OSI模型第三层设备。它们保持一个包含每个端口连接的设备的IP地址的表格,无论该设备是计算机还是另一个路由器的外部地址。媒体访问控制(MAC)地址是网络接口卡(NIC)的地址。内存地址标识信息存储的位置,回送地址用于测试本地主机上的TCP/IP。IPv4的回送地址是127.0.0.1,IPv6的回送地址是::1。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1234", "type": 0, "question": "当进行故障排除时,TACACS Live Log 中的 Identity 列仅显示字符串“USERNAME”。您应该在哪里更正这种行为?", "choices": [ "管理 > 系统 > 设置 > 安全设置 > 隐藏失败的用户名", "工作中心 > 设备管理 > 设置 > 隐藏失败的用户名", "工作中心 > 设备管理 > 设置 > 显示无效用户名", "管理 > 系统 > 设置 > 安全设置 > 公开无效用户名" ], "answer": "D", "solution": "由于ISE的默认“安全设置”,任何身份验证失败都会在实时日志中显示用户名,直到您在管理>设置>安全设置下启用“公开无效用户名”设置。", "topic": [ "使用Cisco WLC配置设备管理员AAA" ] }, { "id": "Wired Network-1235", "type": 0, "question": "802.11b标准的最大数据传输速率是多少?", "choices": [ "6 Mbps", "11 Mbps", "22 Mbps", "54 Mbps" ], "answer": "B", "solution": "IEEE 802.11b标准提供了最高达11 Mbps的数据传输速率。", "topic": [ "无线网络" ] }, { "id": "Wired Network-1236", "type": 0, "question": "用户在IT帮助台打电话报告说她在访问本地服务器和互联网网站时遇到间歇性问题。以下哪些潜在问题可以立即排除?", "choices": [ "故障的域名系统(DNS)服务器", "重复的媒体访问控制(MAC)地址", "重复的IP地址", "故障的路由器" ], "answer": "C", "solution": "操作系统会立即检测到重复的IP地址,并在涉及的计算机上显示错误消息或通知。因此,如果另一个系统正在使用她的IP地址,有问题的用户将立即得到通知。所有其他选项都是可能导致问题的原因,这些原因更难以进行故障排除。", "topic": [] }, { "id": "Wired Network-1237", "type": 0, "question": "拉尔夫最近在车库销售中购买了一个旧的以太网集线器和一些双绞线电缆,想要用它们来建立一个家庭网络。他使用电缆将两台计算机插入集线器,但发现计算机无法通信。然后他注意到集线器中的一个端口标有一个X。他尝试将其中一台计算机插入X端口,现在它们可以通信了。以下哪种说法最有可能解释这种行为?\n\n最有可能的解释是X端口是一个交叉线路口,而双绞线电缆需要使用交叉线路才能使两台计算机之间进行通信。因此,当一台计算机插入X端口时,它会自动交叉线路,使得两台计算机可以进行通信。", "choices": [ "这个集线器有一个坏端口。", "其中一根电缆是交叉线缆。", "这两根电缆都是交叉线缆。", "X端口提供额外的信号强度。" ], "answer": "B", "solution": "老旧的以太网集线器不支持自动协商交叉线路。相反,它们有一个X(或上行)端口,提供了一个没有交叉电路的连接,因此您可以将一个集线器连接到另一个集线器。如果两根电缆都是标准的直通以太网电缆,或者都是交叉电缆,那么将它们插入两个常规端口应该可以工作。因为将一根电缆插入X端口可以工作,这意味着只有一根电缆必须是交叉电缆。因此,问题在于电缆,而不是端口。X端口不会为信号提供额外的强度。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1238", "type": 0, "question": "以下哪个关于Cisco MDS交换机系统消息的说法是不正确的?", "choices": [ "它们提供日志信息以进行监控和故障排除。", "系统消息配置允许用户选择捕获的日志信息类型。", "系统消息配置允许用户选择目标服务器以转发捕获的日志信息。", "所有日志消息都会在系统重新启动后保存。" ], "answer": "D", "solution": "日志消息不会在系统重新启动后保存。但是,最多保存100个严重级别为关键和以下(级别0、1和2)的日志消息在NVRAM中。", "topic": [ "软件管理和基础设施监控\n\n软件管理是指对软件开发、测试、部署、维护等全过程进行有效的管理和协调,以确保软件的质量、安全和可靠性。软件管理包括需求管理、项目管理、配置管理、变更管理、缺陷管理等方面。\n\n基础设施监控是指对计算机系统、网络、服务器、存储等基础设施进行实时监控和管理,以确保它们的正常运行和高效性能。基础设施监控包括硬件监控、网络监控、应用程序监控、日志监控等方面。通过基础设施监控,可以及时发现和解决问题,提高系统的可用性和稳定性。" ] }, { "id": "Wired Network-1239", "type": 0, "question": "以下哪个特性是DHCP支持的,但是BOOTP和RARP不支持?", "choices": [ "动态地址分配", "中继代理", "手动地址分配", "自动地址分配" ], "answer": "A", "solution": "动态主机配置协议(DHCP)可以动态地为客户端分配IP地址,并在租约到期时收回它们。引导协议(BOOTP)和反向地址解析协议(RARP)可以自动或手动分配地址,但无法收回它们。DHCP和BOOTP都支持中继代理。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1240", "type": 0, "question": "以下哪种桥接类型从未在以太网局域网(LAN)上使用过?", "choices": [ "存储转发", "透明的", "源路由", "多端口" ], "answer": "C", "solution": "源路由桥接是一种在令牌环网上使用(而不是以太网)的技术,其中数据包头部的路由信息字段(RIF)标识了数据包到达目的地应该经过的网络段。存储转发、透明和多端口桥接都曾在以太网网络上使用过。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1241", "type": 0, "question": "在二层网络中,如何避免组播帧的洪泛?", "choices": [ "禁用未知组播洪泛。", "启用组播风暴控制。", "启用IGMP Snooping。", "启用控制平面 policing。" ], "answer": "C", "solution": "IGMP Snooping是在RFC 4541中定义的,它检查接收器发送的IGMP加入信息,并维护一个与IGMP加入相关的接口表。当交换机接收到发送到多播组的多播帧时,它仅将数据包转发到接收该特定多播组的IGMP加入端口。这可以防止多播流量在二层网络中泛洪。", "topic": [ "多播" ] }, { "id": "Wired Network-1242", "type": 0, "question": "以下哪个协议负责将IP地址解析为硬件地址?", "choices": [ "DNS", "DHCP", "ARP", "RARP" ], "answer": "C", "solution": "地址解析协议(ARP)将IP地址解析为硬件(MAC)地址。RARP则相反,它将MAC地址解析为IP地址。DNS将主机名解析为IP地址。DHCP自动配置TCP/IP客户端。", "topic": [ "TCP/IP介绍" ] }, { "id": "Wired Network-1243", "type": 0, "question": "当您创建一个以以太网接口指定而不是下一跳IP地址的IPv4静态路由时会发生什么?", "choices": [ "路由器使用ARP获取直接连接路由器的IP地址的MAC地址。", "路由器将带有目标MAC地址 FFFF:FFFF:FFFF 的数据包转发。", "路由器使用ARP获取数据包源IP地址的MAC地址。", "路由器使用ARP协议获取数据包目的IP地址对应的MAC地址。" ], "answer": "D", "solution": "当您创建一个以太网接口指定的IPv4静态路由而不是下一跳IP地址时,路由器使用ARP获取数据包目的地IP地址的MAC地址。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1244", "type": 0, "question": "以下哪项是交换机的好处之一?", "choices": [ "保护局域网资源免受来自互联网攻击者的攻击。", "提供额外的带宽。", "降低吞吐量。", "允许访问局域网上的所有计算机。" ], "answer": "B", "solution": "通过允许每个端口进行全双工操作,交换机为每个端口提供了额外的带宽。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1245", "type": 0, "question": "哪种DNS记录包含了一个授权发送电子邮件的用户(IP地址)列表,以代表一个域名发送邮件?", "choices": [ "DKIM", "SPF", "DMARC", "A" ], "answer": "B", "solution": "Sender Policy Framework(SPF)是一种防止电子邮件地址欺骗的技术。它使用域名的DNS服务中的TXT条目来实现。DomainKeys Identified Mail(DKIM)执行类似的功能,但它使用数字签名。基于域的消息认证、报告和合规性(DMARC)使用SPF或DKIM,并要求发件人的域与DNS域名相同。域管理员可以指定将未通过DMARC的电子邮件隔离或拒绝。要使用DMARC,必须在DNS中存在DMARC记录。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1246", "type": 0, "question": "以下哪些是无类路由协议?", "choices": [ "RIPv1和RIPv2", "EIGRP和RIPv2", "IS-IS和OSPF", "答案为B和C。" ], "answer": "D", "solution": "EIGRP、RIPv2、IS-IS和OSPF都是无类路由协议。", "topic": [ "路由协议特性,RIP,EIGRP和IS-IS" ] }, { "id": "Wired Network-1247", "type": 0, "question": "你正在解决一个带有集成无线网络卡的笔记本电脑故障。用户报告说笔记本电脑无法连接到互联网。当你查看网络活动指示灯时,连接和活动指示灯交替闪烁,呈稳定的模式。问题最可能的原因是什么?", "choices": [ "无网络连接", "TCP/IP配置不正确。", "网络适配器故障。", "无法连接到DNS服务器。" ], "answer": "A", "solution": "如果没有网络连接,一些无线网卡的连接和活动指示灯会交替闪烁。如果网卡出现故障,可能根本没有任何指示灯亮起。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1248", "type": 0, "question": "以下哪个域名系统(DNS)资源记录仅用于反向名称解析?", "choices": [ "MX", "AAAA", "CNAME", "PTR" ], "answer": "D", "solution": "与A记录和AAAA记录类似,指针记录(PTR)包含主机名和IP地址,但它们用于反向名称解析,即将IP地址解析为主机名。邮件交换(MX)记录指定域应使用的邮件服务器。规范名称(CNAME)记录指定给定主机名的别名。AAAA资源记录将主机名映射到IPv6地址,用于名称解析。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1249", "type": 0, "question": "以下哪个步骤使您能够从远程计算机控制网络打印机?", "choices": [ "在本地安装打印机并访问共享选项卡", "在本地安装打印机并访问打印队列设置。", "在本地安装打印机并访问“端口”选项卡。", "通过FTP连接打印机" ], "answer": "C", "solution": "安装本地打印机驱动程序后,您可以通过访问打印机属性并访问端口选项卡来控制打印机。然后,单击“添加端口”按钮并选择“标准TCP/IP端口”选项。您必须知道打印机的IP地址或连接打印机的计算机的IP地址。", "topic": [] }, { "id": "Wired Network-1250", "type": 0, "question": "以下哪个关于边界网关协议(BGP)的陈述不正确?", "choices": [ "BGP是一种外部网关协议。", "BGP是一种链路状态路由协议。", "BGP支持无类域间路由(CIDR)。", "BGP在自治系统之间共享路由。" ], "answer": "B", "solution": "BGP是一种路径向量路由协议,而不是链路状态路由协议。其他选项都包含正确的陈述。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1251", "type": 0, "question": "以下哪些功能由TCP和UDP都执行?", "choices": [ "窗口化", "错误恢复", "使用端口号进行复用", "路由。", "加密", "有序数据传输" ], "answer": "C", "solution": "TCP而非UDP执行窗口控制、错误恢复和有序数据传输。两者都不执行路由或加密。", "topic": [ "TCP/IP传输和应用介绍" ] }, { "id": "Wired Network-1252", "type": 0, "question": "哪个思科DNA中心保障工具以图形方式显示客户端上运行的应用程序和服务通过网络上的所有设备到达目的地的路径?", "choices": [ "应用程序体验", "设备 360", "客户360", "路径追踪" ], "answer": "D", "solution": "Path Trace是Cisco DNA Center Assurance工具,它以图形方式显示客户端上运行的应用程序和服务通过网络上的所有设备到达目的地的路径。", "topic": [ "设备管理和管理工具故障排除" ] }, { "id": "Wired Network-1253", "type": 0, "question": "桥梁的主要功能是什么?", "choices": [ "分割冲突域。", "允许网络适配器或其他网络设备连接到与其设计不同类型的媒体。", "允许移动用户通过无线方式连接到有线网络", "以上选项均不正确。" ], "answer": "A", "solution": "桥梁的主要功能是将交通分隔在其两侧,从而分割碰撞域。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1254", "type": 0, "question": "您正在为客户安装UTP网络电缆。客户的政策要求网络电缆在燃烧时不产生有毒气体。您需要安装哪种类型的电缆?", "choices": [ "Plenum", "PVC", "STP", "Cat 5e or higher" ], "answer": "A", "solution": "大多数网络电缆都覆盖着一层塑料PVC涂层,燃烧时会产生有毒气体。而等级为Plenum的电缆则覆盖着一种类似于聚四氟乙烯的材料,燃烧时不会产生有毒物质。", "topic": [ "硬件" ] }, { "id": "Wired Network-1255", "type": 0, "question": "以下哪个能够实时提供对基础设施资源利用情况、IT基础设施堆栈中的关键性能指标以及容量的可见性?", "choices": [ "CloudSense分析。", "目录", "多域名管理器", "网络元素" ], "answer": "A", "solution": "Cisco UCS Director中的CloudSense Analytics提供对基础设施资源利用情况、IT基础设施堆栈中的关键性能指标以及实时容量的可见性。CloudSense显著改善了虚拟和云基础设施的容量趋势、预测、报告和规划。", "topic": [ "评估自动化和编排技术" ] }, { "id": "Wired Network-1256", "type": 0, "question": "以下哪个术语不是在建立SOHO互联网连接时使用的?", "choices": [ "集线器。", "路由器", "网络接口控制器(NIC)", "交换机", "入侵检测系统/入侵防御系统" ], "answer": "E", "solution": "入侵检测和预防系统对于SOHO互联网连接并非必需。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1257", "type": 0, "question": "电缆安装人员使用以下哪些工具来将连接器(如RJ-45和RJ-11)添加到双绞线电缆中?", "choices": [ "一个压接工具", "一个拼接工。", "一条辫子", "一个补丁" ], "answer": "A", "solution": "Crimper或压接工具是一种具有一组模具的钳子设备。安装人员使用压接工具将RJ-45或RJ-11连接器的两个半部分挤压在一起,内部的电线将连接器固定在电缆上。安装人员使用接头工具将两个电缆段拼接在一起。没有称为pigtail或patch的工具。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1258", "type": 0, "question": "你正在查看一个具有八根线的连接器,颜色顺序为绿色条纹、绿色、橙色条纹、蓝色、蓝色条纹、橙色、棕色条纹、棕色。你有什么类型的电缆?", "choices": [ "Twisted pair, T568A standard", "Twisted pair, T568B standard", "LC", "SC" ], "answer": "A", "solution": "所列出的颜色代码是T568A标准。在T568B标准中,橙色和绿色是相反的。LC和SC是光纤连接器。", "topic": [ "硬件" ] }, { "id": "Wired Network-1259", "type": 0, "question": "DHCP使用哪些端口号?(选择两个。)", "choices": [ "88", "25", "68", "69", "67", "53" ], "answer": "C", "solution": "DHCP使用UDP端口号67和68。", "topic": [ "故障排除ACL和前缀列表。" ] }, { "id": "Wired Network-1260", "type": 0, "question": "以下哪个协议将广告路由的IPv6网络?", "choices": [ "RIP", "RIPng", "OSPFv2", "EIGRPv3" ], "answer": "B", "solution": "已经升级以广告IPv6路由的路由协议包括RIPng、OSPFv3和EIGRPv6。IS-IS也可以广告IPv6路由,但IS-IS不需要升级。", "topic": [ "路由协议" ] }, { "id": "Wired Network-1261", "type": 0, "question": "哪些VPN更适合于路由协议,例如OSPF和EIGRP?", "choices": [ "使用IPsec over GRE的站点到站点VPN。", "远程访问VPN", "站点到站点虚拟专用网络(VPN)", "IPsec虚拟专用网络" ], "answer": "A", "solution": "思科ISR和思科ASR系列路由器通常用于通过IPsec over GRE的站点到站点VPN,以支持IGP的部署。", "topic": [ "广域网技术和企业边缘" ] }, { "id": "Wired Network-1262", "type": 0, "question": "以下哪个IP地址不是私有地址,因此可以在互联网上进行路由?", "choices": [ "`10.1.2.3`", "`172.18.31.54`", "`172.168.38.155`", "`192.168.38.155`" ], "answer": "C", "solution": "私有 IP 地址范围包括 `10.0.0.0/8`、`172.16.0.0/12` 和 `192.168.0.0/16`。地址 `172.168.38.155` 不在私有 IP 地址范围内,是一个公共(可路由)地址。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1263", "type": 0, "question": "在接口上启用EIGRPv6经典配置需要____。", "choices": [ "在EIGRP进程下使用命令network _prefix_ / _prefix-length_。", "在EIGRP进程下,命令network _interface-id_。", "在接口下使用命令 ipv6 eigrp _as-number_。", "无;EIGRPv6在初始化EIGRP进程时已在所有IPv6接口上启用。" ], "answer": "C", "solution": "EIGRPv6经典配置需要在路由器下使用命令**ipv6 eigrp** _as-number_进行标识。", "topic": [ "EIGRPv6(Enhanced Interior Gateway Routing Protocol version 6):增强型内部网关路由协议第6版。" ] }, { "id": "Wired Network-1264", "type": 0, "question": "一个自主的AP将被配置为支持三个对应于三个VLAN的WLAN。该AP将连接到以下哪个网络?", "choices": [ "访问模式链接", "干道模式链路", "LAG模式链接", "EtherChannel 链路" ], "answer": "B", "solution": "一个自主的接入点必须连接到它将扩展到无线局域网的每个VLAN。因此,它的链路应该配置为trunk。", "topic": [ "构建无线局域网" ] }, { "id": "Wired Network-1265", "type": 0, "question": "以下哪个术语指的是一种路由协议,该协议依靠跳数来衡量通过互联网络的路由的效率?", "choices": [ "链路状态协议", "距离向量协议", "边缘网关协议", "内部网关协议" ], "answer": "B", "solution": "距离向量协议依赖于跳数,即源和目的地之间路由器的数量,来评估路由的效率。链路状态协议使用不同类型的计算,通常基于Dijkstra算法。术语“内部网关协议”和“边缘网关协议”并不是指计算路由效率的方法。", "topic": [] }, { "id": "Wired Network-1266", "type": 0, "question": "建立了一个由1个WLC和32个轻量级AP组成的集中式无线网络。以下哪个最能描述所得到的架构?", "choices": [ "WLC与32个AP之间有直接的第二层路径,且它们都使用相同的IP子网。", "WLC到32个AP之间有一个直接的第三层路径,所有设备都使用相同的IP子网。", "32个AP之间串联的CAPWAP隧道,一个CAPWAP隧道连接到WLC。", "32个CAPWAP隧道——每个AP与WLC之间有1个隧道,没有IP子网限制。" ], "answer": "D", "solution": "因为网络是由WLC和AP构建的,所以需要使用CAPWAP隧道。每个AP都需要连接到WLC的一个CAPWAP隧道,总共需要32个隧道。CAPWAP将无线流量封装在额外的IP头中,因此隧道数据包可以在Layer 3网络中进行路由。这意味着只要子网可达,AP和WLC可以驻留在任何IP子网上。对于AP和WLC生活在同一个Layer 2 VLAN或Layer 3 IP子网没有任何限制。", "topic": [ "无线基础设施" ] }, { "id": "Wired Network-1267", "type": 0, "question": "以下哪个描述正确地描述了通过捆绑控制器的所有分发系统端口形成的单个逻辑链接?", "choices": [ "物理学", "数字信号处理", "延迟", "全球企业挑战赛(GEC)" ], "answer": "C", "solution": "控制器使用链路聚合组(LAG)将多个端口捆绑在一起。", "topic": [ "构建无线局域网" ] }, { "id": "Wired Network-1268", "type": 0, "question": "以下哪个陈述关于CSMA/CD算法是正确的?", "choices": [ "该算法永远不会允许发生碰撞。", "碰撞可能会发生,但算法定义了计算机应该如何注意到碰撞以及如何恢复。", "该算法仅适用于在同一以太网上的两个设备。", "其他选项都不正确。" ], "answer": "B", "solution": "NIC(以及交换机端口)使用带有冲突检测(CSMA/CD)算法来实现半双工逻辑。CSMA/CD试图避免冲突,但它也会注意到冲突发生的情况,并制定规则,指导以太网节点何时停止发送、等待并稍后重试。", "topic": [ "以太网局域网的基础知识" ] }, { "id": "Wired Network-1269", "type": 0, "question": "您在家庭802.11n无线网络上遇到了性能不佳的问题。您住在一个大型公寓楼中,当您运行WiFi分析器时,您会看到许多其他附近的网络正在使用2.4 GHz频率上通常推荐的1、6和11频道。对于您的设备来说,使用5 GHz频率不是一个选项。您应该怎么做来提高网络的性能?", "choices": [ "将您的设备配置为使用频道10。", "将您的设备配置为使用频道9。", "将您的设备配置为使用频道5。", "将您的设备配置为使用第二信道。" ], "answer": "B", "solution": "无线局域网(WLAN)使用的2.4 GHz频段由20(或22)MHz宽的信道组成。然而,这些信道之间只相隔5 MHz,因此会出现信道重叠,导致干扰。信道1、6和11是唯一相隔足够远,避免与相邻信道重叠的信道。这就是为什么它们经常被推荐的原因。然而,在这种情况下,这些信道已经被其他网络占满。因此,您应该使用尽可能远离拥挤信道的信道。信道2、5和10都紧邻拥挤的信道,但信道9至少与最近的拥挤信道相隔两个信道。因此,您应该配置您的设备使用信道9。", "topic": [] }, { "id": "Wired Network-1270", "type": 0, "question": "选举根桥使用的是哪个主要属性?", "choices": [ "交换机端口优先级", "桥优先级", "交换机序列号", "路径成本" ], "answer": "B", "solution": "具有最低桥优先级的交换机被选为根交换机。如果存在平局,则使用桥MAC地址来选举根交换机。", "topic": [ "生成树协议" ] }, { "id": "Wired Network-1271", "type": 0, "question": "什么ASA配置可以将所有DNS流量通过SSL VPN隧道发送?", "choices": [ "分离隧道DNS启用。", "启用 DNS 隧道。", "DNS隧道完全启用。", "启用了分离隧道所有 DNS。" ], "answer": "D", "solution": "使用 **split-tunnel-all-dns enable** 可以将所有 DNS 流量发送到 SSL VPN 隧道中。", "topic": [ "远程访问 VPN 故障排除" ] }, { "id": "Wired Network-1272", "type": 0, "question": "真或假:如果路由协议是IGP而不是BGP,则用于匹配路由的扩展ACL的行为会发生变化。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "A", "solution": "IGP使用目的地字段选择最小的前缀长度,而BGP使用目的地匹配路由的子网掩码。", "topic": [ "路由映射和条件转发" ] }, { "id": "Wired Network-1273", "type": 0, "question": "什么是NAT-PT?", "choices": [ "网络地址转换-端口转换。将RFC 1918地址转换为公共IPv4地址。", "网络可寻址透明端口转换。将网络地址转换为端口。", "网络地址转换-协议转换。在IPv4和IPv6地址之间进行转换。", "下一地址转换-端口转换。" ], "answer": "C", "solution": "NAT-PT可以在IPv4和IPv6地址之间进行翻译。", "topic": [ "IPv6设计" ] }, { "id": "Wired Network-1274", "type": 0, "question": "网络连接似乎没有正常工作。您已经验证了电缆的两端都是好的。在操作系统中,您可以快速查看是否存在内置网卡驱动程序的问题。", "choices": [ "设备管理器", "程序和功能", "文件资源管理器选项", "易于访问" ], "answer": "A", "solution": "设备管理器快速查看通常足以解决内置设备的问题。如果设备驱动程序未安装,则在设备管理器中会看到黄色感叹号。程序和功能允许用户添加、删除或解决已安装程序的问题(选项将根据程序而变化),并添加尚未安装的Windows功能。文件资源管理器选项实用程序更改文件资源管理器的工作方式,例如显示隐藏文件或扩展名和其他视图选项。易于访问提供了与计算机交互的替代方式,以适应不同能力的用户。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1275", "type": 0, "question": "将交换机从一个位置移动到另一个位置时,以下哪种情况是常见的VTP灾难性问题?", "choices": [ "域证书必须在VTP服务器上删除并重新安装。", "移动的交换机向VTP服务器发送更新并删除VLAN。", "移动的开关中断了VTP。", "移动的开关导致了一个STP转发环路。" ], "answer": "B", "solution": "如果交换机的版本号高于当前的VTP域,当一个VLAN被删除时,它可以向VTP服务器发送更新并从VTP域中的所有交换机中删除该VLAN。", "topic": [ "VLAN干道和EtherChannel捆绑" ] }, { "id": "Wired Network-1276", "type": 0, "question": "服务器使用的著名传输控制协议(TCP)和用户数据报协议(UDP)端口的有效数字范围是多少?", "choices": [ "1024到49151。", "1到49151", "49152到65534", "1到1023" ], "answer": "D", "solution": "著名的TCP和UDP服务器端口号范围为1到1023。注册端口号范围为1024到49151。临时客户端端口号范围为49152到65535。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1277", "type": 0, "question": "您被要求配置一个客户端虚拟化解决方案,其中包含三个客户操作系统。每个操作系统都需要访问互联网。您应该如何以最具成本效益的方式配置解决方案?", "choices": [ "三个物理网卡", "一个物理网卡,三个虚拟网卡和一个虚拟交换机。", "一个物理网卡,一个虚拟网卡和三个虚拟交换机。", "一个物理网卡,三个虚拟网卡和三个虚拟交换机。" ], "answer": "B", "solution": "每个虚拟机将使用自己的虚拟网卡,因此您需要三个虚拟网卡。虚拟网卡将与由虚拟机监视程序管理的一个虚拟交换机通信。虚拟交换机将与主机系统上的一个物理网卡通信。", "topic": [ "网络服务、虚拟化和云计算" ] }, { "id": "Wired Network-1278", "type": 0, "question": "如果您连接到一个使用TLS加密连接的网站,那么这个流量会通过哪个端口传输?", "choices": [ "21", "80", "143", "443" ], "answer": "D", "solution": "为了安全地加密Web服务器和客户端之间的流量,可以使用超文本传输安全协议(HTTPS)。 HTTPS连接使用安全套接字层(SSL)或传输层安全性(TLS)进行保护。 HTTPS使用端口443。文件传输协议(FTP)使用端口21,超文本传输协议(HTTP)使用端口80,Internet邮件访问协议(IMAP)使用端口143。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1279", "type": 0, "question": "哪个DMVPN组件负责将隧道IP地址映射到外部IP地址?", "choices": [ "OSPF", "NHRP", "ISAKMP", "mGRE" ], "answer": "B", "solution": "下一跳解析协议(NHRP)负责映射集线器和分支路由器的内部和外部IP地址以进行地址解析。", "topic": [ "动态多点虚拟专用网络(DMVPN)" ] }, { "id": "Wired Network-1280", "type": 0, "question": "如果需要延长电缆距离超过100米,应该使用什么类型的电缆?", "choices": [ "五类网线", "第六类。", "光纤", "同轴的" ], "answer": "C", "solution": "标准将UTP电缆的长度限制在仅100米。不同类型的光纤具有不同的最大长度,但光纤是唯一一种可以延伸到100米以上的电缆类型。", "topic": [ "网络连接器和布线标准" ] }, { "id": "Wired Network-1281", "type": 0, "question": "当企业需要对应用程序中的所有组件进行完全控制时,哪种服务模型最好使用?", "choices": [ "平台即服务", "基础设施即服务", "软件即服务", "本地部署" ], "answer": "D", "solution": "\"On-premises\"是一种服务模式,其中企业拥有和管理基础设施。企业将采购运行服务所需的所有基础设施,然后完全管理、维护和运营它。在某些情况下,管理可能是外包的,但基础设施仍由企业采购和拥有。", "topic": [ "网络的目的是什么?" ] }, { "id": "Wired Network-1282", "type": 0, "question": "你正在两栋建筑物之间安装光纤电缆。为了安装电缆,你必须通过建筑物之间的导管将其引入,而且导管的接近并不容易。在引入电缆之前,你想确保它能正常工作。你应该使用哪种工具?", "choices": [ "电缆测试仪", "万用表", "环回插头", "音调发生器和探针" ], "answer": "A", "solution": "电缆测试仪是任何网络技术人员必不可少的工具。通常在安装电缆之前,您会使用电缆测试仪来确保其正常工作。当然,您也可以在电缆安装后进行测试。万用表用于测试电源和墙壁插座。回环插头用于测试网络接口卡,音频发生器和探针用于在其他电线中定位电线。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1283", "type": 0, "question": "OSPF的默认种子度量是什么?", "choices": [ "20", "100", "32,768", "infinity" ], "answer": "A", "solution": "OSPF的默认种子度量值为20。", "topic": [ "路由重分发" ] }, { "id": "Wired Network-1284", "type": 0, "question": "你已经构建了一个网络,所有的计算机都连接到一个交换机上。然后,在交换机上创建了虚拟局域网(VLAN),对应于公司的各个部门,并将每个用户工作站和部门服务器的交换机端口添加到相应的VLAN中。后来,用户报告说,虽然他们可以访问他们所在部门的服务器和其他用户在同一部门的工作站,但他们无法与其他部门的任何计算机通信。问题是什么,你必须做什么来纠正它?", "choices": [ "交换机上存在错误的VLAN配置。您必须重新创建所有VLAN,并为每个VLAN配置路由。", "VLAN仅限于数据链路层通信。要在VLAN之间启用通信,必须在网络上安装路由器或三层交换机,并配置它以在VLAN之间路由流量。", "VLAN使用不同的数据链路层协议。您必须配置VLAN使用相同的数据链路层协议,以便它们彼此通信。", "其中一个VLAN被配置为过滤所有其他VLAN的流量以提高安全性。您必须更改此一个VLAN上的过滤器。" ], "answer": "B", "solution": "VLAN是在交换机内定义的虚拟二层(数据链路层)局域网。与物理局域网一样,只有在同一VLAN中的设备才能相互通信,直到添加了层3设备(如路由器或层3交换机)到网络中。重新创建和重新配置VLAN将无法解决问题。流量过滤通常在路由器上实现,而不是交换机上。一旦路由器到位,VLAN就不必使用相同的数据链路协议来相互通信。", "topic": [] }, { "id": "Wired Network-1285", "type": 0, "question": "你如何创建一个浮动的静态路由?", "choices": [ "提供静态路由,其度量值高于路由首选源。", "提供一个静态路由,其度量值低于该路由首选源的度量值。", "提供静态路由,其AD高于路由首选源。", "提供一个静态路由,其AD值低于该路由首选源的AD值。" ], "answer": "C", "solution": "通过为静态路由提供比路由首选源更高的AD,可以创建一个浮动静态路由。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1286", "type": 0, "question": "以下哪些设备也可以被描述为多端口中继器?", "choices": [ "集线器", "网桥", "交换机", "路由器" ], "answer": "A", "solution": "一个中继器是一种物理层设备,它可以再生传入的信号并重新传输它们。集线器是一种中继器类型,它通过其多个端口之一接收数据,并通过其所有其他端口重新传输数据。桥接器和交换机是数据链路层设备,而路由器是网络层设备。这三个设备都不能被描述为多端口中继器。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1287", "type": 0, "question": "以下哪种广域网(WAN)服务通常使用一个被称为“云”的交换结构,这个术语在普及之前就已经存在了?", "choices": [ "自动取款机", "分数T-1", "同步光纤网络(SONET)", "帧中继。" ], "answer": "D", "solution": "Frame Relay是一种分组交换服务,它使用单个租用线路通过云端复用流量来替代多个租用线路。异步传输模式(ATM)使用交换结构,但不被称为“云”。分数T-1是连接两个点的租用线路的一部分,因此没有涉及交换和云。SONET是定义光纤连接的物理层标准;它不要求交换或使用术语“云”。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1288", "type": 0, "question": "假设一个802.11a设备远离发射器。随着信号强度的降低,设备或发射器可能会采取以下哪项措施来改善信号质量?", "choices": [ "聚合更多的频道", "增加更多的无线电链路。", "切换到更复杂的调制方案。", "切换到一个更简单的调制方案。" ], "answer": "D", "solution": "通过切换到较简单的调制方案,可以重复更多的数据流以克服日益恶化的射频条件。这可以通过DRS自动完成。", "topic": [ "现实世界中的射频信号" ] }, { "id": "Wired Network-1289", "type": 0, "question": "以下哪种WLC部署模型最适合拥有约4000个轻量级AP的大型企业?", "choices": [ "思科移动性表达。", "嵌入式的", "统一的", "基于云的" ], "answer": "C", "solution": "统一的WLC部署模型基于将WLC放置在中央位置,以支持大量的AP。", "topic": [ "分析思科无线网络架构" ] }, { "id": "Wired Network-1290", "type": 0, "question": "在 Cisco 交换机可以生成自签名证书之前,需要进行哪些配置?", "choices": [ "内部 CA 必须启用。", "必须配置IPv6地址。", "思科交换机无法生成自签名证书。", "一个域名必须被配置。" ], "answer": "D", "solution": "这句话的意思是:为了重定向HTTPS流量,Cisco交换机需要启用HTTPS服务器。在启用该服务之前,交换机需要一个证书。必须配置主机名和域名,以为交换机提供一个完全合格的域名。", "topic": [ "Web身份验证" ] }, { "id": "Wired Network-1291", "type": 0, "question": "以下哪种缓解技术不适用于服务器?", "choices": [ "角色分离", "应用访问控制列表(ACLs)", "文件完整性监控", "DHCP欺骗防范。" ], "answer": "D", "solution": "动态主机配置协议(DHCP)监听是一种在某些网络交换机中发现的功能,可以防止流氓DHCP服务器向客户端分配IP地址。它还可以检测DHCP释放或拒绝消息是否到达与DHCP事务发起端口不同的端口。其他选项都是适用于服务器的技术。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1292", "type": 0, "question": "以下哪种电缆类型用于粗型以太网网络段?", "choices": [ "RG-8是一种同轴电缆,常用于高频率的通信和广播应用。", "RG-58是一种常用的同轴电缆,常用于低频率的信号传输。", "RJ-45(Registered Jack-45)是一种常用于计算机网络中的连接器,用于连接以太网设备,包括计算机、路由器、交换机等。它通常有8个金属接触点,可以支持高速数据传输。", "RJ-11(Registered Jack-11)是一种电话线接口标准,常用于连接电话机和电话线路。" ], "answer": "A", "solution": "用于粗型以太网段的电缆类型是一种叫做RG-8的同轴电缆。RG-58专门用于细型以太网段。RJ-45是用于数据网络的双绞线电缆连接器类型。RJ-11是用于电信网络的双绞线电缆连接器类型。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1293", "type": 0, "question": "以下哪个关于路由度量的说法是正确的?", "choices": [ "如果度量标准是带宽,则选择带宽最低的路径。", "如果度量标准是带宽,则选择带宽最高的路径。", "如果度量标准是带宽,则使用带宽的最高总和来计算最高成本。", "如果度量标准是成本,那么选择成本最高的路径。" ], "answer": "B", "solution": "如果使用带宽,则选择带宽最高的路径。如果使用成本,则选择成本最低的路径。", "topic": [ "路由协议特性,RIP,EIGRP和IS-IS" ] }, { "id": "Wired Network-1294", "type": 0, "question": "你已经获得了一个Class B网络IP地址,用于配置你正在设计的新网络。以下哪个是IPv4 Class B网络应该使用的默认子网掩码?", "choices": [ "全网广播地址。", "子网掩码为255.255.255.0。", "子网掩码为255.255.0.0。", "子网掩码为255.0.0.0。" ], "answer": "C", "solution": "一个B类地址使用前两个八位作为网络标识符,这将产生一个二进制子网掩码为11111111 11111111 00000000 00000000。以十进制形式表示,子网掩码为255.255.0.0。255.0.0.0掩码用于A类地址,255.255.255.0掩码用于C类地址。255.255.255.255是当前网络的广播地址。", "topic": [] }, { "id": "Wired Network-1295", "type": 0, "question": "你用什么地址进行OSPFv2指定路由器(DR)的组播?", "choices": [ "224.0.0.1", "224.0.0.5", "224.0.0.6", "224.0.0.10" ], "answer": "C", "solution": "OSPFv2路由器使用224.0.0.6地址与DR进行通信。", "topic": [ "OSPF、BGP和路由操作" ] }, { "id": "Wired Network-1296", "type": 0, "question": "拉尔夫被客户聘请安装电缆以连接两个现有网络。这两个网络位于相距约1000英尺的不同建筑物中。电缆类型必须支持每秒1000兆位(Mbps)的千兆以太网数据速率,并提供高水平的抗电磁干扰(EMI)能力。您的客户希望最经济实惠的电缆解决方案来满足他们的需求。以下哪种电缆类型最能满足客户的需求?", "choices": [ "多模光纤电缆", "屏蔽双绞线(STP)电缆", "未屏蔽双绞线(UTP)电缆", "细同轴电缆", "单模光纤电缆" ], "answer": "A", "solution": "多模光纤电缆最符合客户的需求。光纤电缆支持所需的1000 Mbps数据传输速率,并可连接距离超过1000英尺的网络。光纤电缆对电磁干扰免疫。虽然多模和单模光纤都能满足公司的一般需求,但在这种情况下,多模光纤比单模光纤更便宜。双绞线(STP或UTP)满足数据传输速率和成本要求,但不支持超过100米的连接。细同轴电缆不支持数据传输速率或距离超过185米。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1297", "type": 0, "question": "DMVPN第2阶段和DMVPN第3阶段有什么区别?", "choices": [ "没有区别;它们都只支持集线器和星型解决方案。", "DMVPN第二阶段支持集线器-辐射型解决方案,而DMVPN第三阶段还支持辐射-辐射型。", "DMVPN第二阶段具有较小的路由表。", "DMVPN第三阶段具有较小的路由表。" ], "answer": "D", "solution": "第三阶段具有较小的路由表,因为它可以汇总路由。", "topic": [ "动态多点虚拟专用网络(DMVPN)" ] }, { "id": "Wired Network-1298", "type": 0, "question": "真或假:当ABR阻止类型5 LSA注入到NSSA时,OSPF非完全Stub区域(NSSA)会自动创建默认路由。\n\n真。当ABR阻止类型5 LSA注入到NSSA时,NSSA会自动创建一个默认路由。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "在OSPF NSSA配置中,默认路由被认为是可选的。", "topic": [ "高级开放最短路径优先协议(Advanced OSPF)。" ] }, { "id": "Wired Network-1299", "type": 0, "question": "以下哪个定义了应该对有趣的流量采取的行动?", "choices": [ "Filter", "Filter entry", "Subject", "Contract" ], "answer": "C", "solution": "一个过滤器匹配有趣的流量并由一系列过滤条目组成。一个主题确定对匹配的流量要采取的操作,合同是定向应用于EPG以确定合同适用的流量流。", "topic": [ "租户建筑模块" ] }, { "id": "Wired Network-1300", "type": 0, "question": "一个管理员已经配置了一个叶子接口,但它的状态显示为停用。这是什么意思?", "choices": [ "该端口安装了一个损坏的收发器。", "端口后面的服务器无法进行PXE引导,因此该端口已被关闭。", "该状态反映了访问策略已成功部署的事实。", "该端口已被管理员禁用。" ], "answer": "C", "solution": "当端口成功部署访问策略但没有与之相对应的EPG映射时,端口将处于停用状态,因此该端口不会主动转发流量。", "topic": [ "实施访问策略" ] }, { "id": "Wired Network-1301", "type": 0, "question": "以下哪种协议不用于存储区域网络(SAN)?", "choices": [ "iSCSI(Internet Small Computer System Interface)是一种基于IP网络的存储协议,用于在计算机之间传输数据块。它允许远程访问存储设备,使得多个计算机可以共享存储资源。", "FCoE", "网络电话", "光纤通道" ], "answer": "C", "solution": "网络语音传输协议(VoIP)是一种在IP网络上传输语音通信的技术;它不是一种SAN协议。Internet小型计算机系统接口(iSCSI)、以太网上的光纤通道(FCoE)和光纤通道都是SAN协议。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1302", "type": 0, "question": "目前已经通过的IEEE 802.11无线局域网标准支持的最大传输和接收天线数量是多少?", "choices": [ "2", "4", "8", "16" ], "answer": "C", "solution": "802.11ac标准通过在单个设备上使用多达八个天线来支持多输入多输出(MIMO)。802.11n是唯一支持MIMO的早期802.11标准,但它最多只能使用四个天线。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1303", "type": 0, "question": "什么类型的网络跨越多个建筑物或办公室,甚至可能穿越道路,但仅限于相对较小的地理区域?", "choices": [ "局域网", "广域网", "平移自适应网络(PAN)", "男人" ], "answer": "D", "solution": "比局域网更大但范围仍相对较小的网络被称为城域网(MAN)。城域网通常被定义为跨越城市或大型校园的网络。局域网代表本地区域网络。个人区域网络(PAN)是网络类型中最小的,广域网(WAN)是最大的网络类型,它可以连接遥远的城市甚至其他国家。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1304", "type": 0, "question": "在运行于2.4 GHz的IEEE 802.11b/g/n无线网络中,使用多个接入点(APs)的传统最佳实践是使用1、6、11频道,不配置使用相同频道的相邻AP。以下哪个是这样做的真正原因?", "choices": [ "频道1、6和11是唯一没有重叠频率的频道。", "信道1、6和11比其他信道具有更大的带宽。", "信道1、6和11的覆盖范围比其他信道更大。", "通常情况下,无线设备的默认设置为频道1、6和11。" ], "answer": "A", "solution": "无线局域网规定要求在2.4 GHz频段使用22 MHz间隔为5 MHz的信道,这意味着它们会重叠。信道1、6和11是唯一三个彼此距离足够远而不会重叠的信道。因此,它们不会相互干扰。信道1、6和11在带宽或传输范围方面与其他信道没有区别。每个无线设备只能设置使用一个信道。因此,信道1、6和11不能都是默认设置。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1305", "type": 0, "question": "以下哪个参数被测量作为确定AP覆盖单元边界的主要标准?", "choices": [ "接收机灵敏度水平", "噪声底噪", "接收信号强度指示(RSSI)", "信噪比" ], "answer": "C", "solution": "AP的信号强度是根据客户端设备的接收信号强度指示器(RSSI)进行测量,并与设计标准进行比较。然后,通过周围RSSI等于设计阈值的点来定义小区边界。", "topic": [ "应用无线设计要求" ] }, { "id": "Wired Network-1306", "type": 0, "question": "哪个OSPFv2命令可以使你验证hello间隔和dead间隔?", "choices": [ "显示IP协议。", "显示OSPF接口信息。", "显示OSPF邻居的IP地址。", "显示IP OSPF数据库。" ], "answer": "B", "solution": "使用命令 **show ip ospf interface** 来验证 hello 时间间隔和 dead 时间间隔。", "topic": [ "OSPFv2故障排除" ] }, { "id": "Wired Network-1307", "type": 0, "question": "一个偶极天线连接到一个发射器。您想利用天线的定向特性。根据天线的辐射图案,如果您将天线定向,使其圆柱形状直接指向远处的接收器,会发生什么?", "choices": [ "接收器将会接收到更强的信号。", "接收器会接收到一个较弱的信号。", "天线是全向的,因此方向不会影响。", "除非接收器的偶极子天线也直接对准发射机,否则这是毫无意义的。" ], "answer": "B", "solution": "将偶极子定向,使其圆柱指向接收器,可能会导致接收到的信号变弱。这是因为甜甜圈形状的辐射图案向远离天线长度的所有方向扩展。将天线指向接收器,信号最强的部分已经旋转离开接收器。辐射图案沿天线长度最弱。", "topic": [ "理解天线" ] }, { "id": "Wired Network-1308", "type": 0, "question": "当你与客户会面收集有关即将进行的无线项目的信息时,以下哪一项将对你准备进行现场勘测最有帮助?", "choices": [ "项目的范围", "需要无线服务的建筑和位置列表。", "需要无线服务的建筑物的楼层平面图", "有线网络基础设施的图示" ], "answer": "C", "solution": "楼层平面图将非常有帮助,因为您可以直接将其导入到现场勘测或无线规划工具中。然后,您将能够准确地定位AP。", "topic": [ "无线设计要求" ] }, { "id": "Wired Network-1309", "type": 0, "question": "在Cisco Unified CM中,反向代理使用哪两个端口允许入站经过身份验证的HTTPS请求进行TFTP文件下载和SOAP API请求?", "choices": [ "TCP 2222和TCP 8443", "TCP 6970和TCP 8443。", "TCP 7400和TCP 8443。", "TCP 5222和TCP 8443。" ], "answer": "B", "solution": "Cisco MRA反向代理设置提供了一种机制,支持可视化语音邮件访问、联系人照片检索、Cisco Jabber自定义选项卡和其他数据应用程序。HTTPS反向代理是由Cisco Expressway-E提供的功能,使用TCP 8443端口处理HTTPS流量。初始MRA配置允许入站经过身份验证的HTTPS请求访问以下目标。", "topic": [ "配置MRA解决方案" ] }, { "id": "Wired Network-1310", "type": 0, "question": "在一个/25网络中,有多少个主机IPv4地址是可能的?", "choices": [ "126", "128", "254", "192" ], "answer": "A", "solution": "一个/25网络有7位保留用于主机寻址。可以按照以下方式找到主机数量:2^7 - 2 = 126。需要删除两个地址,因为它们用于网络ID和广播地址。", "topic": [ "网络协议和网络设备基础知识" ] }, { "id": "Wired Network-1311", "type": 0, "question": "以下哪些是AP可以了解可能加入的WLC的方式?(选择所有适用项。)", "choices": [ "已准备好的条目", "从先前连接的控制器中列出。", "动态主机配置协议(DHCP)", "子网广播。", "DNS(Domain Name System)域名系统。", "所有这些" ], "answer": "F", "solution": "一个接入点可以从所有列出的方法中学习控制器地址。", "topic": [ "理解控制器发现" ] }, { "id": "Wired Network-1312", "type": 0, "question": "在哪个故障排除步骤中会创建故障工单?", "choices": [ "建立一个可能原因的理论。", "验证整个系统的功能性,并在适用的情况下实施预防措施。", "实施解决方案或必要时升级。", "测试该理论以确定原因。", "识别问题", "记录发现、行动和结果。", "制定解决问题的行动计划并确定可能的影响。" ], "answer": "E", "solution": "故障排除的第一步是识别问题并创建故障工单。在故障工单被优先处理后,您可以完成其他故障排除步骤。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1313", "type": 0, "question": "在[第二层漫游](gloss01.html#gloss01_104)中,用什么机制在两个控制器之间隧道化客户端数据?", "choices": [ "GRE隧道", "EoIP隧道", "CAPWAP隧道", "这些答案都不正确。" ], "answer": "D", "solution": "在第二层漫游中,客户端的IP子网在移动控制器之间不会改变。因此,无需在控制器之间隧道传输客户端数据;相反,客户端只需移交给新的控制器即可。", "topic": [ "了解漫游" ] }, { "id": "Wired Network-1314", "type": 0, "question": "用户在IT帮助台呼叫Alice,并报告说她在访问本地服务器和互联网网站时遇到了间歇性问题。以下哪些潜在问题是Alice可以立即排除的?", "choices": [ "重复的媒体访问控制(MAC)地址", "重复的Internet协议(IP)地址", "故障的路由器", "故障的域名系统(DNS)服务器" ], "answer": "B", "solution": "操作系统会立即检测到重复的IP地址,并在涉及的计算机上显示错误消息或通知。因此,如果另一个系统正在使用她的IP地址,有问题的用户将立即得到通知。所有其他选项都是可能导致问题的原因,这些原因更难以进行故障排除。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1315", "type": 0, "question": "在租户管理员将一个EPG映射到端口和封装之前,他或她应该首先将EPG绑定到一个或多个_________。", "choices": [ "端点", "VRF实例", "AAEPs", "域名" ], "answer": "D", "solution": "想要将一个EPG映射到端口和封装的租户管理员应该首先将EPG绑定到一个域。租户管理员的域关联作为授权,指定的EPG内的端点确实是通过域指定的方法连接到网络的。绑定到EPG的域还指示哪些VLAN ID是可接受的封装方式。", "topic": [ "访问策略" ] }, { "id": "Wired Network-1316", "type": 0, "question": "以下哪个是第二层广播?", "choices": [ "FF.FF.FF.EE.EE.EE", "FF.FF.FF.FF.FF.FF", "255.255.255.255", "255.0.0.0" ], "answer": "B", "solution": "第二层广播也被称为MAC地址广播,它是十六进制的,格式为FF.FF.FF.FF.FF.FF。", "topic": [ "IP地址分配" ] }, { "id": "Wired Network-1317", "type": 0, "question": "AMP适配器对于TC-NAC需要哪种代理?", "choices": [ "AMP适配器不支持代理进行互联网访问。", "AMP适配器需要使用Socks代理。", "它必须是思科Web安全设备(WSA)。", "任何标准的HTTP/HTTPS网络代理都可以使用。" ], "answer": "B", "solution": "AMP适配器不需要代理,但需要能够访问互联网上的AMP云。如果需要Web代理来访问互联网,则AMP适配器需要使用Socks代理,而不是HTTP / HTTPS代理。 Cisco的WSA确实提供Socks代理功能,但任何Socks代理都可以使用,而不仅仅是WSA代理。", "topic": [ "威胁中心网络准入控制(NAC)" ] }, { "id": "Wired Network-1318", "type": 0, "question": "以下哪种协议使用巨型帧来提高存储区域网络的性能水平?", "choices": [ "以太网", "IP", "光纤通道", "iSCSI(Internet Small Computer System Interface)是一种基于IP网络的存储协议,用于在计算机之间传输数据块。它允许远程访问存储设备,使得多个计算机可以共享存储资源。" ], "answer": "A", "solution": "以太网使用巨型帧来更有效地传输大量数据。在分组交换网络中,每个数据包都需要头数据,这会增加网络的传输开销。将大文件分成许多小数据包可能会导致网络效率受损。以太网通常将帧大小限制为1500字节,但巨型帧使以太网系统能够创建高达9000字节的帧。帧是数据链路层协议数据单元,因此在创建它们时不涉及网络层的Internet协议(IP)。光纤通道和iSCSI是专门的存储区域网络协议,不使用巨型帧。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1319", "type": 0, "question": "你正在排除一个间歇性故障的Cat 6网络连接。你怀疑连接中有短路。你可以使用哪个工具来确定这一点?", "choices": [ "音调发生器和探针", "环回插头", "电缆测试仪", "压线钳" ], "answer": "C", "solution": "一般来说,电缆测试仪使用灯光来指示电缆是否正常工作,如果有短路,则两根导线的指示灯会同时亮起。电缆测试仪的价格从几美元的基本款到数百美元的高级款不等。其中一些更好的电缆测试仪可以告诉您距离您有多少英尺的电缆问题。音调发生器和探针用于跟踪电线或从一组电线中找到特定的电线,回环插头用于测试网络接口卡(NIC),压线钳将网络线连接到其终端,通常是RJ45插头。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1320", "type": 0, "question": "媒体访问控制(MAC)地址过滤如何增加无线局域网(WLAN)的安全性?", "choices": [ "通过防止接入点广播它们的存在", "通过允许特定MAC地址发送或接收的流量通过互联网防火墙。", "通过在网络数据包中替换未注册的MAC地址为已注册的MAC地址", "通过允许只有指定MAC地址的设备连接到接入点", "通过将特定的无线客户端与网络的其余部分隔离开来。" ], "answer": "D", "solution": "MAC地址过滤使管理员能够配置接入点,仅允许具有特定地址的设备连接;所有其他流量都将被拒绝。接入点使用服务集标识符(SSID)广播其存在,而不是MAC地址。MAC地址过滤在接入点中实现时可保护WLAN,而不是防火墙。MAC地址过滤不需要修改网络数据包中的地址。MAC过滤不会将客户端与网络隔离。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1321", "type": 0, "question": "以下哪个关于IPv6地址的陈述是正确的?", "choices": [ "它们不能与IPv4一起使用。", "它们被所有路由器支持。", "它们使用128位表示寻址。", "它们需要光纤连接。" ], "answer": "C", "solution": "关于IPv6唯一正确的陈述是它使用128位地址。相比之下,IPv4使用32位地址。", "topic": [] }, { "id": "Wired Network-1322", "type": 0, "question": "你什么时候会在交换机上配置VTP?", "choices": [ "当你的网络中连接了集线器时", "当交换机之间存在冗余链路时", "当你有多个位于多个VLAN中的主机,并且想要在主机之间共享所有数据而不使用路由器时", "当你有多个交换机和多个VLAN,并且想要将一个交换机的VLAN数据库共享给所有其他交换机时" ], "answer": "D", "solution": "虚拟中继协议(VTP)是思科专有的一种方法,可以将单个VLAN数据库广告传递到网络中的所有其他交换机,从而在较大的网络中实现简化的VLAN管理。顺便说一下,选项C不是可能的配置;我是编造的。", "topic": [ "交换和虚拟局域网" ] }, { "id": "Wired Network-1323", "type": 0, "question": "哪些路由与以下前缀列表匹配:**ip前缀列表ENARSI seq 35 deny 192.168.0.0/20 ge 24 le 28**?", "choices": [ "具有地址从192.168.0.0到192.168.15.255的路由,子网掩码为24到28。", "子网掩码大于24且小于28的192.168.0.0/20子网内的路由。", "具有子网ID和掩码为192.168.0.0/20的路由。", "具有地址从192.168.0.0到192.168.15.255的路由,子网掩码为24或28。" ], "answer": "A", "solution": "具有地址从192.168.0.0到192.168.15.255的路由,子网掩码为24到28,将匹配以下前缀列表:**ip prefix-list ENARSI seq 35 deny 192.168.0.0/20 ge 24 le 28。", "topic": [ "故障排除ACL和前缀列表。" ] }, { "id": "Wired Network-1324", "type": 0, "question": "控制平面策略(CoPP)保护什么?", "choices": [ "CPU对抗DDoS攻击。", "内存泄漏对抗内存泄漏。", "NX-OS防止未经授权的访问。", "以上所有选项。" ], "answer": "A", "solution": "思科NX-OS设备提供CoPP功能,以防止拒绝服务(DoS)攻击影响性能。此类攻击通常涉及发送到监控模块或CPU本身的高速流量,可能是无意或恶意的。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1325", "type": 0, "question": "哪个命令用于识别应用程序和操作系统正在使用的端口?", "choices": [ "网络状态(netstat)", "IP配置", "路径ping", "`nslookup`(全称为 Name Server Lookup)是一个用于查询域名系统(DNS)的命令行工具,可以用来获取特定主机名或 IP 地址的相关信息,例如域名的 IP 地址、域名服务器的名称等。" ], "answer": "A", "solution": "`netstat` 命令可用于查看操作系统中正在使用的端口以及与网络通信的网络应用程序。`ipconfig` 命令允许您查看操作系统的当前 IP 地址和 DNS 信息。`pathping` 命令允许您查看到目标 IP 地址的路径上的数据包丢失情况。`nslookup` 命令用于解析 DNS 记录。", "topic": [ "Windows 管理" ] }, { "id": "Wired Network-1326", "type": 0, "question": "远程桌面协议(RDP)是为以下哪个终端仿真程序而创建的?", "choices": [ "Windows 终端服务", "虚拟网络计算机(Virtual Network Computing,VNC)", "Citrix WinFrame(思杰系统)", "远程登录协议(Telnet)" ], "answer": "A", "solution": "RDP是为Windows终端服务创建的客户端/服务器协议,现在被称为远程桌面服务。它不与VNC、Citrix产品或Telnet一起使用。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1327", "type": 0, "question": "CUBE 在尝试匹配入站拨号对等体之前进行了哪种过滤操作?", "choices": [ "URI过滤", "VRF过滤", "号码过滤", "媒体能力过滤", "呼叫号码过滤" ], "answer": "B", "solution": "CUBE根据入口接口上的VRF实例过滤入站拨号对等体。", "topic": [ "CUBE呼叫路由和数字操作" ] }, { "id": "Wired Network-1328", "type": 0, "question": "当一个ACL被应用到一个接口上,但是数据包不匹配ACL中的任何条目时,这个数据包会发生什么?", "choices": [ "已转发。", "它被淹了。", "它被丢了。", "它是有缓冲的。" ], "answer": "C", "solution": "当应用了一个ACL到一个接口上,但数据包不匹配ACL中的任何条目时,流量会被丢弃。", "topic": [ "故障排除ACL和前缀列表。" ] }, { "id": "Wired Network-1329", "type": 0, "question": "思科综合服务路由器设备能够提供什么?", "choices": [ "站点到站点的VPN功能", "远程访问能力", "既有站点到站点的能力,也有远程访问的能力。", "思科路由器不提供VPN服务。" ], "answer": "C", "solution": "思科综合服务路由器设备可以根据型号、许可证和配置方式,提供站点到站点VPN功能和远程访问VPN功能。", "topic": [ "虚拟专用网络(VPN)介绍" ] }, { "id": "Wired Network-1330", "type": 0, "question": "以下哪个不是第一跳冗余协议(FHRP)?", "choices": [ "CARP", "VRRP", "HSRP", "RARP" ], "answer": "D", "solution": "FHRP提供了一个容错的默认网关,当路由器故障时,自动切换到备用路由器地址。反向地址解析协议(RARP)是一种已废弃的Internet协议(IP)地址分配协议,它不是FHRP。常见的地址冗余协议(CARP)、虚拟路由器冗余协议(VRRP)和热备份路由器协议(HSRP)都是FHRP。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1331", "type": 0, "question": "网络在发生故障时自动切换的能力是什么可用性组件的定义?", "choices": [ "可靠性", "弹性", "冗余", "路由故障转移" ], "answer": "B", "solution": "弹性是指网络在发生故障时自动切换的能力。可靠性最好定义为网络数据在正确的时间内从源位置到目标位置传输的程度,以便正确利用。冗余是指具有执行相同功能/角色的多个资源的概念,以便如果其中一个失败,另一个将接管生产流量而几乎不会对其产生影响。路由故障转移是指路由协议和配置在架构内在不同的路由路径之间故障转移流量的能力。", "topic": [ "网络设计" ] }, { "id": "Wired Network-1332", "type": 0, "question": "在中心路由器上,哪个命令可以让你确定IKEv2进程是否已经完成?", "choices": [ "show crypto ikev2 authorization policy", "show crypto ikev2 profile", "show crypto ikev2 sa", "show ip interface brief" ], "answer": "C", "solution": "\"show crypto ikev2 sa\" 命令可以显示 IKEv2 进程是否已完成。", "topic": [ "FlexVPN配置和故障排除" ] }, { "id": "Wired Network-1333", "type": 0, "question": "形成Cisco APIC集群所需的最少Cisco APIC控制器数量是多少?", "choices": [ "两个控制器,N+1冗余。", "三个控制器,N+2冗余。", "一个控制器", "三个控制器,3N冗余。" ], "answer": "B", "solution": "APIC管理整个网络基础架构。建议在一个集群中至少有三个APIC控制器(N+2冗余)。", "topic": [ "描述思科应用中心基础设施(Cisco Application Centric Infrastructure,简称ACI)" ] }, { "id": "Wired Network-1334", "type": 0, "question": "Alice是Adatum Corp.的新员工,当她询问如何为她的笔记本电脑提供无线网络访问时,她被给予了一个服务集标识符(SSID)和一个WiFi Protected Access II(WPA2)密码。稍后,在午餐室,当她尝试将笔记本电脑连接到网络时,她无法在可用网络列表中看到她所得到的SSID,尽管她可以看到其他网络。Alice应该接下来怎么做来尝试解决这个问题?", "choices": [ "输入WPA2密码短语。", "手动输入SSID。", "靠近无线接入点(WAP)。", "远离午餐室的微波炉。" ], "answer": "B", "solution": "有可能WAP已经被配置为不广播网络的SSID作为安全措施,因此Alice应该首先尝试手动输入SSID来访问它。在连接到SSID之前,她将无法输入WPA2密码。将笔记本电脑靠近WAP或远离可能的电磁干扰源可能是解决问题的方法,但它们不应该是Alice尝试的第一件事。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1335", "type": 0, "question": "Alice的网络自从公司搬进新楼之后就一直出现间歇性的服务减速和故障。她尝试了她能想到的所有故障排除程序,但没有能确定原因。一个特定的用户希望成为引起注意的人,每次遇到问题都会打电话给Alice。一天,当她在数据中心工作时,Alice注意到每次她听到额外的嗡嗡声时,用户都会给她打电话。在检查走廊上的门后,Alice意识到包含交换机的机架就在建筑物的电梯机房旁边。以下哪种情况可能导致网络通信问题?", "choices": [ "电磁干扰", "下一个", "FEXT(Far End Cross Talk)远端串扰。", "衰减" ], "answer": "A", "solution": "办公环境中的电梯机械、荧光灯和其他电气设备会产生磁场,导致电磁干扰(EMI)。当铜基数据电缆位于这样的设备附近时,磁场可以在电缆上产生电流,干扰网络设备交换的信号。如果网络用户每次电梯机械开启时都遇到问题,EMI很可能是问题的原因。近端串扰(NEXT)、远端串扰(FEXT)和衰减都可能导致间歇性的网络通信问题,但它们不可能是电梯机械引起的。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1336", "type": 0, "question": "预算和人员限制是什么的例子?", "choices": [ "组织需求", "组织约束。", "技术目标", "技术限制" ], "answer": "B", "solution": "这些是组织约束的例子。", "topic": [ "网络设计方法论" ] }, { "id": "Wired Network-1337", "type": 0, "question": "默认情况下,启用端口安全的交换机端口可以学习多少个MAC地址?", "choices": [ "八", "四", "两个", "一个" ], "answer": "D", "solution": "当启用端口安全时,默认允许的最大MAC地址数量为1。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1338", "type": 0, "question": "Ed正在检查最近安装在他的网络上的一些新千兆以太网系统的电缆走线。在查看补丁面板连接时,他注意到它们使用T568B引脚分配标准进行布线。然而,当他检查墙板连接时,他发现它们使用T568A标准进行布线。Ed解决这个问题的最佳方法是什么?", "choices": [ "打电话给承包商,使用T568B标准重新布线所有的墙板连接器。", "为所有从配线架到交换机的连接购买交叉连接补丁线。", "配置交换机,使连接到补丁面板的所有端口都不使用交叉线路。", "不需要做任何事情。电缆线路将按原样正常运行。" ], "answer": "D", "solution": "电缆传输通常是“直通”的,也就是说,在一端连接传输引脚,在另一端连接传输引脚。交叉线路电路应该由交换机实现,将传输引脚连接到接收引脚。在一端使用T568A,在另一端使用T568B连接的电缆传输会在电缆传输中创建一个交叉线路电路。曾经,这将是一个严重的问题,但今天的交换机会自动配置所需的交叉线路电路,因此它们会自动调整以适应电缆传输。所有其他选项都可以解决问题,但不做任何事情肯定是最简单和最好的选择。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1339", "type": 0, "question": "以下哪个不是真的?", "choices": [ "可能需要使用VAM来启用FlexVPN。", "所有思科路由器都支持FlexVPN,需要进行某种类型的配置、许可证或硬件支持。", "有时需要额外的硬件支持,例如集成服务路由器适配器,才能使路由器支持FlexVPN。", "一些思科路由器需要特殊软件来支持FlexVPN。" ], "answer": "B", "solution": "一些思科路由器不支持FlexVPN。", "topic": [ "远程访问虚拟专用网络(VPN)" ] }, { "id": "Wired Network-1340", "type": 0, "question": "在哪种情况下,给定RTP流的SSRC值可能会发生变化?", "choices": [ "当 RTP 序列号字段发生翻转时", "当标记位字段设置为False时", "当RTP传输地址发生变化时", "每15分钟" ], "answer": "C", "solution": "当RTP网络地址和端口对发生变化时,给定RTP流的SSRC值可能会改变。其他情况对SSRC值没有影响。", "topic": [ "VoIP协议:RTP、RTCP和DTMF中继" ] }, { "id": "Wired Network-1341", "type": 0, "question": "你正在配置手机下载和上传电子邮件。你正在配置手机使用哪种类型的服务器?", "choices": [ "网络服务器", "认证服务器", "邮件服务器", "FTP服务器" ], "answer": "C", "solution": "邮件服务器用于发送、接收、有时还存储和管理电子邮件。它们在25、110和143端口上运行。通常需要使用服务器的名称或IP地址以及正确的协议或端口来配置设备以发送和接收电子邮件。Web服务器通过互联网提供网页。认证服务器在允许访问资源之前验证身份,FTP服务器用于快速定位、下载和上传文件。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1342", "type": 0, "question": "什么术语描述了可以通过互联网传递语音通信的技术?", "choices": [ "抖动", "运行时间", "网络语音传输协议", "以上选项均不正确。" ], "answer": "C", "solution": "“网络语音传输协议(VoIP)”是一个通用术语,描述了几种能够通过互联网或其他数据网络传递语音通信的技术。", "topic": [ "数据中心架构和云概念" ] }, { "id": "Wired Network-1343", "type": 0, "question": "以下哪个可能是网络接口适配器的有效MAC地址?", "choices": [ "10.124.25.43", "FF:FF:FF:FF:FF:FF", "00:1A:6B:31:9A:4E", "03:AE:16:3H:5B:11", "fe80::89a5:9e4d:a9d0:9ed7" ], "answer": "C", "solution": "媒体访问控制(MAC)地址是一个由冒号分隔的6字节十六进制值,例如00:1A:6B:31:9A:4E。选项A,10.124.25.43,是全部十进制并使用句点的IPv4地址。选项B,FF:FF:FF:FF:FF:FF,是一个有效的MAC地址,但此值保留用于广播地址。选项D,03:AE:16:3H:5B:11,不是一个有效的十六进制地址,应该只包含数字和字母A到F。选项E,fe80::89a5:9e4d:a9d0:9ed7,对于MAC地址来说太长了;这是一个有效的IPv6地址。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1344", "type": 0, "question": "以下哪种数据中心灾难恢复机制实施起来最便宜?", "choices": [ "一个冷备份站点。", "一个温暖的站点", "一个热站点", "一个云站点" ], "answer": "D", "solution": "实施成本最低的是云站点。冷备、温备和热备份站点在其安装的硬件和软件方面有所不同,但它们都需要维护一个新数据中心的设施。冷备份站点只是一个远程位置的空间。在网络可以恢复之前,必须采购和安装硬件和软件。因此,它是冷备、温备和热备选项中最便宜的,需要最长的时间。温备份站点已经安装了硬件,必须进行配置。热备份站点已经安装、配置好了所有必要的硬件,可以在灾难发生时立即使用。温备份站点比冷备份站点更昂贵,而热备份站点是最昂贵的,需要最少的时间才能投入使用。云站点是由云服务提供商维护的虚拟设施。云站点不需要物理空间或物理硬件,因此它是最便宜的。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1345", "type": 0, "question": "当部署物理基础设施时,需要注意的设计考虑因素是:新的Wi-Fi 6(IEEE 802.11ax)接入点初始部署时需要更多的电源和网络接口,因此需要确保建筑物的电力和网络基础设施能够满足这些需求。", "choices": [ "安装新的AP以反映802.11ax射频辐射图案的变化。", "需要增加功率。开关需要升级以支持UPOE或UPOE+。", "由于性能和覆盖模式的改进,所需的Wi-Fi 6 AP数量将少于旧的AP。", "连接到AP的交换机可能需要升级以支持mGig。" ], "answer": "D", "solution": "Wi-Fi 6 / 802.11ax 很可能会产生比旧一代的接入点更多的流量,超出每个接入点 1Gbps 的吞吐量。因此,交换机需要升级以支持 mGig 提供的更高数据速率。", "topic": [ "物理和逻辑基础设施要求" ] }, { "id": "Wired Network-1346", "type": 0, "question": "如果网络设计需要最灵活的设计,以下哪种接入-分发连接模型是最佳的?", "choices": [ "基于多层次的STP", "交换机集群化", "路由访问", "第二层接入" ], "answer": "B", "solution": "解释:交换机集群是最灵活的接入-分发连接模型。", "topic": [ "可扩展的企业校园架构设计" ] }, { "id": "Wired Network-1347", "type": 0, "question": "当您在Cisco WLC上配置移动性组时,同一移动性域中可以有多少个控制器?", "choices": [ "10", "24", "50", "72" ], "answer": "D", "solution": "一个单一的移动域最多可以包含三个移动组(每个组最多可达24个控制器),或者在移动域中总共最多可达72个控制器。", "topic": [ "为客户的移动性设计" ] }, { "id": "Wired Network-1348", "type": 0, "question": "你会使用什么命令来定义一个认证列表,让用户从用户执行模式切换到特权执行模式?", "choices": [ "aaa authentication login", "aaa authentication enable", "aaa authentication password-promp", "aaa authentication local-override" ], "answer": "B", "solution": "\"aaa authentication enable\"命令定义了从用户特权模式到特权模式进行身份验证所使用的方法。", "topic": [ "使用Cisco IOS配置设备管理AAA" ] }, { "id": "Wired Network-1349", "type": 0, "question": "在双绞线网络中,以下哪种干扰类型是由电缆内部的线对扭曲设计来防止的?", "choices": [ "相声", "电磁干扰", "衰减", "延迟" ], "answer": "A", "solution": "串扰是指在铜基网络上,当一个信号在一个导体上传输时,会泄漏到附近的另一个导体上,从而产生的一种干扰类型。扭绞线缆内部有八个或更多的导体压缩在一起,特别容易受到串扰的影响。扭转每个单独的导线对可以减少串扰的程度,使其达到可管理的水平。但是,扭转导线对并不能防止信号受到电磁干扰(EMI)或衰减的影响。延迟是衡量信号从源到目的地所需时间的一种度量。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1350", "type": 0, "question": "你正在配置一个连接有DHCP和DNS服务器的网络上的Windows客户端计算机。该计算机将从哪里获取其IP地址和子网掩码?", "choices": [ "你需要手动在Windows设置中选择个性化来配置它们。", "你需要手动在Windows设置中配置它们,选择“网络和Internet”。", "它将自动从DHCP服务器获取它们。", "它将自动从DNS服务器获取它们。" ], "answer": "C", "solution": "获取IP地址的默认设置是自动的,这意味着计算机将寻找DHCP服务器来分配IP地址和子网掩码。不需要手动配置,但在Windows 10中,您可以按照以下步骤验证连接是否设置为自动获取IP地址,如图所示:打开Windows设置,然后单击网络和Internet。选择更改适配器选项,右键单击相关的网络连接。然后选择属性,单击Internet协议版本4(TCP / IPv4),然后单击属性。IPv6的过程相同,只是您需要选择IPv6而不是IPv4。这也可以通过控制面板完成,方法是单击网络和共享中心而不是网络和Internet,然后下一步相同。在Windows 11中,选择Windows设置,然后选择网络和Internet,在页面顶部单击活动网络连接的属性。这将带您进入网络的配置页面,您可以确保IP分配设置为自动(DHCP)。Windows 11的控制面板选项与Windows 10相同。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1351", "type": 0, "question": "您正在安装支持数字有线电视信号的网络电缆。您应该安装什么类型的电缆?", "choices": [ "RG-6是一种同轴电缆,常用于传输高频率信号,如电视信号和互联网信号。", "RG-8是一种同轴电缆。", "RG-58 A/U是一种同轴电缆。", "RG-59是一种同轴电缆,常用于视频信号传输。" ], "answer": "A", "solution": "有线电视安装通常使用RG-6电缆,但也可能使用RG-59电缆。RG-6电缆略微更厚,可以传输更长的距离,并支持数字信号。RG-59仅适用于模拟电视信号,并用于一些安全摄像头。", "topic": [ "硬件" ] }, { "id": "Wired Network-1352", "type": 0, "question": "以下哪个通配符掩码最适用于匹配子网10.1.128.0,掩码为255.255.240.0中的所有IP数据包?", "choices": [ "0.0.0.0", "0.0.0.31", "0.0.0.240", "0.0.0.255", "0.0.15.255", "0.0.248.255" ], "answer": "E", "solution": "0.0.15.255匹配所有具有相同前20位的数据包。当您想匹配子网的子网部分包含前20位时,这非常有用,就像这种情况一样。", "topic": [ "基本IPv4访问控制列表" ] }, { "id": "Wired Network-1353", "type": 0, "question": "以下哪个描述了BGP分裂视野规则?", "choices": [ "一个收到来自iBGP对等点的BGP路由的BGP路由器不应该将该路由广告给另一个也是iBGP对等点的路由器。", "一个收到来自eBGP对等点的BGP路由的路由器不应该将该路由广告给另一个iBGP对等点路由器。", "一个收到来自eBGP对等点的BGP路由的BGP路由器不应该将该路由广告给另一个也是eBGP对等点的路由器。", "一个BGP路由器从iBGP对等体接收到BGP路由时,应该丢弃该路由。" ], "answer": "A", "solution": "BGP分裂视野规则指出,一个BGP路由器从iBGP对等体接收到BGP路由后,不应将该路由广告给另一个iBGP对等体路由器。", "topic": [ "BGP故障排除" ] }, { "id": "Wired Network-1354", "type": 0, "question": "以下哪个最能描述建筑材料对射频信号穿过墙壁的影响?", "choices": [ "反思", "折射", "衍射。", "吸收", "多路径" ], "answer": "D", "solution": "当信号穿过墙壁时,建筑材料会吸收一些射频能量,从而减少信号强度。", "topic": [ "现实世界中的射频信号" ] }, { "id": "Wired Network-1355", "type": 0, "question": "哪个答案描述了LAN交换机如何动态选择初始功率级别来应用于带有PoE的UTP电缆?", "choices": [ "Autonegotiation", "CDP", "LLDP", "Preconfigured values" ], "answer": "A", "solution": "首先,交换机不会根据配置的值提供电源,以避免向不支持接收电源电路的设备提供电源的不幸情况,因为这样做很可能会损坏连接设备上的电子设备。", "topic": [ "局域网架构" ] }, { "id": "Wired Network-1356", "type": 0, "question": "IPv6使用的地址位数比IPv4多多少位?", "choices": [ "32", "64", "96", "128" ], "answer": "C", "solution": "IPv6使用128位地址,IPv4使用32位地址。它们之间的差异是96位。", "topic": [ "IPv6设计" ] }, { "id": "Wired Network-1357", "type": 0, "question": "以下哪些步骤可以确保所有外部流量通过防火墙正确地定向到您的网站计算机?", "choices": [ "配置端口转发。", "在例外中列出本地网站的IP地址。", "配置网络地址转换(NAT)。", "适当配置所有内部流量。" ], "answer": "A", "solution": "你的组织在局域网上运行一个Web服务器。你的工作是确保所有试图访问Web服务器的来自互联网外部的客户端都能够成功访问。你必须配置端口转发才能实现这一点。HTTPS请求或者客户端用于访问Web服务器的任何端口(可能是443,但不一定)应该被转发到你网络上Web服务器的IP地址和端口。", "topic": [] }, { "id": "Wired Network-1358", "type": 0, "question": "以下哪个名称最适合用于这种类型的协议?\n\n在被聘为IT管理员后,您被分配了两个用户帐户,其中一个用于一般用途,另一个仅用于管理任务。您还需要签署一份协议,概述了您的帐户使用限制。具体而言,您不得将管理帐户用于除管理任务以外的任何事情,包括浏览互联网和访问您未获授权的数据。\n\n答案:访问控制协议。", "choices": [ "远程访问策略", "服务水平协议", "可接受使用政策", "特权用户协议" ], "answer": "D", "solution": "特权用户协议规定了用户在管理帐户和其他特权方面所拥有的能力和限制。远程访问策略规定了用户何时以及如何被允许从远程位置访问公司网络。服务水平协议(SLA)是提供者和订阅者之间的合同,规定了服务的可用性保证。可接受使用政策(AUP)规定了员工是否以及如何利用公司拥有的硬件和软件资源。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1359", "type": 0, "question": "以下哪个陈述最能描述基线?", "choices": [ "基准线是根据制造商的规格说明估计预期性能水平的一种方法。", "基准线是在实际工作负载条件下捕获的性能水平记录。", "基线是在模拟工作负载条件下记录性能水平的记录。", "基线是在系统实际使用之前记录的性能水平记录。" ], "answer": "B", "solution": "基准线是记录系统在实际运行条件下性能的记录,以便在条件发生变化时进行比较。在记录基准线时,工作负载应该是真实的,而不是模拟或估计的。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1360", "type": 0, "question": "Wireshark是一个___________________的例子。", "choices": [ "吞吐量测试仪", "协议分析仪", "远程连接工具", "入侵检测系统" ], "answer": "B", "solution": "商业嗅探器(如Wireshark和Omnipeek)可以捕获任何数据包,因为它们将NIC设置为混杂模式,这意味着NIC处理它看到的所有数据包。", "topic": [ "网络软件工具和命令" ] }, { "id": "Wired Network-1361", "type": 0, "question": "当使用以下路由映射时,如果一条路由不匹配PrefixRFC1918前缀列表,会发生什么?\n\n 路由映射 QUESTION deny 10\n 匹配 IP 地址前缀列表 PrefixRFC1918\n 路由映射 QUESTION permit 20\n 设置度量值为 200", "choices": [ "该路由被允许,度量值设置为200。", "该路由被拒绝。", "该路线是允许的。", "该路由被允许,且默认度量值设置为100。" ], "answer": "A", "solution": "因为该路由不符合前缀列表,所以序列10不适用,路由继续移动到序列20,将度量设置为200。这暗示着路由继续前进是因为它被修改了。", "topic": [ "路由映射和条件转发" ] }, { "id": "Wired Network-1362", "type": 0, "question": "你需要设置一个临时的操作系统环境来快速测试你的经理想要安装在网络上的软件。你应该使用哪个?", "choices": [ "AAA服务器", "沙盒", "监控与数据采集系统(SCADA)", "应用程序虚拟化" ], "answer": "B", "solution": "沙盒是一种临时的操作系统环境,有点像虚拟机的“轻量版”。它非常适合测试这样的软件。AAA服务器用于安全认证、授权和计费。SCADA是用于控制工业系统的传统硬件和/或软件环境。应用程序虚拟化用于传统应用程序或跨平台虚拟化。", "topic": [ "网络服务、虚拟化和云计算" ] }, { "id": "Wired Network-1363", "type": 0, "question": "你只能在一个AP上配置一个数据速率作为强制要求。是真的还是假的?", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "您可以将一个或多个数据速率配置为强制性。实际上,在2.4 GHz频段中,1、2、5.5和11 Mbps的数据速率默认设置为强制性。", "topic": [ "理解无线资源管理(RRM)" ] }, { "id": "Wired Network-1364", "type": 0, "question": "你已经实施和测试了解决方案,并确定了解决方案可能产生的任何其他影响。你的下一步是什么?", "choices": [ "制定一个行动计划。", "结束这个案件,回家休息一天。", "重启Windows服务器。", "记录解决方案。" ], "answer": "D", "solution": "在彻底调查问题并成功测试和解决问题后,您需要记录解决方案。", "topic": [ "网络故障排除方法论" ] }, { "id": "Wired Network-1365", "type": 0, "question": "以下哪个不是VTP的交换角色?", "choices": [ "客户", "服务器", "代理", "透明的", "关闭的,离线的。" ], "answer": "C", "solution": "一个交换机可以使用VTP角色客户端、服务器、透明和关闭运行。", "topic": [ "VLAN干道和EtherChannel捆绑" ] }, { "id": "Wired Network-1366", "type": 0, "question": "实时传输协议(RTP)在OSI模型的哪一层运行?", "choices": [ "应用程序", "会话", "运输", "网络" ], "answer": "C", "solution": "RTP在OSI模型的传输层运行。", "topic": [ "语音和视频设计" ] }, { "id": "Wired Network-1367", "type": 0, "question": "在嵌入式无线网络架构中,以下哪个独特特点是正确的?", "choices": [ "一个接入层交换机也可以作为一个接入点(AP)的功能。", "所有的WLC都汇聚到一个设备中。", "大量的AP连接到单个接入层交换机。", "一个接入层交换机也可以作为WLC(无线局域网控制器)的功能。" ], "answer": "D", "solution": "在嵌入式设计中,接入层交换机还充当WLC的功能,以便所有用户访问(有线和无线)汇聚在单个层中。", "topic": [ "无线基础设施" ] }, { "id": "Wired Network-1368", "type": 0, "question": "哪个命令显示已配置的iBGP和eBGP邻居?", "choices": [ "显示IP BGP。", "显示IP BGP路径。", "显示BGP对等体的IP地址。", "显示IP BGP摘要。" ], "answer": "D", "solution": "\"show ip bgp summary\" 命令显示所有 BGP 连接状态的摘要信息。", "topic": [ "在数据中心实现路由" ] }, { "id": "Wired Network-1369", "type": 0, "question": "你正在一台Windows工作站上,解决校园区域网络中另一个办公室计算机的连接问题。你需要确定两者之间的数据包在哪里被丢弃了。哪个命令可以告诉你数据包经过的最后一个路由器? \n\n答案是:traceroute。", "choices": [ "`ipconfig /all`", "`ping`", "`ip`", "`tracert`" ], "answer": "D", "solution": "`tracert`命令将显示数据包经过的路由器以及每个跳跃所需的时间,这可以通过显示数据包到达的距离来缩小问题的搜索范围。输入`ipconfig /all`将显示本地计算机的当前TCP/IP配置,例如其IP地址、MAC地址和默认网关。macOS中相当于`ipconfig`的命令是`ip`。`ping`命令只会通过超时显示数据包未能往返传输。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1370", "type": 0, "question": "Alice是一名顾问,她被聘请来将客户的旧20节点同轴以太网网络搬到新的位置。她拆卸了所有的网络电缆和其他组件,并将它们打包运输。在新的场地,她设置了所有的计算机,插入了T型连接器到每个网络适配器,并连接了电缆,从一个计算机到下一个计算机以形成总线。当Alice完成后,她启动计算机并测试它们的网络连接。她发现12台连续的计算机可以相互通信,而另外8台可以相互通信,但是12台无法与8台通信。她确保所有连接器都牢固地拧紧,特别是第12台计算机上的连接器,但问题仍然存在。以下哪项最可能是困难的原因?\n\n答案:总线上的某个电缆可能已经损坏或连接不良,导致12台计算机无法与8台计算机通信。", "choices": [ "Alice忘记关闭总线两端的计算机。", "第12台电脑上的一个连接器有一根弯曲的引脚。", "Alice忘记接地网络了。", "第12台计算机的发送和接收引脚被颠倒了。" ], "answer": "B", "solution": "第12台计算机连接上的弯曲引脚会导致总线中断,从而形成两个独立运行的网络。未终止或接地网络不会产生这种类型的故障。由于同轴连接的结构,无法交换发送和接收引脚。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1371", "type": 0, "question": "在无屏蔽双绞线(UTP)电缆的割线过程中,将散装电缆连接到墙板和补丁面板插座时,以下哪个步骤是最后一个执行的步骤?", "choices": [ "剪掉超出接触点的多余电线。", "将裸露的电线按下,夹在两个金属接触点之间,使其固定在那里。", "剥去电缆末端的一些绝缘护套,露出电线。", "将电线插入插孔中的适当接触点。", "剥去每根电线的少量绝缘层。", "将末端的扭曲电线对分开。" ], "answer": "A", "solution": "您需要使用打线块工具将大量电缆的末端连接到墙板和补丁面板上的插孔。该过程的步骤如下:\n\n1. 剥离一些电缆末端的护套以暴露导线。\n2. 在末端分离扭曲的导线对。\n3. 剥离每根导线的一小部分绝缘层。\n4. 将导线插入插孔中的适当接触点。\n5. 将裸露的导线按下,夹在保持它的两个金属接触点之间。\n6. 剪掉超出接触点的多余导线。\n\n您必须为内部电缆运行的两端重复打线的过程。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1372", "type": 0, "question": "以下哪个是有效的IPv6地址?", "choices": [ "fe00::b491:cf79:p493:23ff", "2001:0:49e6:39ff:8cf5:6812:ef56", "fe00::c955:c944:acdd:3fcb", "2001:0:44ef68:23eb:99fe:72bec6:ea5f" ], "answer": "C", "solution": "地址fe00::c955:c944:acdd:3fcb在IPv6中格式正确,双冒号代替了三个零块。未压缩的地址将显示为:fe00:0000:0000:0000:c955:c944:acdd:3fcb。选项A包含一个非十六进制数字。选项B仅包含七个16位块(没有双冒号),而不是128位所需的八个。选项D包含大于16位的块。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1373", "type": 0, "question": "开放式系统互联模型(OSI)的哪一层负责网络终端的逻辑寻址和数据报文的路由?", "choices": [ "物理层", "数据链路层", "网络层", "传输层", "会话层", "表示层", "应用层" ], "answer": "C", "solution": "网络层协议(如IP)包含头部,用于指定终端系统通信的逻辑地址并在网络中路由数据报。物理层定义了网络的物理和机械特性的标准。数据链路层使用媒体访问控制(MAC)或硬件地址,而不是逻辑地址。传输层使用端口号,而不是逻辑地址。会话层协议创建和维护终端系统之间的对话。表示层协议负责信息的格式化、翻译和呈现。应用层提供了应用程序访问协议栈并准备信息以在网络上传输的入口点。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1374", "type": 0, "question": "假设您拥有一个大型的无线网络,其中有几个控制器、许多AP、一个RADIUS服务器、一个syslog服务器和Prime Infrastructure。用户报告了特定建筑位置的连接问题,但没有提供他尝试加入的AP或控制器的详细信息。以下哪种方法代表了您可以使用的最有效的故障排除方法,以查找有关客户端的信息?", "choices": [ "前往客户的位置,使用您自己的计算机与网络进行关联,然后找出您正在使用的AP和控制器。", "在每个控制器上搜索客户端的MAC地址。", "在Prime Infrastructure上搜索客户端的MAC地址。", "在 RADIUS 服务器上搜索客户端的 MAC 地址。" ], "answer": "C", "solution": "你应该利用Prime Infrastructure及其在无线网络中的中心位置。假设每个控制器都配置为向PI发送简单网络管理协议(SNMP)陷阱,你应该能够通过对PI数据库的单个搜索找到有关客户端的有用信息。", "topic": [ "无线局域网连接故障排除" ] }, { "id": "Wired Network-1375", "type": 0, "question": "T-3租用线路连接速度为44.736兆比特每秒(Mbps)。一个T-3提供多少个独立的通道?", "choices": [ "24", "64", "128", "512", "672" ], "answer": "E", "solution": "一条T-3租用线路连接相当于28条T-1连接。每条T-1由24个信道组成,因此T-3总共有672个信道(28×24)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1376", "type": 0, "question": "在您的网络中,用户希望能够轻松地从他们的iPad和iPhone上打印。哪种服务支持这一功能?", "choices": [ "你好", "无线打印技术(AirPrint)", "TCP 打印", "虚拟打印。" ], "answer": "B", "solution": "iPad和iPhone可以自动检测本地网络上启用AirPrint的打印机,并且无需安装驱动程序即可打印。Bonjour是一项与Mac和Windows设备配合使用的服务,但需要进行一些配置。TCP打印使用IP地址连接打印机。虚拟打印将输出发送到其他地方,例如`.pdf`文件。", "topic": [ "硬件" ] }, { "id": "Wired Network-1377", "type": 0, "question": "以下哪个被认为是解决无线问题的最佳第一步?", "choices": [ "重启无线局域网控制器。", "收集更多信息以确定问题的范围。", "访问WLC并搜索错误日志中的客户端。", "访问WLC并查找警报;如果没有发现警报,则关闭事件工单。" ], "answer": "B", "solution": "首要行动应该是尽可能收集更多信息,以便缩小问题的范围。然后,您可以调查剩下的几个潜在原因。", "topic": [ "无线连接故障排除" ] }, { "id": "Wired Network-1378", "type": 0, "question": "当您需要连接到互联网时,但经常在偏远地区工作,而您唯一的选择是使用蜂窝网络时,您所建立的网络类型是什么?", "choices": [ "平移自适应网络(PAN)", "可以,能够,能。", "无线广域网(WWAN)", "局域网" ], "answer": "C", "solution": "当您使用蜂窝网络连接到互联网时,您正在使用无线广域网(WWAN)。我们大多数人都熟悉家庭或办公室中的局域网(LAN)和个人区域网络(PAN),我们用它来连接设备,如无线键盘、鼠标和耳机到我们的计算机。校园区域网络(CAN)可以存在于由单个实体拥有但位于离散建筑物中的财产上。该网络甚至可能跨越政府拥有的街道。您可能不太熟悉无线广域网(WWAN),但它们越来越常用。与使用无线电、微波或红外线信号的无线局域网不同,WWAN利用蜂窝网络。您可以从蜂窝服务提供商购买WWAN设备,通常称为移动热点。它们通常需要合同,但有些不需要。 WWAN的最大优点是它们几乎可以在任何地方工作——蜂窝网络几乎遍布全球。最大的缺点可能是成本。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1379", "type": 0, "question": "Ed被一家私人公司聘用,以连接两个远程站点的广域网(WAN)。这些站点中的每一个都有超过200个用户,并且他们都需要不断地在WAN上传输文件。其中一个站点有一个客户数据库,两个站点都在一天的所有时间访问该数据库。对数据库和其他信息的访问是时间敏感和持续的。该公司估计他们的聚合带宽需求约为40 Mbps。管理层表示,他们需要保证对这些信息的访问,并且资金在WAN实施中不是一个因素。Ed应该为这种情况推荐哪种WAN技术?", "choices": [ "标准的调制解调器到调制解调器连接", "一条T-3专用租用线路", "有线电视(CATV)连接", "一种不对称数字用户线路(ADSL)连接" ], "answer": "B", "solution": "对于这种情况,给出的最佳选项是专用租用线路连接。这是因为带宽要求是恒定的,数据传输速率很高。为了支持40 Mbps的数据传输速率,Ed应该推荐一个运行在44.735 Mbps的T-3专用租用线路。标准调制解调器连接、CATV和ADSL连接都太慢了。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1380", "type": 0, "question": "如果一个网络设计需要一个基于标准的方法来确定多播网络中的RP,那么使用哪种协议最好?", "choices": [ "PIM-BIDIR", "RPF", "PIM-SSM", "PIM-BSR" ], "answer": "D", "solution": "PIM引导路由器(PIM-BSR)类似于思科的Auto-RP,它是一种协议,用于自动查找多播网络中的会议点(RP)。BSR是一个标准,并包含在PIMv2中,而Auto-RP是思科专有的协议。BSR逐跳发送消息,并通过将其数据包发送到多播地址224.0.0.13来实现。", "topic": [ "多播设计" ] }, { "id": "Wired Network-1381", "type": 0, "question": "以下哪种云服务模型使您能够执行自己选择的操作系统的新安装?", "choices": [ "基础设施即服务", "平台即服务", "软件即服务", "桌面即服务(DaaS)", "以上所有选项。" ], "answer": "A", "solution": "基础设施即服务(IaaS)模型为消费者提供处理、存储和网络资源,他们可以使用这些资源安装和运行他们选择的操作系统和其他软件。平台即服务(PaaS)为消费者提供在提供者安装的服务器上安装所选应用程序的能力。软件即服务(SaaS)为消费者提供访问运行在提供者服务器上的特定应用程序的权限。桌面即服务(DaaS)提供整个工作站桌面的远程虚拟化,而不是单个应用程序。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1382", "type": 0, "question": "真或假:ETR是唯一负责响应由ITR发起的地图请求的设备。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "ETR还可以通过在地图注册消息中设置代理地图回复标志(P位)来请求MS代表其回答地图请求。", "topic": [ "覆盖隧道" ] }, { "id": "Wired Network-1383", "type": 0, "question": "哪种UCS网络存储类型提供最大的可靠性、可扩展性和性能?", "choices": [ "网络附加存储(NAS)。", "直接连接存储(DAS)。", "RAID存储。", "存储区域网络(SAN)。" ], "answer": "D", "solution": "区域网络(SAN)引入了网络的灵活性,使得一个服务器或多个异构服务器可以共享一个公共存储实用程序。网络可能包括许多存储设备,包括磁盘、磁带和光学存储。此外,存储实用程序可能远离使用它的服务器。这种类型的存储提供了最大的可靠性、可扩展性和性能。SAN是最具弹性、高度可扩展和高性能的存储。", "topic": [ "思科统一计算系统概述" ] }, { "id": "Wired Network-1384", "type": 0, "question": "Chelin是一个安全运营中心(SOC)的分析师,正在调查一个事件,即大量的IP流量(数据)在深夜离开组织,发送到互联网上的可疑主机。哪种技术可以帮助Chelin以有效的方式获取网络元数据,以便检测此类可疑活动?", "choices": [ "IPS", "网络流量监测技术(NetFlow)", "完整数据包捕获", "这些答案都不正确。" ], "answer": "B", "solution": "NetFlow可以帮助安全分析师以有效的方式获取网络流量元数据,以便检测异常的网络活动。", "topic": [ "网络基础设施设备遥测和分析" ] }, { "id": "Wired Network-1385", "type": 0, "question": "高速接口的默认EIGRP hello计时器是多少?", "choices": [ "1秒钟", "5秒钟。", "10秒", "20秒", "30秒。", "60秒" ], "answer": "B", "solution": "EIGRP在高速接口上使用默认的hello计时器为5秒。", "topic": [ "高级EIGRP" ] }, { "id": "Wired Network-1386", "type": 0, "question": "为了允许无头端点连接到启用了IEEE 802.1X的网络,必须在端口上配置什么?", "choices": [ "LWA", "MAB", "CWA", "EasyConnect" ], "answer": "B", "solution": "非认证终端可用的选项是MAC身份验证绕过(MAB)。对于无头终端,Web身份验证和EasyConnect不适用,因为没有用户交互或身份验证。", "topic": [ "1X认证" ] }, { "id": "Wired Network-1387", "type": 0, "question": "Ethernet是一种总线型网络拓扑。", "choices": [ "星星", "戒指", "公共汽车", "网格" ], "answer": "A", "solution": "以太网是一种星型拓扑结构,使用集线器将网络中的所有节点连接起来。", "topic": [ "网络组件" ] }, { "id": "Wired Network-1388", "type": 0, "question": "描述SOAP Web服务时,哪个陈述最准确?", "choices": [ "SOAP被定义为基于JSON和XML的协议。", "SOAP被定义为基于XML的协议。", "SOAP没有错误处理方法。", "SOAP被定义为基于XML的协议,且仅为无状态协议。" ], "answer": "B", "solution": "SOAP被定义为基于XML的协议。它以设计和开发Web服务以及在互联网上使用各种编程语言开发的不同平台上的应用程序之间实现通信而闻名。它既独立于平台又独立于语言。答案A和C不正确,因为SOAP只允许XML并具有内置的错误处理。虽然SOAP默认情况下可以是无状态的,但通过在服务器上更改代码,可以使SOAP具有状态,因此D不正确。", "topic": [ "网络APIs" ] }, { "id": "Wired Network-1389", "type": 0, "question": "磁盘镜像和磁盘复制都是硬盘数据存储的容错机制。以下哪个关于磁盘镜像和磁盘复制的陈述是正确的?", "choices": [ "磁盘镜像使服务器能够在磁盘驱动器故障时继续运行。", "磁盘镜像使服务器能够在磁盘控制器故障时继续运行。", "磁盘镜像使服务器能够在磁盘驱动器或磁盘控制器故障时继续运行。", "磁盘镜像使服务器能够在磁盘驱动器或磁盘控制器故障时继续运行。" ], "answer": "D", "solution": "磁盘镜像和磁盘复制都使用多个硬盘驱动器来存储所有数据的副本。然而,磁盘复制要求每个磁盘都连接到一个单独的控制器,以便在磁盘故障或磁盘控制器故障时数据仍然可用。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1390", "type": 0, "question": "以下哪个组件构成了Prime Infrastructure用户界面?", "choices": [ "Servlets(小写)", "仪表板小部件", "窗格", "应用程序" ], "answer": "B", "solution": "PI 仪表板由一系列可自定义的小部件组成。", "topic": [ "管理思科无线网络" ] }, { "id": "Wired Network-1391", "type": 0, "question": "哪个命令可以让你验证是否已经应用了路由过滤器到启用EIGRP的接口?", "choices": [ "显示IP接口简要信息。", "显示IP接口配置信息。", "显示IP协议。", "显示 EIGRP 接口信息。" ], "answer": "C", "solution": "命令 **show ip protocols** 可以让你验证是否有任何路由过滤器被应用到启用 EIGRP 的接口上。", "topic": [ "IPv4的EIGRP故障排除" ] }, { "id": "Wired Network-1392", "type": 0, "question": "您想通过增加主机可用带宽并限制广播域的大小来提高网络性能。以下哪个选项将实现此目标?", "choices": [ "托管式集线器", "网桥", "交换机", "配置了虚拟局域网(VLAN)的交换机。" ], "answer": "D", "solution": "通过在交换网络中创建和实现VLAN,您可以在第二层上分割广播域。要使不同VLAN上的主机进行通信,您必须拥有路由器或第三层交换机。", "topic": [ "交换和虚拟局域网" ] }, { "id": "Wired Network-1393", "type": 0, "question": "在当前的数据中心网络架构中,用于传输VXLAN数据包或其他覆盖层数据包的是哪个网络层?", "choices": [ "覆盖网络", "软件定义广域网", "底层网络", "多协议标签交换(MPLS)" ], "answer": "C", "solution": "底层网络——该层的底部——为所有其他网络服务提供基础。底层传输VXLAN和其他覆盖层数据包,因此管理员必须了解解决连接问题的不同方法。", "topic": [ "实施数据中心覆盖协议" ] }, { "id": "Wired Network-1394", "type": 0, "question": "以下哪些政策可以在规范SCADA网络流量方面发挥关键作用?", "choices": [ "网络分析策略", "入侵策略", "访问控制策略", "文件和恶意软件策略" ], "answer": "A", "solution": "Snort引擎使用网络分析策略上的设置,在数据包通过高级安全检查时对流量进行解码和规范化。", "topic": [ "网络分析和入侵策略" ] }, { "id": "Wired Network-1395", "type": 0, "question": "当位于公司网络外部的终端配置为使用MRA注册到Cisco Unified CM时,该终端发送的第一条通信是什么?", "choices": [ "与Expressway Edge进行TLS握手以建立可信证书验证。", "通过Expressway核心和边缘服务器向统一通信管理器发送注册请求。", "在 _domain_ 域名下进行 _collab-edge._tcp 的 DNS SRV 查询。", "在 _domain_ 域名下进行 _cisco-uds._tcp 的 DNS SRV 查询。" ], "answer": "D", "solution": "服务发现的过程如下。首先,位于公司网络外且没有VPN连接的Cisco Jabber客户端向公共DNS服务器发送_cisco-uds._tcp.company.com的DNS SRV记录查找请求。管理company.com的公共企业DNS不应该有这样的SRV记录,因此查找失败。接下来,Cisco Jabber客户端发送另一个DNS SRV记录查找请求,查找_collab-edge._tls.company.com。这次查找成功,并且Cisco Expressway Edge的地址在DNS响应中提供给Jabber客户端。", "topic": [ "配置MRA解决方案" ] }, { "id": "Wired Network-1396", "type": 0, "question": "Ralph正在安装一条新的双绞线网络电缆,但在拉线时没有正确标记每个电缆的运行情况。现在,Ralph必须追踪办公区域中每个电缆端口到数据中心中正确的电缆端口,并正确标记它们。以下哪种工具应该由Ralph用来在一堆未标记的电缆端口中找到正确的电缆?", "choices": [ "电缆认证仪", "音调发生器和定位器", "光时域反射仪(OTDR)", "万用表" ], "answer": "B", "solution": "拉尔夫可以使用音调发生器和定位器来定位与每个办公室连接相关联的正确电缆。通过将音调发生器连接到电缆运行的一端,他可以使用定位器找到另一端。电缆认证器识别各种电缆性能特征,通常包括电缆长度、信号衰减和串扰。光时域反射仪(OTDR)是一种用于测量光纤电缆长度和其他特性的设备。万用表是一种用于测量铜电缆上电流的设备。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1397", "type": 0, "question": "一家公司需要使用公共IP地址,以便四个网络服务器可以从互联网访问。使用什么技术可以满足这个要求?", "choices": [ "域名系统", "IPsec(Internet Protocol Security)", "静态网络地址转换(Static NAT)", "动态网络地址转换(Dynamic NAT)。" ], "answer": "C", "solution": "静态NAT用于将公共IP地址静态地转换为私有IP地址。", "topic": [ "Internet协议版本4的设计" ] }, { "id": "Wired Network-1398", "type": 0, "question": "当您与提供商签订合同,使用其在公共云中的服务器为公司获取电子邮件服务时,您使用的是以下哪种服务模型?", "choices": [ "基础设施即服务", "平台即服务", "软件即服务", "桌面即服务(DaaS)", "以上选项均不正确。" ], "answer": "C", "solution": "软件即服务(SaaS)模式为消费者提供访问运行在提供者服务器上的特定应用程序的方式。基础设施即服务(IaaS)为消费者提供处理、存储和网络资源,他们可以使用这些资源安装和运行他们选择的操作系统和其他软件。平台即服务(PaaS)为消费者提供在提供者安装的服务器上安装他们选择的应用程序的能力。桌面即服务(DaaS)提供整个工作站桌面的远程虚拟化,而不是单个应用程序。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1399", "type": 0, "question": "Alice最不可能在故障排除时首先执行以下哪个步骤?", "choices": [ "检查连接局域网和互联网的路由器的配置。", "询问用户是否可以访问本地网络资源。", "检查是否有其他人遇到了相同的问题。", "检查用户的职位,看她是否是公司中的重要人物。" ], "answer": "A", "solution": "有很多可能导致问题的原因,比路由器配置错误更有可能,因此这不是Alice首先要检查的。询问用户是否可以访问本地网络是为了隔离问题。如果她不能访问,则问题可能在她的计算机上;如果她可以访问,则问题可能出现在互联网接入基础设施中。如果其他用户也遇到了这个问题,则问题应该得到更高的优先级,而Alice知道问题不在用户的计算机上。虽然这可能不是她首先检查的事情,但更高级别的用户通常会得到优先处理,这是一个政治现实。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1400", "type": 0, "question": "OSPFv3的哪个LSA携带地址前缀?", "choices": [ "网络LSA", "概括LSA", "区间路由器链路状态广告(Interarea-router LSA)。", "区内前缀 LSA" ], "answer": "D", "solution": "区内前缀链路状态广告(LSA)携带与路由器、存根网络或相关的中转网络段相关联的IPv6前缀。", "topic": [ "OSPF、BGP和路由操作" ] }, { "id": "Wired Network-1401", "type": 0, "question": "在路由器上可以修改哪个值来操纵 EIGRP 所采取的路径,但避免对其他路由协议(如 OSPF)产生影响?", "choices": [ "接口带宽", "接口最大传输单元(MTU)", "接口延迟", "接口优先级" ], "answer": "C", "solution": "接口延迟可以被修改,以改变EIGRP路径计算,而不修改OSPF的路径计算。", "topic": [ "EIGRP(Enhanced Interior Gateway Routing Protocol):增强型内部网关路由协议。" ] }, { "id": "Wired Network-1402", "type": 0, "question": "\"Overengineering\" is another phrase that means the same thing as \"overdesigning\".", "choices": [ "镀金", "预先设定的观念", "最佳实践", "过度思考" ], "answer": "A", "solution": "金属电镀是添加过多的设计元素,不符合任何基本要求的过程。预设观念是指作为网络设计师,您引入外部信息并将该信息分配为属性,以做出设计决策,即使它们不适用于所讨论的情况。最佳实践是在没有规定、限制和限制所述项目的要求时应部署的一般配置、功能和功能列表。过度思考是一种分散注意力的选项。", "topic": [ "网络设计" ] }, { "id": "Wired Network-1403", "type": 0, "question": "以下哪个分段选项使用SGT来管理端点组之间的基于组的策略,其中包括VN?", "choices": [ "微分段化", "pxGRID(像素网格)", "本地模式", "宏观细分。" ], "answer": "A", "solution": "微分割使数据平面隔离成为可能,并提供了一种简单的方式来管理基于组的策略,以在具有虚拟网络的端点组之间进行。", "topic": [ "SD-Access设计" ] }, { "id": "Wired Network-1404", "type": 0, "question": "技术人员会在以下哪个设备上使用割线工具?", "choices": [ "RJ-45连接器", "CSU/DSU(数字信号转换器/数字信号调制解调器)", "110型接线块", "光纤ST连接器" ], "answer": "C", "solution": "66块和110块都用于大量终端线路。要将电线插入块连接器,您需要使用冲击工具。", "topic": [ "电缆连接问题和工具" ] }, { "id": "Wired Network-1405", "type": 0, "question": "真或假:使管理系统连接到带外接口的一个解决方案是将数据平面流量泄漏到带外网络中。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "ACI不允许数据平面流量泄漏到oob VRF实例中。但是,它允许流量泄漏到和从inb VRF中。", "topic": [ "实施管理" ] }, { "id": "Wired Network-1406", "type": 0, "question": "以下哪个用于唯一标识AP及其与其关联的无线客户端维护的基本服务集?", "choices": [ "SSID", "BSSID", "Ethernet MAC address", "Radio MAC address" ], "answer": "B", "solution": "BSS或小区中心的AP使用基本服务集标识符(BSSID)来标识自身(和BSS)。它还使用SSID来标识无线网络,但这不是AP或BSS的唯一标识。最后,无线电MAC地址用作BSSID值的基础,但该值可以更改以形成AP支持的每个SSID的BSSID。", "topic": [ "无线局域网拓扑结构" ] }, { "id": "Wired Network-1407", "type": 0, "question": "哪种路由协议实现了扩散更新算法(DUAL)?", "choices": [ "Intermediate System to Intermediate System (IS-IS)。", "IGRP(Interior Gateway Routing Protocol):内部网关路由协议。", "EIGRP(Enhanced Interior Gateway Routing Protocol)", "开放最短路径优先协议(OSPF)" ], "answer": "C", "solution": "EIGRP实现了DUAL算法。", "topic": [ "路由协议特性,RIP,EIGRP和IS-IS" ] }, { "id": "Wired Network-1408", "type": 0, "question": "以下哪个Windows命令可以让你在地址解析协议(ARP)缓存中创建一个新的条目?", "choices": [ "`arp -N`", "`arp -d`", "`arp -a`", "`arp -s`" ], "answer": "D", "solution": "`arp -s` 命令可以创建一个缓存记录,指定媒体访问控制(MAC)地址及其关联的 Internet 协议(IP)地址。`arp -N` 命令可以显示指定网络接口的 ARP 缓存条目。`arp -d` 命令用于删除缓存条目。`arp -a` 命令显示存储在其缓存中的 ARP 表中的条目。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1409", "type": 0, "question": "在RFC 7426规范中定义的软件定义网络(SDN)中,平面是与特定功能相关的一组资源。以下哪个不是SDN架构中定义的五个平面之一?", "choices": [ "转发", "操作的,运营的", "控制", "管理", "基础设施", "应用程序" ], "answer": "E", "solution": "RFC 7426文件定义了SDN架构中的五个平面:转发平面、操作平面、控制平面、管理平面和应用平面。基础设施不是SDN平面之一。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1410", "type": 0, "question": "DHCP服务器需要配置哪些内容才能正常运行?", "choices": [ "DNS服务器", "范围", "范围", "DHCP中继代理" ], "answer": "B", "solution": "每个DHCP服务器都需要有一个范围,即可供客户端使用的地址范围,以及其他可以提供给客户端计算机的选项。DHCP服务器可以选择性地向客户端提供DNS服务器的地址。没有DHCP范围。DHCP中继代理是在没有DHCP服务器的子网上配置的系统,它将DHCP请求中继到DHCP服务器。", "topic": [ "网络服务、虚拟化和云计算" ] }, { "id": "Wired Network-1411", "type": 0, "question": "以下IEEE无线局域网标准中,哪一个提供了最大可能的吞吐量?", "choices": [ "802.11a是一种无线网络标准,工作在5GHz频段,最高传输速率可达54Mbps。", "802.11ac是一种无线网络标准,也被称为Wi-Fi 5,它提供更快的数据传输速度和更好的网络性能。", "802.11b是一种无线网络标准,也称为Wi-Fi标准,它使用2.4GHz频段进行通信,最高传输速率为11Mbps。", "802.11g是一种无线网络标准,支持2.4GHz频段,最高传输速率为54Mbps。", "802.11n是一种无线网络标准,也被称为Wi-Fi 4。它支持更快的数据传输速度和更远的覆盖范围,是现代无线网络中最常用的标准之一。" ], "answer": "B", "solution": "IEEE 802.11ac标准提供了最大可能的吞吐量,高达1.3 Gbps。802.11n标准的速度可达600 Mbps。802.11a和802.11g标准的速度可达54 Mbps。802.11b标准的速度可达11 Mbps。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1412", "type": 0, "question": "用户正在尝试在他们的Windows电脑上使用Google Chrome,但是他们收到了错误消息“无法访问网络”。如果他们使用Microsoft Edge,他们可以毫无问题地访问网站。你需要做什么?", "choices": [ "卸载并重新安装Google Chrome。", "指示用户仅使用Microsoft Edge。", "确保在Windows Defender防火墙中允许Google Chrome程序。", "重新安装操作系统。" ], "answer": "C", "solution": "如果他们能够使用Microsoft Edge访问互联网,那么问题就出在Google Chrome上。最可能的问题是防火墙不允许它。为了解决这个问题,进入Windows Defender防火墙,在入站规则中添加Google Chrome,并允许它通过防火墙发送信息。", "topic": [] }, { "id": "Wired Network-1413", "type": 0, "question": "在使用Cisco Expressway上的Locate工具时,如果使用CPL脚本与呼叫策略一起使用,应使用以下哪个字段?", "choices": [ "Alias", "Source", "Source Alias", "Authenticated" ], "answer": "C", "solution": "通常情况下,源别名可选字段只有在路由过程使用依赖于源别名规则的呼叫处理语言(CPL)时才相关。别名字段是使用定位工具所必需的唯一字段。这提供了目标别名以测试呼叫尝试。源字段确定模拟搜索将从哪里开始。认证字段用于选择是否将请求视为已认证。", "topic": [ "解决商业对商业(B2B)协作解决方案的问题" ] }, { "id": "Wired Network-1414", "type": 0, "question": "以下哪三项使端点配置文件能够在授权策略规则中使用?", "choices": [ "逻辑档案", "身份群体", "Nmap操作系统扫描结果", "EndPointPolicy属性", "EndPointProfile属性" ], "answer": "A", "solution": "b和d。**解释:**没有所谓的EndPointProfile属性。虽然操作系统扫描用作确定终端点配置文件的条件,但不能直接在授权策略中使用。授权策略可以使用身份组(包含MAC地址列表)、EndPoint策略属性(实际的终端点配置文件)和逻辑配置文件(配置文件组)。", "topic": [ "Profiling(个人资料)" ] }, { "id": "Wired Network-1415", "type": 0, "question": "DSCP的DS字段能够支持多少个代码点?", "choices": [ "8", "32", "64", "128\n\nFoundation Topics\n\nThis chapter reviews IPv4 headers, address classes, and assignment methods.\n\nIP is the network layer protocol in TCP/IP. It contains logical addressing and information for routing packets throughout the internetwork. IP is described in RFC 791, which was prepared for the Defense Advanced Research Projects Agency (DARPA) in September 1981.\n\nIP provides for the transmission of blocks of data, called _datagrams_ or _packets_ , from a source to a destination. The sources and destinations are identified by 32-bit IP addresses. The source and destination devices are workstations, servers, printers, sensors, cameras, IP phones, firewalls, and routers. A CCNP candidate must understand IPv4 logical address classes and assignment. The IPv4 protocol also provides for the fragmentation and reassembly of large packets for transport over networks with small maximum transmission units (MTUs). A CCNP candidate must have a good understanding of this packet fragmentation and reassembly.\n\n[Appendix C](appc.xhtml#appc), “[OSI Model, TCP/IP Architecture, and Numeric Conversion](appc.xhtml#appc),” provides an overview of the TCP/IP architecture and how it compares with the OSI model. It also reviews binary numbers and numeric conversion (to decimal), which is a skill needed to understand IP addresses and subnetting." ], "answer": "C", "solution": "DS字段在ToS字段中分配了6位,因此可以容纳64个不同的代码点。", "topic": [ "互联网协议第四版(IPv4)设计" ] }, { "id": "Wired Network-1416", "type": 0, "question": "以下哪个陈述解释了为什么通过客户端到站点虚拟专用网络(VPN)连接进行网络浏览通常比本地浏览慢得多?", "choices": [ "浏览器应用程序正在 VPN 服务器上运行。", "浏览器正在使用远程网络的互联网连接。", "VPN隧道限制可用带宽的数量。", "VPN加密需要大量的处理器资源。" ], "answer": "B", "solution": "当用户使用VPN连接到远程网络时,他们成为该网络的参与者,包括使用远程网络的互联网连接。因此,当用户打开浏览器时,应用程序会通过VPN隧道将用户的请求传递到远程服务器,该服务器使用远程站点的默认网关和互联网连接来连接所需的地址。这比直接从客户端计算机将浏览器连接到互联网本质上要慢。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1417", "type": 0, "question": "开放式系统互联模型(OSI)的哪一层定义了网络上使用的介质、网络接口、连接硬件和信号方法?", "choices": [ "物理的", "数据链路", "网络", "运输", "会话", "展示", "应用程序" ], "answer": "A", "solution": "OSI模型的物理层定义了网络的物理和机械特性的标准,例如电缆(铜和光纤)、连接硬件(集线器和交换机)和信号传输方法(模拟和数字)。其他所有层都不涉及网络的机械特性。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1418", "type": 0, "question": "MAB在现代网络中被使用的主要原因之一是什么?", "choices": [ "大多数终端设备,如打印机和IP电话,没有认证客户端,因此无法使用802.1X。", "一个端点可能有一个认证客户端,但是对于公司来说,启用和配置这个认证客户端可能非常复杂或者操作上很困难。因此,公司可能会选择使用MAB。", "大多数终端设备都有认证请求方,但它们不兼容思科网络。", "MAB与802.1X一样安全,因此经常被选择,以避免在不同的终端上配置supplicant所带来的操作困难。" ], "answer": "B", "solution": "这个组织中有许多不同的“无头”终端,例如IP电话、IP摄像头、打印机、门禁读卡器、输液泵和医学成像系统。其中一些终端没有认证客户端。对于那些有认证客户端的终端,为这些不同的终端启用和配置认证客户端可能非常复杂或在公司运营方面存在困难。许多这样的设备没有一个中央管理平台,能够在大量部署的设备上配置每个认证客户端。因此,选择使用MAB为这些无头设备提供网络访问。", "topic": [ "1X认证" ] }, { "id": "Wired Network-1419", "type": 0, "question": "在过去的五分钟内,建筑物的一个区域内有几个用户打电话报告说他们失去了网络连接。这个连接在当天早些时候还能正常工作。最有可能导致这个问题的原因是什么?", "choices": [ "网络卡驱动程序故障。", "TCP/IP配置不正确。", "网络电缆故障。", "故障开关" ], "answer": "D", "solution": "如果问题影响到多个用户,很有可能是与中央连接设备有关的问题。怀疑计算机插入的交换机存在问题。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1420", "type": 0, "question": "添加一个用户名为_radius-test_,密码为_password的用户的目的是什么?", "choices": [ "该交换机可以定期向AAA服务器发送RADIUS Access-Request消息,以验证它们是否仍然存活。用户名和密码用于该测试。", "该用户名和密码用于交换机中可用的本地RADIUS服务器,该服务器在WAN故障情况下使用。", "用户名和密码用于认证请求方的外部身份,以便对接交换机本地用户数据库进行认证。", "如果配置中没有本地用户名和密码,当RADIUS服务器不可用时,管理员可能会被锁定在交换机外。" ], "answer": "A", "solution": "该交换机会定期向 RADIUS 服务器(Cisco ISE)发送测试认证消息,以寻找来自服务器的 RADIUS 响应(Access-Accept 或 Access-Reject)。自动化测试中的用户名和密码必须存在于配置中。", "topic": [ "实现有线和无线认证" ] }, { "id": "Wired Network-1421", "type": 0, "question": "以下哪种备份作业类型不会重置其备份的文件的归档位?", "choices": [ "完整的", "递增的", "差分的;微分的;差异的", "补充的,附加的" ], "answer": "C", "solution": "差异备份使用存档位来确定要备份哪些目标文件。但是,差异备份不会重置存档位。全备份不关注存档位,因为它们备份所有文件。但是,全备份在作业完成后会清除存档位。增量备份也使用存档位来确定自上次备份作业以来哪些文件已更改。然而,增量备份的主要区别在于它会清除存档位,以便不备份未更改的文件。没有补充备份作业这样的东西。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1422", "type": 0, "question": "关于DfltGrpPolicy的哪个陈述是正确的?", "choices": [ "DfltGrpPolicy默认情况下不允许任何策略。", "DfltGrpPolicy默认允许管理员SSL VPN客户端连接。", "DfltGrpPolicy默认情况下允许所有SSL VPN客户端连接。", "默认情况下,DfltGrpPolicy不允许SSL VPN客户端连接。" ], "answer": "D", "solution": "DfltGropPolicy默认情况下不允许SSL VPN客户端连接。", "topic": [ "远程访问 VPN 故障排除" ] }, { "id": "Wired Network-1423", "type": 0, "question": "以下哪种设备用于在同一VLAN中物理连接计算机?", "choices": [ "一座桥。", "一个集线器", "一个开关", "一个路由器" ], "answer": "C", "solution": "将路由器替换为交换机将把一个互联网络转变为一个单一的大子网,虚拟局域网(VLAN)存在于交换结构的逻辑元素上。虽然VLAN是网络层子网的功能等效物,但单个VLAN中的系统仍然是通过交换机而不是路由器物理连接的。桥连接数据链路层的网络段,并有选择地在这些段之间转发流量。然而,桥不像交换机那样提供两个系统之间的专用连接,并且不能将一个大型路由互联网络转换为单个交换网络。因此,它们在实现VLAN方面没有作用。集线器是物理层设备,将所有传入的流量通过它们的所有端口进行传播。用集线器替换互联网络上的路由器将创建一个共享的广播域,其中有大量的流量和许多冲突。因此,集线器不连接VLAN中的计算机。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1424", "type": 0, "question": "你正在家里的办公室工作,需要在与客户交谈时能够在键盘上打字,因此你购买了一个无线耳机。为确保耳机和笔记本电脑之间可以通信,你需要在笔记本电脑上启用哪种无线技术?", "choices": [ "Wi-Fi", "IR", "Bluetooth", "NFC" ], "answer": "C", "solution": "耳机用于免提电话和听音乐。耳机可以插入扬声器/耳机插孔或无线连接。大多数无线耳机都是蓝牙。Wi-Fi用于连接无线局域网(LAN)。IR是红外通信,使用红外线并需要视线连接。它很少使用。NFC(近场通信)仅在非常短的距离内工作,约为10厘米或4英寸。", "topic": [ "移动设备" ] }, { "id": "Wired Network-1425", "type": 0, "question": "在AAA方法列表中配置备用选项的目的是什么?", "choices": [ "为了在第一个ISE PSN失败的情况下提供备用的ISE PSN。", "提供一个备用密码作为TACACS共享密钥。", "为了在第一种方法不可用时提供备用的AAA方法。", "为故障排除提供备用的TACACS配置。" ], "answer": "C", "solution": "在创建AAA方法列表时,您可以定义主要的AAA方法以及备用方法。例如,您可以配置AAA身份验证方法列表,首先尝试使用TACACS+服务器组,如果无法访问,则使用IOS设备上的本地帐户存储。", "topic": [ "使用Cisco IOS配置设备管理AAA" ] }, { "id": "Wired Network-1426", "type": 0, "question": "用户打电话给帮助台的Ed报告说他无法访问互联网,但是他可以访问本地网络上的系统。Ed检查了用户工作站上的路由表,并看到以下列表。哪个陈述解释了为什么用户无法访问互联网?\n\nIPv4路由表\n==========================================================================\n活动路由:\n网络目标 子网掩码 网关 接口 路由跃点\n 127.0.0.0 255.0.0.0 在链路上 127.0.0.1 331\n 127.0.0.1 255.255.255.255 在链路上 127.0.0.1 331\n 127.255.255.255 255.255.255.255 在链路上 127.0.0.1 331\n 192.168.2.0 255.255.255.0 在链路上 192.168.2.37 281\n 192.168.2.37 255.255.255.255 在链路上 192.168.2.37 281\n 192.168.2.255 255.255.255.255 在链路上 192.168.2.37 281\n 224.0.0.0 240.0.0.0 在链路上 127.0.0.1 331\n 224.0.0.0 240.0.0.0 在链路上 192.168.2.37 281\n 255.255.255.255 255.255.255.255 在链路上 127.0.0.1 331\n 255.255.255.255 255.255.255.255 在链路上 192.168.2.37 281\n==========================================================================\n持久路由:\n无\n\n答案:用户无法访问互联网是因为路由表中没有指向互联网的默认网关。", "choices": [ "路由表没有指定回环地址。", "路由表未指定DNS服务器地址。", "路由表未指定默认网关地址。", "路由表中包含两条不同的路由到224.0.0.0网络。" ], "answer": "C", "solution": "要访问互联网,工作站的路由表必须包括一个默认网关条目,该条目的网络目标值为0.0.0.0。工作站的路由表不必指定域名系统(DNS)服务器的地址。回环地址(127.0.0.1)和多播地址(224.0.0.0)是正常的路由表条目,不会影响互联网访问。", "topic": [] }, { "id": "Wired Network-1427", "type": 0, "question": "225.10.1.1是什么类型的地址?", "choices": [ "单播。", "多播", "广播", "任播" ], "answer": "B", "solution": "多播地址的范围从224.0.0.1到239.255.255.255。", "topic": [ "互联网协议第四版(IPv4)设计" ] }, { "id": "Wired Network-1428", "type": 0, "question": "远程办公者抱怨他的网络接口卡(NIC)无法正常工作,没有链接灯。该用户经常在一个有屏幕的门廊里工作。过去几天天气变化很大,湿度和温度每天都在上下波动。以下哪个可能是这个问题的直接原因?(选择最佳答案。)", "choices": [ "热膨胀和收缩", "热升华", "芯片爬升。", "POST错误" ], "answer": "A", "solution": "热膨胀和收缩会在湿度快速变化时发生。这可能会导致一些技术人员所说的“芯片爬行”或“卡片爬行”。", "topic": [] }, { "id": "Wired Network-1429", "type": 0, "question": "以下哪个syslog消息严重级别表示该消息仅为信息性质?", "choices": [ "0", "2", "4", "6", "7" ], "answer": "D", "solution": "每个syslog消息都包括一个单个数字的严重程度代码。代码6表示该消息纯粹是信息性的。代码0是最严重的,表示系统已经无法使用的紧急情况。严重程度代码2是关键条件消息,代码4是警告消息。代码7仅用于调试。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1430", "type": 0, "question": "以下哪种连接器类型通常与连接到计算机的T型连接器相关联?", "choices": [ "RJ45", "MT-RJ", "8P8C", "BNC", "F" ], "answer": "D", "solution": "薄型以太网网络使用一种同轴电缆,从每台计算机到下一台计算机,形成总线拓扑结构。为了将电缆连接到网络计算机,每个网络接口适配器都有一个T型连接器连接,还有两个额外的公BNC连接器,您可以连接两个长度的网络电缆。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1431", "type": 0, "question": "TCP窗口字段用于什么?", "choices": [ "错误检测", "流程控制", "碎片化", "复用" ], "answer": "B", "solution": "TCP窗口用于流量控制。", "topic": [ "网络协议和网络设备基础知识" ] }, { "id": "Wired Network-1432", "type": 0, "question": "自治系统外部LSA的OSPFv2链路状态广告(LSA)类型是什么?", "choices": [ "类型1", "类型2", "类型3", "类型4", "类型5" ], "answer": "E", "solution": "OSPFv2类型5的LSA是自治系统外部LSA。", "topic": [ "OSPF、BGP、路由操作和IP组播" ] }, { "id": "Wired Network-1433", "type": 0, "question": "具有IP地址10.123.4.1/30的环回接口的广告网络是什么?", "choices": [ "10.123.4.1/24", "10.123.4.0/30", "10.123.4.1/32", "10.123.4.0/24" ], "answer": "C", "solution": "回环地址被归类为OSPF回环接口类型,无论子网掩码如何,始终被广告为/32地址。", "topic": [ "OSPF(Open Shortest Path First)开放式最短路径优先协议。" ] }, { "id": "Wired Network-1434", "type": 0, "question": "用户抱怨他们的打印作业没有打印。您打开打印队列,看到有50个作业排队等待。打印机已正确连接并在线。您应该怎么做?", "choices": [ "打开打印机故障排除并让它诊断问题。", "停止并重新启动打印池。", "删除并重新安装打印机。", "删除并重新安装Windows。" ], "answer": "B", "solution": "如果打印作业似乎在打印队列中“卡住”,您应该停止并重新启动打印池服务。没有打印机故障排除实用程序。不需要删除和重新安装打印机和/或Windows。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1435", "type": 0, "question": "这个配置使得公司的无线网络只有当客户端连接的信号强度超过特定水平时才能进行认证。以下哪个术语最能描述此配置提供的安全机制?", "choices": [ "地理围栏", "本地认证", "运动检测", "端口安全" ], "answer": "A", "solution": "_Geofencing_ 是限制客户端访问网络或其他资源的技术的通用术语。在无线网络中,Geofencing 旨在防止设施外的未经授权客户端连接到网络。通过仅允许信号强的用户连接,可以帮助防止外部用户的访问。本地身份验证是触发身份验证请求的应用程序或服务,用户必须在授权之前做出响应。端口安全是一种保护交换机端口访问的方法。运动检测是一种设计用于在受保护区域内有人非法入侵时触发通知或警报的系统。这些其他选项都与信号强度无关。", "topic": [] }, { "id": "Wired Network-1436", "type": 0, "question": "用户报告无法访问互联网,但可以连接本地网络上的计算机。在用户的工作站上,您运行 `ipconfig /all` 命令并检查输出。根据以下 `ipconfig` 结果,哪个选项最有可能解释用户的问题?", "choices": [ "DHCP未启用。", "子网掩码设置不正确。", "默认网关设置不正确。", "DNS服务器设置位于另一个网络上。" ], "answer": "C", "solution": "默认网关设置应包含工作站本地网络上路由器的地址,该路由器提供访问其他网络(如互联网)的访问权限。因此,在这种情况下,默认网关地址应该在192.168.23.0网络上,但它包含了一个在192.168.216.0网络上的地址,这不是本地的。因此,用户只能访问192.168.23.0/24网络上的系统。子网掩码设置必须正确,否则用户将无法访问任何其他系统。与默认网关不同,DNS服务器不必在工作站的本地网络上,因此显示的地址可以是正确的。计算机访问互联网不必启用DHCP。", "topic": [] }, { "id": "Wired Network-1437", "type": 0, "question": "以下哪项是交换机编制正确的ARP信息表以与传入数据包进行比较的方式?\n\n动态ARP检查(DAI)是某些网络交换机中的一项功能,可防止由ARP欺骗(将虚假信息插入ARP缓存)促成的路径上的(中间人)攻击。具有DAI的交换机检查传入的ARP数据包,并拒绝包含不正确的IP和媒体访问控制(MAC)地址对的数据包。", "choices": [ "DHCP欺骗防范。", "安全的SNMP", "DNS名称解析", "新加坡民族阵线 (NDP)" ], "answer": "A", "solution": "动态主机配置协议(DHCP)监听是一种过程,交换机检查DHCP流量以确定DHCP服务器已分配给特定MAC地址的IP地址。DAI通过将ARP数据包中的IP和MAC地址对与其编译的DHCP监听表中的地址对进行比较来检测ARP欺骗尝试。然后,交换机丢弃不匹配的地址对的数据包。安全SNMP安全网络协议(SNP)、域名服务器(DNS)名称解析和邻居发现协议(NDP)不用于实现DAI。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1438", "type": 0, "question": "以下哪种电缆故障会增加双绞线电缆对串扰的敏感性?", "choices": [ "打开", "短的", "拆分对子", "转置对" ], "answer": "C", "solution": "分裂对是一种连接方式,其中两根电线在电缆的两端被错误地映射。电缆一端的每个引脚都正确地连接到了另一端对应的引脚,但用于连接的电线却是错误的。在正确连接中,每个双绞线应包含一个信号线和一个地线。在分裂对中,可能会有两根信号线被扭在一起成为一对。这可能会产生过多的串扰,破坏涉及到的两个信号。开路、短路和转位对会干扰电缆的性能,但不会使其更容易受到串扰的影响。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1439", "type": 0, "question": "高级网络管理员在配置跨越多个城市的公司网络设备时遇到了困难。这是一个挑战,因为他们需要在每个建筑物的网络基础设施现场进行配置。有什么经济实惠的解决方案吗?", "choices": [ "在每个建筑物雇用网络管理员。", "转换为扁平化网络。", "培训一名本地销售代表。", "雇用基于云的网络控制器。" ], "answer": "D", "solution": "将网络配置迁移到云端可以让网络管理员在不需要出差的情况下执行他们的职责。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1440", "type": 0, "question": "网络设备组的有效用途是什么?", "choices": [ "作为构建ISE分阶段部署的不同策略集的条件", "作为处理传入身份验证协议类型的条件", "作为确定路由认证请求到哪个ISE策略节点的条件", "作为允许用户登录并控制分配的网络设备组中的设备的条件" ], "answer": "A", "solution": "使用NDG作为条件,为ISE分阶段部署构建不同的策略集。", "topic": [ "Cisco ISE的初始配置" ] }, { "id": "Wired Network-1441", "type": 0, "question": "以下哪个Power over Ethernet(PoE)规范使用10Base-T或100Base-TX双绞线网络上的备用线对设备供电?", "choices": [ "4PPoE", "备选项 A", "备选项B", "以上所有选项。" ], "answer": "C", "solution": "备选方案B的PoE变体可以利用CAT 5或更好的10Base-T或100Base-TX电缆中的备用线对连接设备供电。备选方案A和4PPoE变体不能以这种方式使用备用线对设备供电;它们使用同时传输数据的线对来供电。对于千兆以太网或更快的安装,备选方案B还可以使用数据线对。", "topic": [] }, { "id": "Wired Network-1442", "type": 0, "question": "以下哪个描述了网络生命周期中经常使用的正式设计过程?", "choices": [ "FRA", "IEEE", "PPDIOO", "PBR" ], "answer": "C", "solution": "PPDIOO是一个包含六个阶段的生命周期过程,分别是:准备、规划、设计、实施、运营和优化。", "topic": [ "无线设计要求" ] }, { "id": "Wired Network-1443", "type": 0, "question": "HSRPv2中新增了哪个HSRP功能?", "choices": [ "大于255的数字分组。", "虚拟 MAC 地址", "跟踪", "优先权" ], "answer": "A", "solution": "在HSRP版本1中,组号限制在0到255范围内。HSRP版本2将组号范围扩展到0到4095。", "topic": [ "在数据中心实现路由" ] }, { "id": "Wired Network-1444", "type": 0, "question": "Ralph有一个有线家庭网络,有三台Windows电脑、一个交换机和一个提供互联网访问的电缆调制解调器/路由器。其中一台电脑能够连接到其他两台电脑,但无法连接到互联网。以下哪个配置参数是Ralph最有可能需要更改以解决这个问题?", "choices": [ "IP地址", "子网掩码", "默认网关", "MAC地址" ], "answer": "C", "solution": "问题很可能是默认网关地址,它将所有旨在前往互联网的流量指向电缆调制解调器/路由器。如果该地址不正确,则流量将永远无法到达路由器。因为计算机可以访问本地网络上的其他两个系统,所以互联网协议(IP)地址和子网掩码不是问题。在Windows工作站上更改媒体访问控制(MAC)地址并非必要(也不总是可能)。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1445", "type": 0, "question": "域名服务(DNS)服务器中的A记录在您的网络中扮演什么角色?", "choices": [ "将人名转换为IP地址", "将IP地址转换为人类可读的名称", "使得从一个设备上可以打印、复印和传真。", "控制网络数据包以优化性能。" ], "answer": "A", "solution": "DNS将人类可读的名称翻译成IP地址,以便通过互联网路由数据包。主机可以接收此DNS服务器的IP地址,然后将主机名解析为IP地址。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1446", "type": 0, "question": "以下关于DHCP Snooping的哪个陈述不正确?", "choices": [ "DHCP Snooping可以检测到非法的DHCP服务器。", "DHCP Snooping是在网络交换机中实现的。", "DHCP Snooping会丢弃从错误端口到达的DHCP消息。", "DHCP Snooping可以防止DNS缓存污染。" ], "answer": "D", "solution": "动态主机配置协议(DHCP)监听是一种在某些网络交换机中发现的功能,可以防止流氓DHCP服务器向客户端分配IP地址。它还可以检测DHCP释放或拒绝消息是否到达与DHCP事务发起的端口不同的端口。虽然DHCP监听可以防止DHCP客户端被分配错误的IP地址,但它并不能直接防止域名系统(DNS)服务器缓存被错误信息污染。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1447", "type": 0, "question": "哪种类型的电缆在两个连接器上的引脚顺序相同?", "choices": [ "交叉线缆", "直通线缆", "控制台线。", "电话电缆" ], "answer": "B", "solution": "直通电缆,也称为下降电缆或补丁电缆,在两个连接器上的引脚顺序相同。", "topic": [ "数据中心架构和云概念" ] }, { "id": "Wired Network-1448", "type": 0, "question": "以下哪个选项正确地指定了802.11b、802.11a和802.11n标准的最大理论数据速率?", "choices": [ "11 Mbps, 54 Mbps, 600 Mbps", "54 Mbps, 54 Mbps, 150 Mbps", "1 Mbps, 11 Mbps, 54 Mbps", "11 Mbps, 20 Mbps, 40 Mbps" ], "answer": "A", "solution": "802.11b的最大理论数据传输速率为11 Mbps,802.11a为54 Mbps,802.11n为600 Mbps。", "topic": [ "RF标准" ] }, { "id": "Wired Network-1449", "type": 0, "question": "以下哪个是正确的Open Systems Interconnection (OSI)模型层次结构,从上到下的顺序?", "choices": [ "物理层、数据链路层、传输层、网络层、会话层、表示层、应用层", "应用层,会话层,表示层,传输层,网络层,数据链路层,物理层", "表示层、应用层、传输层、会话层、网络层、物理层、数据链路层", "会话层、应用层、表示层、传输层、数据链路层、网络层、物理层", "应用层,表示层,会话层,传输层,网络层,数据链路层,物理层" ], "answer": "E", "solution": "OSI模型层的正确顺序,从上到下依次为应用层、表示层、会话层、传输层、网络层、数据链路层、物理层。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1450", "type": 0, "question": "TCP/IP参考模型中的哪一层相当于OSI模型中的网络层?", "choices": [ "物理层", "数据链路层", "网络层", "传输层" ], "answer": "C", "solution": "TCP/IP参考模型中的互联网层在功能和特性上对应于OSI模型中的网络层。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1451", "type": 0, "question": "鉴定、序列化和流量控制是哪个OSI层的特征?", "choices": [ "第二层", "第三层", "第四层", "第七层(应用层)" ], "answer": "C", "solution": "可靠的传输层连接使用确认来确保所有数据可靠地接收。可靠连接的定义是使用确认、排序和流量控制,这是传输层(第4层)的特征。", "topic": [ "开放系统互联规范" ] }, { "id": "Wired Network-1452", "type": 0, "question": "一家想要监控网络流量或主机系统行为以识别可疑活动的公司将安装哪种类型的服务?", "choices": [ "代理服务器", "入侵检测系统", "统一媒体跟踪(UTM)", "自动取款机" ], "answer": "B", "solution": "入侵检测系统(IDS)将监视并警报您有关可疑行为的信息。IDS可以是基于网络的设备或基于主机的,这意味着它作为后台进程运行。代理服务器用于控制进出网络的流量。统一威胁管理(UTM)在单个设备上提供多个安全功能。异步传输模式(ATM)涉及在同一通信线路上同时传输不同类型的流量(即语音和数据)。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1453", "type": 0, "question": "以下哪个是“监视器”角色类型的特点?", "choices": [ "所有菜单和设置对用户可见,但不允许进行任何更改。", "你只能看到仪表板页面,无法看到高级用户界面的任何内容。", "所有菜单和设置都对用户可见,可以在客户端页面上执行操作以将端点从 Wi-Fi 中断开,但不允许进行其他配置更改。", "不允许访问用户界面(UI),只允许使用SNMP。" ], "answer": "A", "solution": "MONITOR提供只读访问WLC的方式。所有页面对用户可见,但不允许进行任何更改。", "topic": [ "使用Cisco WLC配置设备管理员AAA" ] }, { "id": "Wired Network-1454", "type": 0, "question": "真或假:OSPF中广告的默认路由总是出现为OSPF区间路由。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "OSPF广播的默认路由总是作为外部路由出现。例外情况是当使用OSPF stub区域时。", "topic": [ "OSPF(Open Shortest Path First)开放式最短路径优先协议。" ] }, { "id": "Wired Network-1455", "type": 0, "question": "真或假:要将MED用作选择标准,路由必须来自不同的自治系统。 \n\n答案:真。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。要使用MED,路由必须来自同一个自治系统。", "topic": [ "高级BGP" ] }, { "id": "Wired Network-1456", "type": 0, "question": "哪个命令可以让你指定使用本地数据库进行SSH访问认证?", "choices": [ "登录", "本地登录", "默认登录认证", "传输输入 ssh。" ], "answer": "B", "solution": "命令 **login local** 可以让你指定使用本地数据库进行 SSH 访问认证。", "topic": [ "设备管理和管理工具故障排除" ] }, { "id": "Wired Network-1457", "type": 0, "question": "以下哪项技术不使用“虚拟桌面”这个术语?Ralph遇到了“虚拟桌面”这个术语,他不确定它的确切含义。在进行了一些互联网搜索后,他找到了多个定义。", "choices": [ "使用虚拟现实硬件设备创建的计算机显示的三维实现。", "一个具有虚拟操作系统桌面的计算机显示器,其大小超出了显示器的显示范围。", "一种基于云的Windows 10部署,使用户可以使用任何远程设备访问他们的桌面。", "一种硬件设备,可以将计算机桌面投影到屏幕上,而不是在显示器上显示。" ], "answer": "D", "solution": "“虚拟桌面”一词并不是指一种可以在屏幕上显示计算机桌面的投影设备。虚拟桌面可以是在虚拟现实环境中实现的计算机显示器;也可以是比显示器更大的虚拟化桌面,用户可以滚动查看显示的所有部分;或者是由Microsoft Azure提供的基于云的服务,为用户提供使用远程设备访问其桌面的功能。", "topic": [ "网络安全" ] }, { "id": "Wired Network-1458", "type": 0, "question": "网络管理员希望能够远程清除公司智能手机上的所有内容,如果它们丢失或被盗。他们需要哪种类型的服务?", "choices": [ "MAM", "MDM", "Two-factor authentication", "Location services" ], "answer": "B", "solution": "移动设备管理(MDM)是一种服务类型,允许网络管理员指定哪些移动设备可以加入网络。它还赋予管理员远程锁定和完全擦除移动设备的能力。移动应用程序管理(MAM)允许管理员控制移动设备上的企业应用程序。双因素身份验证是一种安全概念。位置服务可以帮助找到移动设备,但无法远程擦除它。", "topic": [ "移动连接和应用支持" ] }, { "id": "Wired Network-1459", "type": 0, "question": "你正在开发一种设备,可以显示以下信息:", "choices": [ "Sandbox", "Managed switch", "NID", "Spam gateway" ], "answer": "B", "solution": "在这种情况下,你很可能正在使用一台可管理的交换机。可管理的交换机允许管理员登录并查看/修改交换机的配置,包括IP地址等项目。管理接口在思科交换机中很常见。这种情况是基于思科SG200智能交换机的。 \n\n注: \n\n为了练习,可以在https://community.cisco.com/t5/small-business-support-documents/200-series-smart-switches-online-device-emulators/ta-p/3173055上查看思科交换机仿真器。", "topic": [] }, { "id": "Wired Network-1460", "type": 0, "question": "当Windows服务器上的服务无法启动时,通常会在以下哪个事件日志中创建一个条目?", "choices": [ "应用程序", "安全性", "设置", "系统" ], "answer": "D", "solution": "在Windows系统中,有关服务的信息,包括成功启动和失败,都记录在系统事件日志中。应用程序、安全性和设置日志通常不包含此类信息。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1461", "type": 0, "question": "在RESTCONF操作中,应提供哪些标头和值来标识意图以JSON格式接收结果?", "choices": [ "内容类型:应用程序/JSON", "内容类型:应用程序/yang-data+json", "接受:应用程序/JSON", "接受:应用程序/yang-data+json" ], "answer": "D", "solution": "Accept头部标识了请求者希望以特定格式接收数据的意图。对于来自YANG启用的端点的JSON编码数据,application/yang-data+json的值是正确的。答案A是不正确的,因为头部不是Content-Type,值也不是application/json。答案B是不正确的,因为头部不是Content-Type,即使值是正确的。答案C是不正确的,因为它具有正确的Accept头部类型,但application/json的值是不正确的。", "topic": [ "NETCONF和RESTCONF" ] }, { "id": "Wired Network-1462", "type": 0, "question": "默认情况下,EIGRP复合度量的计算包括哪些参数?", "choices": [ "带宽和负载。", "带宽和延迟", "带宽和可靠性", "带宽和最大传输单元(MTU)" ], "answer": "B", "solution": "EIGRP的默认度量标准是带宽和延迟。", "topic": [ "路由协议特性、EIGRP和IS-IS" ] }, { "id": "Wired Network-1463", "type": 0, "question": "使用哪种组播技术可以避免组播环路?", "choices": [ "DF election (this is a most plausible distractor)", "RPF", "PIM-SSM", "PIM-BSR" ], "answer": "B", "solution": "反向路径转发(RPF)是网络中的第三层节点用于在没有环路的情况下最优地转发多播数据报的机制。", "topic": [ "多播设计" ] }, { "id": "Wired Network-1464", "type": 0, "question": "以下哪个AAA功能可以帮助记录用户在网络设备上执行的命令?", "choices": [ "AAA下一代日志记录。", "授权", "会计学", "审计" ], "answer": "C", "solution": "会计提供了跟踪和记录用户访问的能力,包括用户身份、开始和结束时间、执行的命令(即CLI命令)等等。换句话说,它维护了一个安全事件日志。", "topic": [ "网络设备访问控制和基础设施安全" ] }, { "id": "Wired Network-1465", "type": 0, "question": "思科安全架构框架被称为______。", "choices": [ "思科安全应用与事件分析框架(Cisco Security Application and Event Analysis Framework,SEAF)", "思科安全恶意软件分析", "思科安全加固架构(Cisco SAFE)", "思科验证设计" ], "answer": "C", "solution": "思科SAFE是思科安全架构框架。", "topic": [ "安全网络访问控制" ] }, { "id": "Wired Network-1466", "type": 0, "question": "哪个UPS值假定所有连接的设备都在拉取最大功率?", "choices": [ "最大负载", "伏特安培。", "通用产品代码 (UPC)", "容量" ], "answer": "D", "solution": "容量值假定所有连接的设备都在拉取最大功率,但它们很少这样做。作为一个经验法则,如果你将VA乘以0.6,你将得到你的UPS在任何特定时间可能承受的最大负载的粗略估计。", "topic": [ "利用统计数据和传感器确保网络可用性" ] }, { "id": "Wired Network-1467", "type": 0, "question": "以下哪个不是SNMP操作?", "choices": [ "获得", "社区", "集合", "陷阱" ], "answer": "B", "solution": "社区不是SNMP操作。", "topic": [ "IP组播和网络管理" ] }, { "id": "Wired Network-1468", "type": 0, "question": "以下哪种协议最适合用于具有设备管理AAA的细粒度命令级控制?", "choices": [ "DIAMETER", "TACACS+", "RADIUS", "RADIUS+" ], "answer": "B", "solution": "TACACS+最适合进行细粒度命令级别的控制,因为它能够将身份验证和授权分开。", "topic": [ "AAA的基本原理" ] }, { "id": "Wired Network-1469", "type": 0, "question": "哪种设备监测输入电压水平和过电压阈值?", "choices": [ "中继器。", "音频探针", "VOM", "浪涌保护器" ], "answer": "D", "solution": "为了确保交流电功率水平符合规格,需要使用测量插座。它们还可以缓解过电压条件,以保护连接的设备。", "topic": [ "电缆连接问题和工具" ] }, { "id": "Wired Network-1470", "type": 0, "question": "上行MACsec和下行MACsec有什么区别?", "choices": [ "上行MACsec定义了从端点进入交换机的加密流量,下行MACsec是离开交换机、发送到端点的加密流量。", "上行MACsec和下行MACsec之间没有区别。", "区别仅仅基于所使用的加密算法。", "上行MACsec定义了网络基础设施组件之间的加密连接,下行MACsec定义了接入层设备和终端之间的加密连接。" ], "answer": "D", "solution": "上行MACsec定义了网络基础设施组件之间的加密连接,下行MACsec定义了接入层设备和终端之间的加密连接。虽然上行MACsec和下行MACsec今天使用不同的密钥机制,但两者仍然使用相同的加密算法,即AES-GCM-128。", "topic": [ "TrustSec和MACsec" ] }, { "id": "Wired Network-1471", "type": 0, "question": "如果一个数据包的目的地是远程网络,那么帧需要将其传输到哪里?", "choices": [ "默认网关", "邻居主机", "交换机", "集线器。" ], "answer": "A", "solution": "我希望你说的是A!数据包必须被传送到路由器才能通过网络进行路由。", "topic": [ "IP路由介绍" ] }, { "id": "Wired Network-1472", "type": 0, "question": "在路由器R1的Gigabit Ethernet 0/1配置模式下,以下哪个命令可以将该路由器的G0/1接口设置为单播IPv6地址2001:1:1:1:1:200:1:A,前缀长度为/64,该接口的MAC地址已设置为0200.0001.000A?", "choices": [ "ipv6 address 2001:1:1:1:1:200:1:A/64", "ipv6 address 2001:1:1:1:1:200:1:A/64 eui-64", "ipv6 address 2001:1:1:1:1:200:1:A /64 eui-64", "ipv6 address 2001:1:1:1:1:200:1:A /64", "None of the other answers are correct." ], "answer": "A", "solution": "唯一正确的答案列出了与问题中列出的完全相同的IPv6地址,具有/64前缀长度,并且答案的语法中没有空格。另一个(不正确的)答案完全相同,只是在地址和前缀长度之间留下了一个空格,这是不正确的语法。列出**eui-64**参数的两个答案列出了一个地址而不是前缀;它们应该列出一个前缀才能正确,尽管两者都不会导致问题中列出的IPv6地址。", "topic": [ "在路由器上实现IPv6地址分配" ] }, { "id": "Wired Network-1473", "type": 0, "question": "一个用户报告称他们无法访问互联网或公司服务器。然而,他们仍然能够打印到附近的打印机。他们没有收到任何错误消息。该区域的其他用户也无法访问互联网。最有可能的问题是什么?", "choices": [ "IP地址冲突", "默认网关离线。", "错误的子网掩码。", "网络适配器故障。" ], "answer": "B", "solution": "你可以立即排除客户端硬件问题,因为用户可以连接到某些资源。你需要找出他们为什么无法连接到其他资源。这很可能是由两个原因之一引起的:配置问题或连接设备(如路由器)问题。由于影响了多个人,所以很可能与路由器(默认网关)有关。", "topic": [ "硬件和网络故障排除" ] }, { "id": "Wired Network-1474", "type": 0, "question": "你被要求为一组几所大学提供建议,他们想要合并研究努力并将数据存储在云中。哪种类型的云解决方案可能最适合他们?", "choices": [ "公共的", "私人的", "社区", "混合的" ], "answer": "C", "solution": "当有多个具有类似目标的组织想要在云中合并努力时,最好的选择通常是社区云。这允许在公共云中通常找到的灵活性和可扩展性,但它也将用户数量限制在更小、可信赖的群体内。", "topic": [ "网络服务、虚拟化和云计算" ] }, { "id": "Wired Network-1475", "type": 0, "question": "哪种与SD-Access的无线集成使用CAPWAP作为控制平面和数据平面的协议?", "choices": [ "无线织物网络", "过度的,过分的,夸张的", "本地模式", "FlexConnect(灵活接入)" ], "answer": "B", "solution": "通过超越式的无线集成SD-Access架构,AP的控制平面和数据平面流量使用基于CAPWAP的隧道。", "topic": [ "SD-Access设计" ] }, { "id": "Wired Network-1476", "type": 0, "question": "以下哪个控制器接口将 WLAN 映射到 VLAN?", "choices": [ "桥接接口", "虚拟接口", "无线局域网接口", "动态界面" ], "answer": "D", "solution": "一个动态接口在控制器内部建立了一个 WLAN 和 VLAN 之间的逻辑连接。", "topic": [ "构建无线局域网" ] }, { "id": "Wired Network-1477", "type": 0, "question": "由微软开发的哪个TCP/IP协议使用3389端口连接到远程计算机?", "choices": [ "远程桌面协议(RDP)", "中小型企业(Small and Medium-sized Businesses)", "CIFS(Common Internet File System)是一种用于在计算机网络上共享文件和打印机的协议。它是一种基于客户端/服务器模型的协议,通常用于在Windows操作系统之间共享文件和资源。", "远程登录协议(Telnet)" ], "answer": "A", "solution": "由微软开发的远程桌面协议(RDP)允许用户连接到远程计算机,并像坐在计算机前一样运行程序。它使用端口3389。端口与特定协议相关联,必须在路由器上“打开”,以允许程序或协议的流量进入局域网。IP地址和端口的组合被认为是一个套接字。IP地址将数据发送到正确的目的地,端口号告诉OSI模型的传输层将数据发送到哪个应用程序。服务器消息块(SMB)和公共互联网文件系统(CIFS)用于在网络上共享文件。Telnet是一种不安全的协议,已被安全外壳(SSH)协议大量取代。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1478", "type": 0, "question": "在呼叫环路检测模式中,使用了哪个组件来防止环路反馈的发生?", "choices": [ "呼叫信令优化", "呼叫序列号", "电话标签", "目标终端别名" ], "answer": "C", "solution": "Cisco Expressway 上的呼叫循环检测模式设置可以防止搜索循环发生。每个搜索都有一个呼叫序列号和呼叫标记。序列号对于搜索是唯一的,但呼叫标记信息是通过位置请求(LRQ)传递的。Expressway 使用标记来识别已经接收并因此被忽略的呼叫,从而防止回路错误的发生。", "topic": [ "多站点协作解决方案" ] }, { "id": "Wired Network-1479", "type": 0, "question": "真或假:一个具有与区域1和区域2相关联的接口的路由器将能够将从一个区域学习到的路由注入到另一个区域。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。路由器需要在区域0中拥有一个接口,以便它可以成为ABR。", "topic": [ "高级开放最短路径优先协议(Advanced OSPF)。" ] }, { "id": "Wired Network-1480", "type": 0, "question": "在URI 中,哪个部分标识了Web服务器?", "choices": [ "http", "[blog.certskills.com](http://blog.certskills.com)", "[certskills.com](http://certskills.com)", "", "The file name.html includes the hostname." ], "answer": "B", "solution": "请注意,主机名是在“//”和“/”之间的所有文本。在“//”之前的文本标识应用层协议,在“/”之后的文本表示网页的名称。", "topic": [ "TCP/IP传输和应用介绍" ] }, { "id": "Wired Network-1481", "type": 0, "question": "如果交换机收到一帧数据,源MAC地址不在MAC地址表中,但目标地址在表中,交换机会如何处理这帧数据?", "choices": [ "将其丢弃并向原始主机发送错误消息。", "将帧洪泛到网络中。", "将源地址和端口添加到MAC地址表中,并将帧转发到目标端口。", "将目的地添加到MAC地址表中,然后转发帧。" ], "answer": "C", "solution": "因为源MAC地址不在MAC地址表中,交换机将把源地址和其连接的端口添加到MAC地址表中,然后将帧转发到出端口。", "topic": [ "交换和虚拟局域网" ] }, { "id": "Wired Network-1482", "type": 0, "question": "假设您在控制器上搜索无线客户端并注意到它已经关联。以下哪个参数将确认客户端已经完成与控制器的关联过程并准备好传递数据?", "choices": [ "客户端的IP地址", "AP名称和IP地址", "关联AP状态", "运行策略管理器状态" ], "answer": "D", "solution": "从控制器的角度来看,客户端必须经历一系列状态变化,才能完全关联并加入网络。只有当客户端处于“运行”状态时,它才是完全可操作的。", "topic": [ "无线局域网连接故障排除" ] }, { "id": "Wired Network-1483", "type": 0, "question": "以下哪个术语最能描述由于网络拥塞、不同的路由或排队问题而导致的有线网络连接问题中的单个数据包延迟?", "choices": [ "延迟", "衰减", "抖动", "瓶颈。" ], "answer": "C", "solution": "当数据流中的单个数据包被延迟时,所产生的连接问题被称为“抖动”。虽然这种情况可能不会对异步应用程序造成问题,但实时通信,如互联网语音电话(VoIP)或流媒体视频,可能会遭受中断,从而得名。延迟描述的是网络传输的一般性延迟,而不是单个数据包的延迟。衰减是信号在通过网络介质传输时的衰弱。瓶颈是一种情况,所有流量都因故障或不足的组件而延迟。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1484", "type": 0, "question": "以下哪个命令正确配置了静态路由?", "choices": [ "将目的地址为10.1.3.0/24的数据包通过下一跳地址10.1.130.253进行路由。", "将10.1.3.0的路由指向串口0。", "将10.1.3.0/24路由到10.1.130.253。", "将10.1.3.0/24网段的数据包通过串口0转发。" ], "answer": "A", "solution": "正确的语法应列出子网号,然后是点分十进制表示的子网掩码,接着是出口接口或下一跳IP地址。", "topic": [ "配置IPv4地址和静态路由" ] }, { "id": "Wired Network-1485", "type": 0, "question": "在自组网拓扑结构中,两台计算机使用IEEE 802.11无线局域网进行通信需要哪些组件?", "choices": [ "连接到互联网的路由器", "无线接入点(WAP)", "一个外置天线", "以上选项均不正确。" ], "answer": "D", "solution": "临时网络拓扑描述了无线计算机之间直接通信的情况,不需要除无线网络适配器以外的任何硬件。因此,临时网络拓扑不需要路由器、互联网连接、接入点(AP)或特殊天线。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1486", "type": 0, "question": "什么是抖动?", "choices": [ "由阻抗不匹配引起的回波。", "网络中的数据包丢失", "接收数据包的可变延迟", "接收数据包的固定延迟" ], "answer": "C", "solution": "Jitter是指在网络传输过程中,例如IP电话语音通话中的数据包中,每个数据包延迟量的方差。", "topic": [ "语音和视频设计" ] }, { "id": "Wired Network-1487", "type": 0, "question": "你有一个包含一个中心节点和三个分支节点的DMVPN网络。分支节点没有学习到其他分支节点的路由。以下选项中,最有可能的原因是什么?", "choices": [ "分割视界已在分支GRE接口上启用。", "中心节点的mGRE接口启用了分割视域。", "中心节点的mGRE接口已禁用分裂视野。", "分割视图在 spoke 的 GRE 接口上被禁用。" ], "answer": "B", "solution": "当在中心的mGRE接口启用分割视界时,分支将不会学习其他分支的路由。", "topic": [ "IPv4的EIGRP故障排除" ] }, { "id": "Wired Network-1488", "type": 0, "question": "以下哪个物理层收发器模块标准是最古老且因此最过时的?", "choices": [ "SFP", "SFP+", "GBIC", "QSFP", "QSFP+" ], "answer": "C", "solution": "千兆接口转换器(GBIC)收发器标准于1995年首次发布,定义了最大数据传输速率为1.25 Gbps。它被2001年引入的小型可插拔(SFP)标准所取代,后者在相同的最大速度下尺寸更小。随后的标准变化,如SFP+、四通道小型可插拔(QSFP)和QSFP+,定义了具有更快传输速率的设备。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1489", "type": 0, "question": "什么是监控模式?", "choices": [ "802.1X启用接口上的身份验证开放接口配置命令", "ISE中的一个设置,可以记录操作但不执行它们。", "在故障发生之前,识别哪个设备未通过身份验证并纠正根本原因的方法。", "一种通知管理员认证失败的方法,以便可以联系终端用户并手动授予网络访问权限。" ], "answer": "C", "solution": "解释:监视模式是一个过程,不仅仅是交换机上的一个命令。该过程涉及启用身份验证(使用“authentication open”),查看哪些设备失败和哪些设备成功,并在它们引起任何问题之前纠正失败的身份验证。", "topic": [ "安全部署" ] }, { "id": "Wired Network-1490", "type": 0, "question": "故障排除模型中的哪个步骤涉及识别最近是否安装或重新配置了硬件或软件?", "choices": [ "识别症状", "建立一个可能原因的理论。", "制定解决问题的行动计划并确定可能的影响。", "确定是否有任何变化。", "测试该理论以确定原因。", "记录发现、行动和结果。" ], "answer": "D", "solution": "在故障排除过程中,你必须确定是否有任何变化。通常需要询问用户是否安装或重新配置了任何新的或现有的硬件或软件。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1491", "type": 0, "question": "LSDB中的LSA Age字段用于什么?", "choices": [ "版本控制,以确保最新的LSA存在。", "当LSA的年龄达到零时,通过删除LSA来使其过时。", "为了故障排除,确定LSA何时被广告。", "当LSA达到3600秒时,通过删除LSA来使其过时。" ], "answer": "D", "solution": "当链路状态广告(LSA)达到3600秒时,它们被视为无效,并从链路状态数据库(LSDB)中清除。", "topic": [ "高级开放最短路径优先协议(Advanced OSPF)。" ] }, { "id": "Wired Network-1492", "type": 0, "question": "DMVPN第2阶段和DMVPN第3阶段在分支路由器上的配置差异是什么?", "choices": [ "使用ip nhrp shortcut命令。", "使用命令ip nhrp redirect", "使用命令ip nhrp version 3", "配置没有任何区别。" ], "answer": "A", "solution": "在DMVPN第三阶段中,必须在分支路由器的隧道接口上启用NHRP快捷方式。", "topic": [ "DMVPN隧道" ] }, { "id": "Wired Network-1493", "type": 0, "question": "大楼人力资源区域约有四名电脑用户抱怨他们的Wi-Fi连接非常缓慢。您使用Wi-Fi分析仪发现他们与隔壁办公室的邻居使用相同的信道。您可以怎么做?", "choices": [ "将无线电信号设置为最大。", "更改WAP使用的信道。", "添加另一个无线接入点。", "检查从WAP到路由器的电缆。" ], "answer": "B", "solution": "首先尝试的最佳选项是更改无线接入点(WAP)使用的信道进行连接。间歇性连接可能是由于与邻近的Wi-Fi干扰造成的。增加WAP的功率只会使您的Wi-Fi与邻居的Wi-Fi之间的交叉更大。如果问题是由于用户过多,则添加另一个WAP可能会有所帮助,但在该区域仅有四个用户,这并不是问题所在。如果更改信道无法解决问题,则可以检查从WAP到路由器的电缆。", "topic": [] }, { "id": "Wired Network-1494", "type": 0, "question": "当对IPv6地址块进行子网划分时,工程师展示了一张图,将地址结构分为三个部分。将这个概念与IPv4地址结构的三部分进行比较,IPv6地址结构中哪个部分最像IPv4地址的网络部分?答案是IPv6地址结构中的前缀部分(Prefix),它类似于IPv4地址的网络部分。", "choices": [ "子网。", "接口标识符", "网络", "全局路由前缀", "子网路由器任播" ], "answer": "D", "solution": "全局路由前缀是由某个编号机构分配给组织的地址块,表示为前缀值和前缀长度。公司内部的所有IPv6地址在其IPv6地址的初始位中具有相同的值。同样,当公司使用公共IPv4地址块时,所有地址在网络部分具有相同的值。", "topic": [ "IPv6地址分配和子网划分" ] }, { "id": "Wired Network-1495", "type": 0, "question": "以下哪些不是有效的B类网络ID?", "choices": [ "130.0.0.0", "191.255.0.0", "128.0.0.0", "150.255.0.0", "All are valid Class B network IDs." ], "answer": "E", "solution": "所有的B类网络的第一个八位字节的值都在128到191之间(包括128和191)。网络ID的第一个八位字节可以在128-191范围内取任何值,第二个八位字节可以取0到255之间的任何值,最后两个八位字节必须为0。其中两个答案在第二个八位字节中显示了255,这是可以接受的。另外两个答案在第二个八位字节中显示了0,这也是可以接受的。", "topic": [ "分析类别化IPv4网络" ] }, { "id": "Wired Network-1496", "type": 0, "question": "以下哪个不是FCoE单跳拓扑结构?", "choices": [ "FCoE直连拓扑结构", "FCoE远程附加拓扑", "FCoE FEX 拓扑结构", "FCoE远程附加FEX拓扑结构" ], "answer": "D", "solution": "当使用思科Nexus交换机部署FCoE时,有三种单跳解决方案可供选择:FCoE直连拓扑、FCoE FEX拓扑和FCoE远程连接拓扑。", "topic": [ "实施FCoE统一网络。" ] }, { "id": "Wired Network-1497", "type": 0, "question": "您可以在接入点上配置优先级值以完成以下哪项任务?", "choices": [ "设置控制器时,它将首先尝试加入。", "定义加入控制器时首选哪些AP。", "设置将首先广告的SSID。", "识别加入最轻负载的控制器" ], "answer": "B", "solution": "AP优先级决定当控制器填满AP时,哪些AP可以加入控制器。", "topic": [ "设计高可用性" ] }, { "id": "Wired Network-1498", "type": 0, "question": "SIP终端身份验证使用哪种协议?", "choices": [ "Digest", "MD5", "235", "NTP" ], "answer": "A", "solution": "SIP使用称为Digest的加密过程,而H.323使用称为H.235的加密标准。 H.235和Digest都使用称为消息摘要算法5(MD5)的系统,该系统使用来自时间服务器的时间戳作为其加密密钥的一部分。因此,无论您是使用具有身份验证的H.323还是SIP,都必须确保Expressway和注册到其上的设备都指向相同的NTP(网络时间协议)服务器或同步集群。", "topic": [ "在Cisco Expressway上注册" ] }, { "id": "Wired Network-1499", "type": 0, "question": "在租用线路(如T-1或T-3)的分界点通常会发现以下哪种硬件组件?", "choices": [ "终结者", "插线板", "110型接线块", "智能插座", "CSU/DSU(数字信号转换器/数字信号调制解调器)" ], "answer": "D", "solution": "在租用线路的分界点处的网络接口设备(NID)可以是简单的RJ-45插孔,但许多服务提供商安装了智能插孔,这些插孔还可以提供信号转换、诊断测试和其他功能。割线块、110块和信道服务单元/数据服务单元(CSU/DSU)都是位于分界点内、在用户私有网络上的电信组件。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1500", "type": 0, "question": "当您启动动态主机配置协议(DHCP)客户端时,它会传输DHCPDISCOVER消息以定位并与DHCP服务器建立联系。客户端为此目的使用以下哪种类型的传输?", "choices": [ "广播", "多播", "任播", "单播。" ], "answer": "A", "solution": "DHCP客户端使用广播在本地网络上传输DHCPDISCOVER消息。然后DHCP服务器需要响应广播。DHCP客户端不能使用单播、组播或任播消息与DHCP服务器建立联系,因为客户端无法学习到DHCP服务器的地址。", "topic": [] }, { "id": "Wired Network-1501", "type": 0, "question": "在一个路由器上,默认情况下启用了OSPF和EIGRP两个协议。这两个协议的数据库中都有到达目标网络的路由。那么哪个路由会被输入到路由表中?", "choices": [ "OSPF路由已输入。", "EIGRP路由已输入。", "两条路线都采用负载均衡技术。", "两条路线都没有输入;发生了错误。" ], "answer": "B", "solution": "OSPF的管理距离为110。EIGRP的管理距离为90。选择管理距离较低的路由:EIGRP。", "topic": [ "路由协议特性、EIGRP和IS-IS" ] }, { "id": "Wired Network-1502", "type": 0, "question": "一个策略映射是如何处理的?", "choices": [ "突然间,匹配最佳的分类图。", "从上到下匹配适用的第一类地图。", "从下往上匹配,找到适用的第一类地图。", "它们不被处理;类映射被处理。" ], "answer": "B", "solution": "策略映射是自上而下处理的,匹配第一个适用的类别映射。", "topic": [ "基础设施安全" ] }, { "id": "Wired Network-1503", "type": 0, "question": "地址127.0.0.1属于IPv4的哪个类?", "choices": [ "A类班级", "B班级", "C类", "以上选项均不正确。" ], "answer": "D", "solution": "地址127.0.0.1是指定的IPv4本地回环地址,因此它是保留的。它位于A类和B类之间,A类的第一个八位值为1到126,B类的第一个八位值为128到191。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1504", "type": 0, "question": "如果您拥有一个IPv4网络地址为192.168.1.32/27,那么您可以用于工作站的有效主机地址范围是什么?", "choices": [ "192.168.1.33到192.168.1.63。", "192.168.1.33到192.168.1.62。", "192.168.1.34到192.168.1.62。", "192.168.1.34到192.168.1.63。" ], "answer": "B", "solution": "使用192.168.1.32作为网络地址,掩码为27位,子网掩码值为二进制形式下的11111111.11111111.11111111.11100000,或者十进制形式下的255.255.255.224。这留下5位用于主机标识符。因此,有效的主机位范围是00001(1)到11110(30)。这给出了一个范围,从192.168.1.32 + 1(33)到192.168.1.32 + 30(62)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1505", "type": 0, "question": "OSPF类型1 LSA会被洪泛到哪里?", "choices": [ "OSPF区域", "OSPF域", "从该区域到OSPF骨干区。", "通过虚拟链接" ], "answer": "A", "solution": "类型1 LSA(路由器LSA)会被转发到OSPF区域内的所有路由器。", "topic": [ "OSPF、BGP、路由操作和IP组播" ] }, { "id": "Wired Network-1506", "type": 0, "question": "在她公司的数据中心工作时,爱丽丝注意到大多数网络交换机端口上的发光二极管(LED)是绿色的,但有一些是橙色的。爱丽丝问了几个人为什么会这样,每个人都给了她不同的答案。以下哪个答案是正确的?", "choices": [ "橙色LED指示没有设备连接到交换机端口。", "橙色LED指示连接的设备正在经历过多的冲突。", "橙色LED指示设备连接到交换机的速度相对较慢。", "橙色LED指示连接的设备是其他交换机,而不是工作站。" ], "answer": "C", "solution": "绿色LED指示设备正在以交换机支持的最高速度运行,而橙色LED则表示设备正在以降低的速度运行。如果没有设备连接,则LED不会亮起。该LED不指示碰撞的发生或连接到端口的设备类型。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1507", "type": 0, "question": "以下哪个是每次启动时通过网络传输的操作系统镜像?", "choices": [ "虚拟网络计算机(VNC)", "虚拟桌面", "远程桌面", "远程桌面协议(RDP)" ], "answer": "B", "solution": "虚拟桌面需要更少的计算能力,特别是如果应用程序也是通过虚拟方式交付,并且这些应用程序在云中的虚拟机中运行,而不是在本地桌面上占用本地资源。", "topic": [ "远程访问安全" ] }, { "id": "Wired Network-1508", "type": 0, "question": "您正在手动配置网络上的TCP/IP主机。哪个配置参数指定了启用Internet访问的路由器的内部地址?", "choices": [ "子网掩码", "动态主机配置协议(DHCP)服务器", "DNS服务器", "默认网关" ], "answer": "D", "solution": "默认网关是位于路由器局域网侧的网络路由器地址。路由器允许主机与不在本地网络上的主机通信。默认网关也称为路由器的内部地址。可以使用“ipconfig /all”命令查看本地计算机当前配置的默认网关地址。路由器还将具有外部地址,用于与局域网外的网络通信。几乎所有现代路由器都使用称为网络地址转换(NAT)的过程,当请求来自远程网络的信息时,将替换主机的IP地址为路由器的外部地址。路由器知道请求信息的主机,并在接收到信息时将其传递给正确的主机。这是路由器保护本地主机免受外部世界影响的方式之一。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1509", "type": 0, "question": "Ralph正在为一家企业客户设计混合部署,该部署需要在客户的私有网络和公共云提供商之间建立连接。客户担心在用户流量繁忙时,这种连接会成为速度瓶颈。以下哪个选项是Ralph可以向客户提供的最佳解决方案,以解决这个潜在问题?", "choices": [ "使用不同的互联网服务提供商进行云连接。", "使用VPN进行云连接。", "使用云直连连接进行混合链接。", "使用租用线路连接到互联网服务提供商。" ], "answer": "C", "solution": "云直连是客户私有网络和云服务提供商之间的私有连接。该连接独立于客户组织用于其他流量的任何ISP连接,因此它确保混合云网络的一致带宽。使用不同的ISP或租用线路并不能完全替代连接;仍然存在潜在的瓶颈。VPN可以提供比标准连接更好的性能和更高的安全性,但它不像直接云连接那样一致(或昂贵)。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1510", "type": 0, "question": "哪种类型的网络连接最不可能在平板电脑上找到?", "choices": [ "无线网络", "蓝牙", "RJ-45(Registered Jack-45)是一种常用于计算机网络中的连接器,用于连接以太网设备,包括计算机、路由器、交换机等。它通常有8个金属接触点,可以支持高速数据传输。", "细胞的" ], "answer": "C", "solution": "RJ-45是一种8针连接器,通常用于将计算机连接到局域网(LAN)。平板电脑是为移动通信而设计的。因此,大多数平板电脑都配备了Wi-Fi和蓝牙,并且许多平板电脑也具有蜂窝网络功能。", "topic": [ "移动设备" ] }, { "id": "Wired Network-1511", "type": 0, "question": "你正在为公司的新分支机构设计网络,需要一个设备,管理员可以在上面创建虚拟局域网(VLAN),并在它们之间转发流量。以下哪种类型的设备可以做到这一点?", "choices": [ "虚拟路由器", "多层交换机", "宽带路由器", "负载均衡器" ], "answer": "B", "solution": "多层交换机是一种网络连接设备,可以在开放式系统互联(OSI)参考模型的数据链路层(第2层)和网络层(第3层)中发挥作用。在第2层,该设备像普通交换机一样运行,为每个连接的节点创建一个单独的冲突域,并使管理员能够创建多个虚拟局域网(VLAN)。在第3层,该设备还通过在VLAN之间转发数据包来提供路由功能。虚拟路由器、负载均衡器和宽带路由器是严格的第3层设备,可以路由流量,但不能创建VLAN。", "topic": [] }, { "id": "Wired Network-1512", "type": 0, "question": "如果客户端无 SSL VPN 书签变灰并且无法工作,最可能的问题是什么?", "choices": [ "WebACL正在拒绝访问。", "存在DNS解析问题。", "AAA授权未能正常工作。", "该书签缺少URL信息。" ], "answer": "B", "solution": "如果书签变灰,ASA 就无法再访问它,这很可能是 DNS 解析问题。", "topic": [ "远程访问 VPN 故障排除" ] }, { "id": "Wired Network-1513", "type": 0, "question": "巨型帧功能与开放式系统互联(OSI)模型的哪一层相关?", "choices": [ "应用程序", "运输", "网络", "数据链路" ], "answer": "D", "solution": "以太网在数据链路层使用巨型帧来更高效地传输大量数据。以太网通常将帧大小限制为1500字节,但巨型帧使以太网系统能够创建高达9000字节的帧。帧是仅与数据链路层相关联的协议数据单元,因此不适用于网络、传输或应用层。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1514", "type": 0, "question": "真或假:流量分类应该总是在网络的核心进行。", "choices": [ "正确的,真实的,符合事实的", "错误的,不正确的。" ], "answer": "B", "solution": "数据包分类应该在网络边缘尽可能靠近流量源头的地方进行,以提供端到端的QoS体验。", "topic": [ "服务质量(QoS)" ] }, { "id": "Wired Network-1515", "type": 0, "question": "如果使用Cisco UCS Manager从织物互连中删除虚拟局域网(VLAN),会发生什么?", "choices": [ "属于该VLAN的端口被分配到默认VLAN。", "该VLAN所属的端口被固定到本地VLAN。", "您无法删除该VLAN,因为某个接口成员属于该VLAN。", "该端口变为关闭状态。" ], "answer": "D", "solution": "当您删除指定的VLAN时,与该VLAN相关联的端口将被关闭,不会有任何流量从中流出。", "topic": [ "思科统一计算系统概述" ] }, { "id": "Wired Network-1516", "type": 0, "question": "考虑MDT外拨模式,哪个陈述是正确的?", "choices": [ "该设备是客户端和数据源,遥测接收器是服务器。", "该设备是被动的;遥测接收器发起连接并请求数据。", "该设备处于活动状态;遥测接收器发起连接请求,请求数据。", "该设备是服务器,遥测接收器是客户端。", "该设备不维护任何配置;遥测接收器会更新对该设备的订阅。" ], "answer": "A", "solution": "在MDT中,设备是遥测数据的权威来源。在呼出模式下,设备将遥测数据推送到接收器/收集器。答案B是不正确的,因为它描述了呼入模式,并且错误地表示设备是被动的。答案C是不正确的,因为它描述了呼入模式模型。答案D是不正确的,因为在呼出模式下,遥测接收器仍被视为服务器。答案E是不正确的,因为它描述了呼入模式,其中接收器拨入网络设备并动态订阅一个或多个传感器路径。", "topic": [ "模型驱动遥测" ] }, { "id": "Wired Network-1517", "type": 0, "question": "以下哪个不是解决IEEE 802.11g无线电脑与IEEE 802.11b/g接入点(AP)连接时出现间歇性问题的潜在解决方案?", "choices": [ "在接入点上安装一个增益更高的天线。", "将AP替换为支持802.11n的型号。", "将计算机移近接入点。", "更改AP使用的信道。" ], "answer": "B", "solution": "仅仅将AP更换为802.11n型号并不会有任何效果,除非您也升级计算机的网络适配器。在AP上安装更高增益的天线可以改善其范围,使计算机更容易连接。将计算机移近AP可以增强信号并提高其接收信号强度指示器(RSSI),使其更可靠地连接。将AP的信道更改为使用较少的信道可以使计算机更容易连接。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1518", "type": 0, "question": "真或假:成员路由器包含路由域中每个区域的完整LSDB副本。 \n\n答案:真。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。OSPF路由器仅包含其参与的区域的LSDB副本。", "topic": [ "高级开放最短路径优先协议(Advanced OSPF)。" ] }, { "id": "Wired Network-1519", "type": 0, "question": "用于控制和监控工业机器和过程的系统是什么类型的,它由硬件和软件组成?", "choices": [ "监控与数据采集系统(SCADA)", "红外数据关联(IrDA)", "统一媒体跟踪(UTM)", "半径(网络安全中的一种认证协议)" ], "answer": "A", "solution": "监控与数据采集系统(SCADA)由硬件和软件组成。硬件用于收集信息,将其发送到运行软件的计算机上进行数据分析和事件记录。SCADA还可以在特定条件存在时发出警报。红外数据协会(IrDA)是通过红外线进行网络通信。统一威胁管理(UTM)是一种将所有恶意软件安全性合并在一个地方的设备、软件或服务。远程身份验证拨号用户服务(RADIUS)是一种用于身份验证服务器的协议,可以加密客户端和服务器之间的传输。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1520", "type": 0, "question": "哪种设备会用于警报系统过热?您在服务器房安装了新的交换机,现在所有机架上的服务器都出现了网络不稳定和其他问题。", "choices": [ "电压事件记录器", "温度监测器", "浪涌保护器", "探针" ], "answer": "A", "solution": "这表明当您插入开关时,您超出了机架中可用的电压,因为所有其他设备开始出现问题。", "topic": [ "电缆连接问题和工具" ] }, { "id": "Wired Network-1521", "type": 0, "question": "SD-Access使用哪种控制平面?", "choices": [ "LISP控制平面", "EPVN MP-BGP", "多播", "VXLAN控制平面" ], "answer": "A", "solution": "SD-Access 织物控制平面基于 Locator/ID Separation Protocol (LISP)。", "topic": [ "Fabric Technologies(面料技术)" ] }, { "id": "Wired Network-1522", "type": 0, "question": "哪种组播协议消除了RP和共享树?", "choices": [ "PIM-SM", "BIDIR-PIM", "SSM", "MSDP" ], "answer": "C", "solution": "SSM消除了RPs和共享树,只建立了一个SPT。", "topic": [ "IP组播和网络管理" ] }, { "id": "Wired Network-1523", "type": 0, "question": "用户周末到达办公室,周末关闭的主机重新启动,但无法访问局域网或互联网。未关闭的主机正常工作。问题可能出在哪里?", "choices": [ "DNS服务器", "DHCP服务器", "代理服务器", "防火墙" ], "answer": "B", "solution": "如果DHCP服务器停止工作,它将无法向重新启动的主机分配IP地址。但是,没有关闭的主机仍然具有IP地址,因为租约时间尚未到期。", "topic": [ "网络设备" ] }, { "id": "Wired Network-1524", "type": 0, "question": "以下哪个工具类似于Telnet,但与Telnet不同的是,你不会得到命令行提示符,而是会得到远程计算机的实际图形用户界面(GUI)?", "choices": [ "基于角色的访问控制(RBAC)", "SSH(Secure Shell)安全外壳协议。", "远程桌面协议(RDP)", "SSL(Secure Sockets Layer)安全套接层。" ], "answer": "C", "solution": "远程桌面协议(RDP)是由微软开发的专有协议。它允许您连接到另一台计算机并运行程序。RDP的操作方式有点像Telnet,但与Telnet不同的是,您可以获得远程计算机的实际图形用户界面(GUI),而不是像Telnet一样获得命令行提示符。", "topic": [ "远程访问安全" ] }, { "id": "Wired Network-1525", "type": 0, "question": "以下哪种高可用性技术需要路由协议扩展?", "choices": [ "NSR", "SSO/NSF", "Graceful Restart (GR)", "RNS" ], "answer": "C", "solution": "优雅重启(GR)使用路由协议扩展来通知BGP邻居路由器,正在进行RP切换的路由器可以继续转发数据包,但可能会短暂地中断其路由邻居关系。", "topic": [ "企业网络架构" ] }, { "id": "Wired Network-1526", "type": 0, "question": "网络设备通常针对哪种类型的流量做出路由和转发决策,以确定是否将流量发送到直接连接的节点?", "choices": [ "非IP流量", "接收IP流量", "中转IP流量", "异常IP流量" ], "answer": "C", "solution": "转发IP流量是指网络设备根据典型的路由和转发决策,决定是否将流量发送到直接连接的节点的流量。", "topic": [ "安全" ] }, { "id": "Wired Network-1527", "type": 0, "question": "“Layer 3漫游”一词是指在思科统一无线网络中哪种类型的客户端漫游?", "choices": [ "自主AP漫游", "控制器内漫游", "控制器漫游", "RRM漫游。" ], "answer": "C", "solution": "当客户端从一个控制器移动到另一个控制器,并且客户端的IP子网在控制器之间发生变化时,Intercontroller漫游支持第3层漫游。", "topic": [ "了解漫游" ] }, { "id": "Wired Network-1528", "type": 0, "question": "您配置了移动设备连接到165信道的Wi-Fi网络。以下哪个频率是无线连接使用的?", "choices": [ "4千兆赫兹", "40兆赫ertz", "5千兆赫(GHz)", "13.56兆赫ertz" ], "answer": "C", "solution": "无线连接使用5 GHz频段。802.11n、802.11ac和802.11ax使用5 GHz频段。5 GHz Wi-Fi的典型信道包括36、40、44、48、149、153、157、161和165。", "topic": [] }, { "id": "Wired Network-1529", "type": 0, "question": "以下哪个可以用来为非无线设备提供无线连接?", "choices": [ "无线中继器", "工作组桥接器", "透明桥接", "自适应桥。" ], "answer": "B", "solution": "工作组桥接器充当无线客户端,但将流量桥接到连接到它的有线设备。", "topic": [ "无线网络基础" ] }, { "id": "Wired Network-1530", "type": 0, "question": "哪种思科产品可以在WAN故障时为远程分支IP电话提供备份呼叫代理冗余?", "choices": [ "统一通信管理器", "统一CME", "统一 SRST", "思科统一边界元素" ], "answer": "C", "solution": "统一 SRST 提供一个呼叫代理,使远程分支 IP 电话在广域网故障或中断的情况下能够进行本地注册,以确保远程统一通信管理器无法访问。", "topic": [ "统一的CME和SRST" ] }, { "id": "Wired Network-1531", "type": 0, "question": "哪种工具可以用来在两个割线块之间连接电线?", "choices": [ "割线钳", "压线钳", "剪刀", "剥线器" ], "answer": "A", "solution": "正如其名称所示,冲击工具用于将电线“冲”入电缆块中。压接钳用于将插头安装在电缆末端,而剪刀和剥线钳用于准备电缆。", "topic": [ "电缆连接问题和工具" ] }, { "id": "Wired Network-1532", "type": 0, "question": "小型办公室/家庭办公室(SOHO)网络通常使用多功能连接设备,可以执行以下所有功能,除了哪一个?", "choices": [ "动态主机配置协议(DHCP)", "DNS(Domain Name System)域名系统。", "交换机", "路由器", "集线器。", "网络地址转换路由器", "接入点(AP)" ], "answer": "E", "solution": "SOHO多功能设备通常作为路由器,将本地网络连接到互联网服务提供商(ISP),交换机提供有线连接到主机设备,动态主机配置协议(DHCP)服务器分配IP地址,域名系统(DNS)服务器将名称解析为IP地址,网络地址转换(NAT)路由器为主机提供私有IP地址访问互联网,以及提供无线设备访问网络的AP。它们不作为集线器。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1533", "type": 0, "question": "你使用什么协议在自治系统之间交换IP路由?", "choices": [ "IGMP", "eBGP", "EIGRP", "OSPF" ], "answer": "B", "solution": "你可以使用外部边界网关协议(eBGP)在自治系统之间交换路由。", "topic": [ "OSPF、BGP和路由操作" ] }, { "id": "Wired Network-1534", "type": 0, "question": "在本地模式下部署更高吞吐量的无线技术时,必须考虑与物理基础设施可能出现的过度订阅相关的设计方面。", "choices": [ "应考虑接入交换机的上行链路能力。", "应考虑接入交换机和AP之间的物理连接。", "连接控制器的骨干网络的性能应与整体无线性能需求相匹配。", "应考虑控制器的性能能力。", "以上所有选项。" ], "answer": "E", "solution": "这些方面中的每一个都可能成为可能的拥塞点,并需要分析可能的过度订阅问题。", "topic": [ "物理和逻辑基础设施要求" ] }, { "id": "Wired Network-1535", "type": 0, "question": "以下哪种技术是BGP最佳路径的第二选择标准?", "choices": [ "重量", "本地优先级", "起源", "医学(Medical)" ], "answer": "B", "solution": "本地偏好是BGP最佳路径的第二个选择标准。", "topic": [ "高级BGP" ] }, { "id": "Wired Network-1536", "type": 0, "question": "在三层网络中,服务器连接在哪个层级?", "choices": [ "核心", "分配", "聚合", "访问" ], "answer": "D", "solution": "核心层提供高速互联,聚合/分发层提供服务和接入交换机连接,接入层是服务器等设备连接到网络的地方。", "topic": [ "数据中心架构和云概念" ] }, { "id": "Wired Network-1537", "type": 0, "question": "以下哪个TCP/IP路由协议在其路由更新消息中不包括子网掩码,从而无法支持子网划分?", "choices": [ "路由信息协议,版本1(RIPv1)", "路由信息协议第二版(RIPv2)", "边界网关协议(BGP)", "开放最短路径优先(OSPF)" ], "answer": "A", "solution": "RIPv1在其更新中不包括子网掩码。RIPv2支持子网划分,并在其更新中包括每个网络地址的子网掩码。OSPF和BGP都在其更新中包括子网掩码。", "topic": [ "网络实现" ] }, { "id": "Wired Network-1538", "type": 0, "question": "以下哪个命令显示网络接口卡的MAC地址?", "choices": [ "ping", "ipconfig /all", "ipconfig", "ipconfig /release" ], "answer": "B", "solution": "“ipconfig /all” 显示了很多信息,包括 MAC 地址、DNS 服务器、DHCP 信息等等。其他错误答案包括:普通的 “ipconfig” 只显示 IP 地址、子网掩码和网关地址;“ping” 用于测试网络上其他计算机是否在线;“ipconfig/release” 用于解决 DHCP 获取的 IP 地址问题,通常与 “ipconfig/renew” 一起使用。", "topic": [] }, { "id": "Wired Network-1539", "type": 0, "question": "以下哪个是为Unix sendmail程序提供日志记录服务而创建的?", "choices": [ "系统日志", "网络状态 (Netstat)", "简单网络管理协议(SNMP)", "鲤鱼" ], "answer": "A", "solution": "Syslog是一种标准,旨在促进由设备或进程生成的日志条目(例如sendmail简单网络管理协议(SMTP)服务器)通过Internet协议(IP)网络传输到称为syslog服务器的消息收集器。Netstat是一个显示有关系统网络连接状态信息的程序;它不提供日志记录服务。SNMP是一种协议,可将网络管理信息从代理传输到中央控制台;它并非专门为sendmail创建。缓存阵列路由协议(CARP)使代理服务器能够交换信息;它不提供日志记录服务。", "topic": [ "网络运营" ] }, { "id": "Wired Network-1540", "type": 0, "question": "以下哪个描述正确地描述了通过捆绑控制器的所有分发系统端口形成的单个逻辑链接?", "choices": [ "物理学", "数字信号处理", "延迟", "全球企业挑战赛(GEC)" ], "answer": "C", "solution": "控制器使用链路聚合组(LAG)将端口捆绑在一起。", "topic": [ "实施基于控制器的部署" ] }, { "id": "Wired Network-1541", "type": 0, "question": "以下哪种情况是使用邻居区域的适当用途?", "choices": [ "将统一通信管理器邻近到Expressway核心。", "毗邻高速公路核心区到高速公路边缘区。", "邻近高速公路边缘到高速公路边缘", "将高速公路边缘邻近到DNS服务器。" ], "answer": "C", "solution": "邻居区域本质上是一个可以用于连接相同网络类型的设备的主干线路。这些区域可用于连接内部网络上的两个Expressway核心或DMZ或公共网络上的两个Expressway边缘。邻居区域不用于连接Expressway核心和Expressway边缘。尽管这些设备本质上是相同的,但它们所操作的网络参数不同。在这种情况下应该使用遍历区域,这将在第10章中讨论。您还可以使用邻居区域将Expressway核心连接到统一通信管理器,但统一通信管理器使用SIP主干线路连接到Expressway核心。", "topic": [ "多站点协作解决方案" ] }, { "id": "Wired Network-1542", "type": 0, "question": "一旦NPV边缘交换机向NPV核心交换机(NPIV)注册,NPV边缘交换机将所有后续来自终端设备的FLOGI转换为哪种消息类型?", "choices": [ "NPV FLOGI", "FDISCs", "PLOGI", "PLRI" ], "answer": "B", "solution": "当建立NP上行链路时,边缘交换机向核心交换机发送一个面向织物的登录消息(FLOGI),然后(如果FLOGI成功),它会在核心交换机上向名称服务器注册自己。连接到此NP上行链路的终端设备的后续FLOGI将转换为面向织物的发现消息(FDISC)。", "topic": [ "实现光纤通道。" ] }, { "id": "Wired Network-1543", "type": 0, "question": "真或假:MST根桥向所有其他MST交换机广告VLAN到实例的映射。", "choices": [ "正确的", "错误的,不正确的。" ], "answer": "B", "solution": "错误。MST使用内部生成树(IST)来广告自身和其他MST实例以建立拓扑。本地交换机配置将VLAN关联到MST实例。", "topic": [ "多重生成树协议(Multiple Spanning Tree Protocol)" ] }, { "id": "Wired Network-1544", "type": 0, "question": "哪个TCP/IP实用程序最常用于测试IP主机是否正常运行?", "choices": [ "`ftp`", "`telnet`", "`ping`", "`netstat`" ], "answer": "C", "solution": "程序“Packet Internet Groper”(`ping`)用于确定主机是否已初始化IP堆栈。", "topic": [ "网络软件工具和命令" ] }, { "id": "Wired Network-1545", "type": 0, "question": "以下哪种连接 ACI 一定会阻止?", "choices": [ "APIC到叶子交换机的布线。", "叶间连线", "脊到叶布线", "脊柱对脊柱布线" ], "answer": "D", "solution": "自从ACI硬件首次发货以来,APIC到叶子交换机的连接以及叶子到脊柱交换机的连接一直是有效的连接选项。在ACI多层叶子到叶子的布线中,只要布线连接了一个Tier 1叶子交换机和一个Tier 2叶子交换机,就是可接受的。截至本文撰写时,还没有脊柱到脊柱的连接用例。当ACI检测到脊柱到脊柱的连接时,会禁用这种连接。", "topic": [ "理解ACI硬件和拓扑结构" ] }, { "id": "Wired Network-1546", "type": 0, "question": "接收器从远处的发射器接收到射频信号。以下哪一个代表接收到的最佳信号质量?示例值在括号中给出。", "choices": [ "信噪比低(10 dB),接收信号强度指示低(-75 dBm)", "高信噪比(30 dB),低接收信号强度指示(RSSI)(-75 dBm)。", "信噪比低(10 dB),接收信号强度高(-55 dBm)。", "高信噪比(30 dB),高接收信号强度指示(RSSI)(-55 dBm)。" ], "answer": "D", "solution": "高信噪比最好,其中接收信号强度高于噪声底噪。30 dBm的信噪比比10 dBm的信噪比更能将信号与噪声分离。同样,更高的RSSI值意味着信号强度更高。当以dBm为单位呈现RSSI值时,请记住0 dBm是高的,而100 dBm非常低。", "topic": [ "无线信号和调制" ] }, { "id": "Wired Network-1547", "type": 0, "question": "一个IPv6接口最多可以分配多少个IPv6地址?", "choices": [ "一(单播)", "两种(单播和任播)", "三种(单播、任播和组播)", "以上选项均不正确。" ], "answer": "D", "solution": "IPv6接口在可分配的地址数量上没有限制,尽管基于实际情况可能存在限制。", "topic": [ "TCP/IP介绍" ] }, { "id": "Wired Network-1548", "type": 0, "question": "OTV联合接口是什么?", "choices": [ "一个第二层的接入或干道接口。", "一种逻辑多接入和多播能力的接口", "与同一VPN中的其他OTV边缘设备形成OTV邻接关系的接口", "一个仅使用组播来转发 OTV 流量的第三层接口。" ], "answer": "C", "solution": "加入接口用于源OTV封装流量并将其发送到数据中心网络的第三层域。", "topic": [ "实施数据中心覆盖协议" ] }, { "id": "Wired Network-1549", "type": 0, "question": "哪个命令可以使路由器接口从DHCP服务器获取IP地址?", "choices": [ "IP DHCP客户端", "IP DHCP服务器", "IP地址动态获取(DHCP)", "IP帮助地址" ], "answer": "C", "solution": "\"ip address dhcp\"命令用于启用路由器接口从DHCP服务器获取IP地址。", "topic": [ "IPv4/IPv6 地址分配和路由回顾" ] }, { "id": "Wired Network-1550", "type": 0, "question": "以下哪个不是站点到站点VPN架构的部署模型?", "choices": [ "全网状拓扑", "集线式网络(Hub-and-spoke)。", "辐条式网格。", "点对点(直接通信)" ], "answer": "C", "solution": "Mesh-to-spoke这个术语没有意义,也不是官方架构。完全网状、集线器-辐射和辐射-辐射网络都是站点到站点VPN架构的部署模型。", "topic": [ "虚拟专用网络(VPN)介绍" ] }, { "id": "Wired Network-1551", "type": 0, "question": "无线客户端维护一个NAV值,用于以下哪个目的?", "choices": [ "通过 ESS 导航框架", "识别下一个要传输的客户端的MAC地址", "预测通道何时可能空闲。", "设置客户端传输能力的优先级" ], "answer": "C", "solution": "无线客户端使用网络分配向量(NAV)来预测需要多少个时隙才能使信道空闲,以便传输帧。", "topic": [ "理解802.11帧类型" ] }, { "id": "Wired Network-1552", "type": 0, "question": "关于“authentication open”命令,以下哪个陈述是正确的?", "choices": [ "认证开放命令执行EAP认证,但忽略授权结果。", "认证开放命令执行EAP认证,但忽略访问拒绝响应。", "认证开放命令忽略 EAP 认证,只允许对网络上的设备进行监控。", "认证开放命令用于配置没有Wi-Fi保护设置的网络。" ], "answer": "B", "solution": "“解释:身份验证开放”会忽略RADIUS访问拒绝响应,但会尊重并执行所有其他授权结果。", "topic": [ "安全部署" ] }, { "id": "Wired Network-1553", "type": 0, "question": "你已经在平板电脑上启用了GPS服务。你的平板电脑需要与多少颗GPS卫星联系才能确定自己的位置?", "choices": [ "一个", "两个", "三", "四" ], "answer": "C", "solution": "GPS系统被设计为需要多颗卫星。接收器使用一种称为三角定位的过程,通过计算接收信号所需的时间来计算自身与卫星之间的距离,从而确定其位置。它们需要来自四颗卫星的输入才能提供位置和海拔高度,或者三颗卫星的输入才能提供位置。", "topic": [ "移动设备" ] }, { "id": "Wired Network-1554", "type": 0, "question": "以下哪个选项不是站点到站点VPN高可用性选项?", "choices": [ "热备份", "冷备份", "主备/备用", "主/备(双活)" ], "answer": "A", "solution": "热备机制本质上是另一个处于待机模式的系统,使其成为一种主备选项。", "topic": [ "站点到站点的虚拟专用网络(VPN)" ] }, { "id": "Wired Network-1555", "type": 0, "question": "当用户打电话报告无法连接到互联网时,以下哪项步骤是你最不可能首先执行的?", "choices": [ "检查连接局域网(LAN)和互联网的路由器配置。", "询问用户是否可以访问本地网络资源。", "检查是否有其他人遇到了相同的问题。", "检查用户的职位头衔,看她是否是公司中的重要人物。" ], "answer": "A", "solution": "有很多可能导致问题的原因,比路由器配置错误更有可能,所以这不是你应该首先检查的。询问用户是否可以访问本地网络是为了隔离问题。如果她不能访问,则问题可能在她的计算机中;如果她可以访问,则问题可能在互联网接入基础设施中。如果其他用户也遇到了这个问题,那么这个问题应该得到更高的优先级,你也会确定问题不在用户的计算机中。虽然用户的职称可能不是你首先检查的事情,但高级用户得到优先处理是政治现实。", "topic": [] }, { "id": "Wired Network-1556", "type": 0, "question": "以下哪种书签类型不被Cisco ASA默认支持?", "choices": [ "CIFS(Common Internet File System)是一种用于在计算机网络上共享文件和打印机的协议。它是一种基于客户端/服务器模型的协议,通常用于在Windows操作系统之间共享文件和资源。", "远程桌面协议(RDP)", "超文本传输协议(HTTP)", "DNS(Domain Name System)域名系统。" ], "answer": "B", "solution": "在配置书签时,Cisco ASA默认支持CIFS和HTTP书签。您可以通过安装适当的客户端/服务器插件启用RDP书签。DNS不是受支持的书签类型。", "topic": [ "ASA上的无客户端远程访问SSL VPN" ] }, { "id": "Wired Network-1557", "type": 0, "question": "由于最近发生了安全漏洞,您的IT团队关闭了外部防火墙上的几个端口。现在,用户无法通过使用URL访问网站,但是他们可以通过使用IP地址访问。IT团队需要重新打开哪个端口以通过URL启用Internet访问?", "choices": [ "20/21", "53", "67/68", "80" ], "answer": "B", "solution": "客户端无法访问解析主机名(或URL)为IP地址的DNS服务器。DNS使用端口53。端口20和21用于文件传输协议(FTP)。动态主机配置协议(DHCP)使用端口67和68。端口80用于超文本传输协议(HTTP),端口443用于HTTP安全(HTTPS)。", "topic": [ "网络化,联网,网络建设,人际关系网络" ] }, { "id": "Wired Network-1558", "type": 0, "question": "以下哪种连接器类型是MFF连接器?", "choices": [ "BNC", "ST", "SC", "LC" ], "answer": "D", "solution": "本地连接器(LC)是由Lucent Technologies开发的一种迷你型光纤连接器(MFF)。如果有帮助的话,可以将LC看作“小连接器”。", "topic": [ "网络基础知识" ] }, { "id": "Wired Network-1559", "type": 0, "question": "Alice最近在她的千兆以太网网络上安装了一些新的计算机。为了确保最佳的网络性能,她已经配置了新计算机中的网络适配器以运行1 Gbps速度并使用全双工通信。然而,一旦计算机投入使用,Alice开始收到有关这些计算机网络性能极差的报告。她尝试运行一些ping测试,但没有发现任何问题。她召集顾问进行数据包分析,顾问检测到大量的数据包冲突、迟到冲突、循环冗余校验(CRC)错误和短帧。以下哪项可能是问题?", "choices": [ "双工不匹配。", "发送/接收反转", "错误的电缆类型。", "损坏的电缆" ], "answer": "A", "solution": "在全双工网络中不应该出现冲突,因此问题显然与通信的双工方式有关。以双绞线电缆为介质的以太网在最初的半双工模式下,通过同时检测发送和接收(TX/RX)引脚上的数据来检测冲突。在全双工模式下,数据应该同时传输和接收。当连接的一端配置为使用全双工,例如Alice的新电脑,而另一端配置为使用半双工(如交换机必须使用的方式)时,一侧的全双工通信看起来像是半双工侧的冲突。半双工适配器会在每次冲突时发送干扰信号,导致全双工侧接收到不完整的帧。然后双方都开始重新传输帧,导致网络性能急剧下降。ping测试无法检测到问题,因为`ping`一次只会单向传输少量数据。其他选项也可能导致ping测试失败。解决问题的方法是将所有设备配置为自动协商其速度和双工模式。", "topic": [ "网络故障排除" ] }, { "id": "Wired Network-1560", "type": 0, "question": "在EIGRP配置模式下,您应该使用什么命令来确保在EIGRP自治系统中没有任何路由问题,因为您的路由域的IP寻址方案是不连续的?", "choices": [ "不进行自动汇总。", "自动摘要", "被动接口", "网络_IP地址 通配符掩码" ], "answer": "A", "solution": "当你的EIGRP AS采用不连续的IP地址方案时,你需要使用“no auto-summary”命令禁用自动汇总。", "topic": [ "IPv4的EIGRP故障排除" ] }, { "id": "Wired Network-1561", "type": 0, "question": "你正在解决网络连接问题,并想查看本地计算机是否能够访问网络上的特定服务器。你会使用什么命令?", "choices": [ "`ping`", "`tracert`", "`ipconfig`", "`pathping`" ], "answer": "A", "solution": "`ping`(数据包互联网探测器)命令向远程计算机发送一系列四个数据包,并等待回复。如果收到回复,则知道本地计算机能够到达远程主机。它还显示交易所花费的时间。`ping`可以与域名(如`Wiley.com`)或已知的IP地址一起使用。当运行`ping localhost`或`ping 127.0.0.1`或`ping ::1`时,该命令会验证TCP/IP在本地计算机上是否正常工作。`tracert`显示数据包到达目的地所经过的路由器。`ipconfig`命令用于查看网络配置,而`pathping`则是`ping`和`tracert`功能的组合。", "topic": [ "操作系统" ] }, { "id": "Wired Network-1562", "type": 0, "question": "虚拟交换机(vSwitch)与物理交换机有哪些不同之处?", "choices": [ "虚拟交换机具有无限数量的端口,而物理交换机具有特定数量的端口。", "物理交换机通常支持创建VLAN,而虚拟交换机不支持。", "虚拟交换机无法将流量转发到运行它们的主机服务器,而物理交换机可以将流量转发到所有连接的计算机。", "物理交换机始终包括第三层功能,而虚拟交换机则不包括。" ], "answer": "A", "solution": "虚拟交换机可以拥有无限的端口,而物理交换机则受限于设备中物理端口的数量。虚拟和物理交换机都可以支持虚拟局域网(VLAN)。虚拟交换机可以将流量转发到主机服务器。物理交换机并不总是包括第三层(路由)功能。", "topic": [ "网络基础知识" ] } ]