CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies. Ben Piper
Читать онлайн книгу.type. Which of the following is true of this configuration? (Choose two.)They won't form an adjacency.They will form an adjacency.They won't exchange routes.They will exchange routes.
15 You have a router with an interface that's connected to a subnet dedicated to servers. You want to advertise this subnet into OSPF but don't want any servers running OSPF software to form an adjacency with the router. How can you accomplish this?Configure null authentication.Use a distribute list.Advertise a default route.Configure the interface as a passive interface.
16 An OSPF autonomous system boundary router (ASBR) is redistributing the prefix 192.168.0.0/16 into EIGRP AS 1. What is the administrative distance of the route?20110170200
17 Which of the following are considered in calculating an EIGRP metric? (Choose all that apply.)BandwidthDelayMTUReliabilityLatencyWeight
18 Consider the following EIGRP output.P 10.0.36.0/29, 1 successors, FD is 3328via 10.0.45.4 (3328/3072), GigabitEthernet0/3.via 10.0.56.6 (5632/2816), GigabitEthernet0/0.Which of the following is the feasible successor?10.0.36.110.0.56.610.0.45.410.0.36.2
19 What occurs when an eBGP router receives a route that already has its own AS number in the path?Removes the AS and advertises the routeAdvertises the route as isDiscards the routeInstalls the route in its BGP RIBDiscards all routes from the router it received the route from
20 R1 has the prefix 172.16.0.0/16 in its IP routing table, learned from EIGRP AS 16. There are no other BGP, IGP, or static routes in the routing table. You execute the following BGP router configuration commands on R1:network 172.16.0.0 mask 255.255.255.0redistribute eigrp 16Which of the following will be true regarding the route R1 advertises for the 172.16.0.0/16 prefix?172.16.0.0/16 will have an incomplete origin type.172.16.0.0/24 will have an incomplete origin type.R1 will not advertise the 172.16.0.0/16 prefix.172.16.0.0/16 will have an IGP origin type.
21 Consider the following prefix list and route map on router R1:ip prefix-list all-private: 3 entriesseq 5 permit 10.0.0.0/8 le 32seq 10 deny 0.0.0.0/0 le 32route-map allow-public, deny, sequence 10Match clauses:ip address prefix-lists: all-privateSet clauses:Policy routing matches: 0 packets, 0 bytesroute-map R4, permit, sequence 20Match clauses:Set clauses:Policy routing matches: 0 packets, 0 bytesWhich prefix will this route map allow?10.255.255.0/2410.0.0.0/3210.0.0.0/80.0.0.0/0
22 Consider the following output from a NAT router:R2#debug ip natIP NAT debugging is onR2#NAT*: s=7.0.0.12->2.0.0.2, d=10.0.12.1 [155]Which of the following is the inside global address?2.0.0.210.0.12.17.0.0.1210.0.12.155
23 A router running PIM has a single multicast RIB entry marked (223.3.2.1, 239.8.7.6). What does this indicate?The router has received an IGMP Membership Report from 223.3.2.1.239.8.7.6 has sent unicast traffic to 223.3.2.1.223.3.2.1 has sent multicast traffic to 239.8.7.6.The router has received a PIM Join/Graft from 223.3.2.1.
24 Which of the following commands individually configures port address translation?ip nat inside source list 1 pool natpoolip nat inside destination list 1 pool natpool overloadip nat outside source list 1 pool natpool overloadip nat inside source list 1 interface gi0/2 overload
25 Which QoS Class Selector has the lowest priority?CS0CS1CS7EF
26 Which of the following prevent TCP global synchronization? (Choose two.)Explicit congestion notificationPolicingWeighted random early detectionFair queuing
27 Which of the following queues can never exceed its bandwidth allocation during times of congestion?Low-latency queueClass-based weighted fair queuePolicing queuePriority queue
28 What is another term for reflective relay?Virtual network functionVirtual Ethernet bridgeVirtual switchingExternal edge virtual bridging
29 Which of the following might you need to allow in order to use IPsec in transport mode? (Choose two.)TCP port 50IP protocol 50UDP port 500IP protocol 51IP protocol 41
30 By default, what does VXLAN use for MAC address learning? (Choose two.)MulticastEVPNData plane learningControl plane learning
31 What type of encapsulation does SD-Access use?LISPIPsecVXLANGRE
32 Which of the following is not a component of SD-WAN?DTLSBGPOMPIPsec
33 Which of the following HTTP response codes indicates successful authentication using a GET or PUT request?200201204401500
34 You want to control which commands administrators can run on a router. Which of the following should you configure?TACACS+ authorizationRADIUS authorizationLocal authenticationTACACS+ accounting
35 Which of the following can authenticate only a machine but not a user?PEAP802.1XMAC authentication bypassWebAuth
36 Which of the following can't be used to block ARP packets or Spanning Tree BPDUs? (Choose two.)Port ACLVLAN access mapMAC ACLExtended IP ACL
Answers to Assessment Test
1 B. The Data Link layer facilitates data transfer between two nodes. IP addresses are logical addresses based on an abstraction of the Data Link layer. See Chapter 1 for more information.
2 C. A bridge maintains a Media Access Control (MAC) address table that it uses to perform a crude form of routing. This reduces the need for flooding but doesn't reduce the size of the broadcast domain. Bridges forward received frames, thus simulating some of the properties of a shared physical Ethernet cable. Bridges discard frames that fail frame check sequence validation. See Chapter 1 for more information.
3 B, D. Transmission Control Protocol (TCP) uses sequence numbers for ordering and ensuring reliable delivery by detecting lost packets. See Chapter 1 for more information.
4 A, B. You can block VLAN 25 from reaching the switches in two ways. First, you can prune the virtual LAN (VLAN) from the trunk. Second, instead of running a trunk between switches, you can use routed links. See Chapter 2 for more information.
5 D. Because SW1 and SW2 are connected via routed interfaces, they are in separate broadcast domains and hence form separate Spanning Trees. See Chapter 2 for more information.
6 C. Loop Guard will block a VLAN on a port if it doesn't receive Bridge Protocol Data Units (BPDUs) for that VLAN. Unidirectional Link Detection (UDLD) and BPDU Guard can shut down an entire port. BPDU Filter doesn't block traffic. See Chapter 2 for more information.
7 B. Leaf-and-spine architecture is the most scalable choice for networks with predominantly East-West traffic patterns such as data center networks. Routed is not a physical architecture, but rather a layer 2 architecture. See Chapter 3 for more information.
8 A, D. Routed topologies scale better and converge faster than switched topologies, but they require consuming more IP address space. See Chapter 3 for more information.
9 B. EtherChannel doesn't use multicast. Link Aggregation Control Protocol (LACP), which negotiates EtherChannels, and Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP), which are first-hop redundancy protocols (FHRPs), do use multicast. See Chapter 3 for more information.
10 A. An access point (AP) forms a single Control and Provisioning of Wireless Access Points (CAPWAP) tunnel with a wireless LAN controller (WLC). See Chapter 4 for more information.
11 C. In an intracontroller roam, the client associates with a different AP that's connected to the same WLAN controller. Neither the VLAN nor the Service Set Identifier (SSID) changes. Because the client's IP address didn't change, you can conclude this is a layer 2 roam. See Chapter 4 for more information.
12 A, C. 5.4 GHz Wi-Fi standards include 802.11n and 802.11ac, but not 802.11g. 5.4 GHz offers higher throughput, but at the price of increased free space path loss. See Chapter 4 for more information.
13 B. The first Open Shortest Path First (OSPF) router to become active on a subnet becomes the designated router (DR) for the subnet. It's commonly taught that the DR is chosen based on the highest router ID, but the first OSPF router to become active always becomes the DR. A DR election occurs only when the existing DR and backup DR fail. See Chapter 5 for more information.
14 B, C. Network types don't have to match in order to form