New Questions (Added On 30th-Jan-2021)
New Questions (Added On 30th-Jan-2021)
New Questions (Added On 30th-Jan-2021)
=========================
Question 31
Answer: B
Explanation
Question 32
Which resource is able to be shared among virtual machines deployed on the same physical server?
A. applications
B. operating system
C. VM configuration file
D. disk
Answer: D
Question 33
Which implementation provides the strongest encryption combination for the wireless environment?
A. WPA2 + AES
B. WPA + AES
C. WEP
D. WPA + TKIP
Answer: A
Explanation
AES is a more secure encryption protocol introduced with WPA2 and it is currently the strongest
encryption type for WPA2-PSK.
Question 34
A. Use the xml library to parse the data returned by the NETCONF server for the interface’s
configuration.
B. Create an XML filter as a string and pass it to get_config() method as an argument.
C. Create a JSON filter as a string and pass it to the get_config() method as an argument.
D. Use the JSON library to parse the data returned by the NETCONF server for the interface’s
configuration.
Answer: D
Explanation
In the exhibit above, we are getting the running config of the device then we can use JSON library to
filter the data later.
Question 35
A. coordinating VTNs
B. Layer 2 forwarding
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks
Answer: A D
Explanation
Software-defined networking (SDN) and network function virtualization (NFV) have emerged as the
most promising candidates for improving network function and protocol programmability and dynamic
adjustment of network resources. On the one hand, SDN is responsible for providing an abstraction of
network resources through well-defined application programming interfaces. This abstraction enables
SDN to perform network virtualization, that is, to slice the physical infrastructure and create multiple
coexisting application-specific virtual tenant networks (VTNs) with specific quality-of-service and
service-levelagreement requirements, independent of the underlying optical transport technology and
network protocols.
Reference: https://ieeexplore.ieee.org/abstract/document/7331131
Question 36
If a switch port receives a new frame while it is actively transmitting a previous frame, how does it
process the frames?
A. The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.
B. The new frame is delivered first, the previous frame is dropped, and a retransmission request is
sent.
C. The two frames are processed and delivered at the same time.
D. The new frame is placed in a queue for transmission after the previous frame.
Answer: B
Question 37
A. partial mesh
B. full mesh
C. point-to-point
D. hub-and-spoke
Answer: C
Explanation
Advantages
Simplicity: Point-to-point communication links require minimal expertise to install and maintain.
Quality: Point-to-point communication links usually offer high service quality, if they have adequate
bandwidth. The dedicated capacity removes latency or jitter between the endpoints.
Availability: Constant availability is essential for some applications, such as e-commerce. Point-to-
point communication links provide permanent, dedicated capacity, which is required for VoIP or Video
over IP.
Disadvantages
Cost: Point-to-point links are generally the most expensive type of WAN access. The cost of leased-
line solutions can become significant when they are used to connect many sites over increasing
distances. In addition, each endpoint requires an interface on the router, which increases equipment
costs.
Limited flexibility: WAN traffic is often variable, and leased lines have a fixed capacity, so the
bandwidth of the line seldom matches the need exactly. Any change to the leased line generally
requires a site visit by ISP personnel to adjust capacity.
Reference: https://www.ciscopress.com/articles/article.asp?p=2832405&seqNum=5
Question 38
The ntp server 192.168.0.3 command has been configured on Router1 to make it an NTP client of
router 2. Which command must be configured on Router2 so that it operates in server-only mode and
relies only on its internal clock?
A. Router2(config)#ntp passive
B. Router2(config)#ntp master 4
C. Router2(config)#ntp server 172.17.0.1
D. Router2(config)#ntp server 192.168.0.2
Answer: B
Explanation
An Authoritative NTP Server can distribute time even when it is not synchronized to an existing time
server. To configure a Cisco device as an Authoritative NTP Server, use the ntp master [stratum]
command.
Question 39
A network engineer must configured communication between PC A and the File Server. To prevent
interruption for any other communications, which command must be configured?
Answer: C
Explanation
Switch A does not allow VLAN 13 to go through so we must add VLAN 13 to the allowed list of
interface Gi0/1 of SwitchA by the command “switchport trunk allowed vlan add 13”.
Question 40
Why does a switch flood a frame to all ports?
Answer: A
Explanation
If the destination MAC address is not in the CAM table (that is, unknown unicast), the switch sends the
frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It
does not flood the frame out the same port on which the frame was received.
Question 41
When DHCP is configured on a router, which command must be entered so the default gateway is
automatically distributed?
A. default-router
B. default-gateway
C. ip helper-address
D. dns-server
Answer: A
Explanation
The following example shows how to configure a DHCP Server on a Cisco router:
Configuration Description
Router(dhcp- Specifies the subnet and mask of the DHCP address pool
config)#network 10.1.1.0 /
24
Router(dhcp-config)#lease Duration of the lease (the time during which a client computer can
0 12 use an assigned IP address). The syntax is “lease {days[hours]
[minutes] | infinite}”. In this case the lease is 12 hours. The
default is a one-day lease.
Before the lease expires, the client typically needs to renew its
address lease assignment with the server
Router(dhcp-config)#exit
Router(config)# ip dhcp The IP range that a DHCP Server should not assign to DHCP
excluded-address 10.1.1.1 Clients. Notice this command is configured under global
10.1.1.10 configuration mode
Question 42
What is a network appliance that checks the state of a packet to determine whether the packet is
legitimate?
A. Layer 2 switch
B. LAN controller
C. load balancer
D. firewall
Answer: D
Question 43
Answer: D
Question 44
Which command on a port enters the forwarding state immediately when a PC is connected to it?
Answer: C
Explanation
Although this question said “which command on a port” but it gave two answers in global configuration
mode so it is a bit unclear. But we believe the correct answer should be “spanning-tree portfast
default”, which enables PortFast on all non-trunking interfaces.
Note: The command “spanning-tree portfast trunk” enables portfast on a trunk port. The trunk port
enters the STP forwarding-state immediately or upon a linkup event, thus bypassing the listening and
learning states.
Question 45
What is the purpose of a southbound API in a control based networking architecture?
Answer: D
Question 46
Which switch technology establishes a network connection immediately when it is plugged in?
A. UplinkFast
B. PortFast
C. BPDU guard
D. BackboneFast
Answer: B
Explanation
Portfast is often configured on switch ports that connect to hosts. Interfaces with Portfast enabled will
go to forwarding state immediately without passing the listening and learning state. Therefore it can
save about 30 to 45 seconds to transition through these states.
UplinkFast is a Cisco specific feature that improves the convergence time of the Spanning-Tree
Protocol (STP) in the event of the failure of an uplink.
Question 47
A. latency
B. nothing plugged into the port
C. shutdown command issued on the port
D. port security violation
Answer: D
Explanation
When a port security is violated, that port can be put into errdisable state.
Question 48
Which technology is appropriate for communication between an SDN controller and applications
running over the network?
A. OpenFlow
B. Southbound API
C. NETCONF
D. REST API
Answer: D
Explanation
Software-defined northbound application program interfaces (SDN northbound APIs) are usually SDN
RESTful APIs used to communicate between the SDN Controller and the services and applications
running over the network.
Note: OpenFlow and NETCONF are Southbound APIs used for most SDN implementations.
Question 49
Which security program element involves installing badge readers on data-center doors to allow
workers to enter and exit based on their job roles?
Answer: C
Explanation
Badge reader is a small, inexpensive reader connected to the USB port of any PC, which can read the
information encoded on a badge (barcode, microchip or RFID, magnetic stripe) and restore it on any
computer software. An example of badge reader is shown below:
The purpose of access control is to grant entrance to a building or office only to those who are
authorized to be there.
Question 50
Answer: A
Explanation
Only private address of class A (10.0.0.0 – 10.255.255.255) includes 16,777,216 so answer D is not
correct.
Question 51
Which network action occurs within the data plane?
Answer: D
Question 1
What are two improvements provided by automation for network management in an SDN
environment? (Choose two)
Answer: A E
Question 2
A network administrator must to configure SSH for remote access to router R1. The requirement is to
use a public and private key pair to encrypt management traffic to and from the connecting client.
Which configuration, when applied, meets the requirements?
A.
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 1024
B.
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate rsa modulus 1024
C.
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 2048
D.
R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key encrypt rsa name myKey
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
Both RSA, elliptic curve cryptography (ECC) are asymmetrical encryption so it satisfies the
requirement of this question (to use a public and private key pair). Asymmetrical encryption is
different from symmetrical encryption in that to send data in a single direction, two associated keys
are needed. One of these keys is known as the private key, while the other is called the public key.
To generate an Elliptic Curve (EC) key pair, use the crypto key generate ec keysize command in global
configuration mode.
crypto key generate ec keysize {256 | 384} [exportable] [label key-label]
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-cr-
c4.html
-> EC only supports 256 or 384 bit key size -> Answer A and answer C are not correct.
The command “crypto key generate rsa modulus 1024” generate a 1024 bit RSA key pair. Although
1024-bit or smaller key pair should not be used but it is the only correct answer in this question.
Note: The command “crypto key encrypt rsa name …” is used to encrypt the RSA key.
Question 3
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels.
What must be configured to allow clients to preferentially use 5GHz access points?
Answer: A
Explanation
Band selection works by regulating probe responses to clients and it can be enabled on a per-WLAN
basis. It makes 5-GHz channels more attractive to clients by delaying probe responses to clients on
2.4-GHz channels.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-3/config-
guide/b_cg83/b_cg83_chapter_011100.html
Question 4
When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is
supported?
A. Unicode
B. base64
C. ASCII
D. decimal
Answer: C
Explanation
When configuring a WLAN with WPA2 Preshared Key (PSK), we can choose the encryption key format
as either ASCII or HEX.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-
guide/b_wl_16_10_cg/multi-preshared-key.pdf
Question 5
Answer: C
Question 6
What does an SDN controller use as a communication protocol to relay forwarding changes to a
southbound API?
A. XML
B. Java
C. REST
D. OpenFlow
Answer: D
Explanation
OpenFlow and NETCONF are Southbound APIs used for most SDN implementations.
Note: SDN northbound APIs are usually RESTful APIs used to communicate between the SDN
Controller and the services and applications running over the network.
Question 7
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router
R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the
address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the
interface?
Answer: A
Question 8
An administrator must secure the WLC from receiving spoofed association requests. Which steps must
be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an
association request?
A. Enable Security Association Teardown Protection and set the SA Query timeout to 10
B. Enable the Protected Management Frame service and set the Comeback timer to 10
C. Enable 802.1x Layer 2 security and set the Comeback timer to 10
D. Enable MAC filtering and set the SA Query timeout to 10
Answer: B
Explanation
Comeback timer specifies the time which an associated client must wait before the association can be
tried again when first denied with a status code 30.
SA query timeout specifies the amount of time the WLC waits for a response from the client for the
query process.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212576-
configure-802-11w-management-frame-prote.html
Note: We can use either 802.1x or PSK as the authentication key management method so answer C is
not correct.
Question 9
Answer: D
Question 10
Which 802.11 management frame type is sent when a client roams between access points on the
same SSID?
A. Authentication Request
B. Probe Request
C. Reassociation Request
D. Association Request
Answer: C
Explanation
Association request frame – (0x00) Sent from a wireless client, it enables the AP to allocate
resources and synchronize. The frame carries information about the wireless connection including
supported data rates and SSID of the network to the wireless client that wants to associate. If the
request is accepted, the AP reserves memory and establishes an association ID for the device.
Association response frame – (0x01) Sent from an AP to a wireless client containing the acceptance
or rejection to an association request. If it is an acceptance, the frame contains information, such as
an association ID and supported data rates.
Reassociation request frame – (0x02) A device sends a reassociation request when it drops from
range of the currently associated AP and finds another AP with a stronger signal. The new AP
coordinates the forwarding of any information that may still be contained in the buffer of the previous
AP.
Probe request frame – (0x04) Sent from a wireless client when it requires information from another
wireless client.
Reference: https://www.ii.pwr.edu.pl/~kano/course/module8/8.2.1.4/8.2.1.4.html
Question 11
Answer: A
Explanation
At present, there are four kinds of c: OM1, OM2, OM3 and OM4. The letters “OM” stand for optical
multi-mode. OM3 and OM4 fibers will support upcoming 40 and 100 Gb/s speeds. OM2, OM3, OM4 and
OM5 have 50 micron core diameter.
Question 12
Which protocol does an access point use to draw power from a connected switch?
Answer: B
Question 13
A. 0
B. 2
C. 4
D. 6
Answer: D
The highest level is level 0 (emergencies). The lowest level is level 7. By default, the router will send
informational messages (level 6). That means it will send all the syslog messages from level 0 to 6.
Question 14
Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is
configured in desirable or trunk mode?
Answer: D
Explanation
According to the trunking condition table below, we can use either (dynamic) “auto” or (dynamic)
“desirable” mode or even “trunk” mode so in fact this question has three correct answers.
Question 15
An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic. Which
configuration accomplishes this task?
Option A Option B
interface interface
gigabitethernet1/1 gigabitethernet1/1
switchport mode access switchport mode access
switchport access vlan switchport access vlan
300 400
switchport voice vlan switchport voice vlan
400 300
Option C Option D
interface interface
gigabitethernet1/1 gigabitethernet1/1
switchport mode trunk switchport mode trunk
switchport access vlan switchport trunk vlan
300 300
switchport voice vlan switchport trunk vlan
400 400
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Question 16
A. Virtual machines are responsible for managing and allocating host hardware resources
B. Virtual machines are operating system instances that are decoupled from server hardware
C. Virtual machines are the physical hardware that support a virtual environment
D. In a virtual machine environment, physical servers must run one operating system at a time
Answer: A
Question 17
Answer: A
Question 18
Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report
intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent
connectivity issue?
Answer: A
Explanation
The txload and rxload on both sites are 1/255 so the interfaces are not busy in transmitting and
receiving traffic. But the reliability on SiteA is only 166/255 which indicates input and output errors
increase. Reliability is calculated by this formula: reliability = number of packets / number of total
frames.
Question 19
A. Branch-1
B. Branch-2
C. Branch-3
D. Branch-4
Answer: C
Explanation
Priority 0 is the lowest priority of a bridge so it will be elected the root bridge.
Note: The command “root primary” only checks the current root bridge priority and tries to use a
better (lower) priority value to become the new root bridge. But it does not ensure the local switch will
become the root bridge. If another switch has priority of 0 and we issue the “root primary” command
then it will inform that it cannot become root, as it cannot get a value lower than 0.
Question 20
A. Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame
B. Insert the source MAC address and port into the forwarding table and forward the frame to Sales-1
C. Perform a lookup in the MAC address table and discard the frame due to a missing entry
D. Flood the frame out of all ports except on the port where Sales-1 is connected
Answer: B
Explanation
The Sales-1 information was already learned by the switch so it just forwards the frames to Sales-1.
The switch also learns the information of Sales-4 because this is the first time this host communicates
to other hosts.
Question 21
Which technology allows for multiple operating systems to be run on a single host computer?
Answer: D
Question 22
A. interface gi0/1
no cdp enable
B. interface gi0/1
clear cdp table
C. interface gi0/0
no cdp run
D. interface gi0/0
no cdp advertise-v2
Answer: A
Explanation
In order to disable CDP on an interface, we have to use the “no cdp enable” under interface mode.
Question 23
A. FRTS
B. CAR
C. PQ
D. PBR
E. CBWFQ
Answer: C E
Question 24
Answer: D
Question 25
A. array
B. string
C. object
D. Boolean
Answer: C
Explanation
An object is an unordered collection of zero or more name/value pairs. For example {“name”:”John”}.
Objects are denoted by curly brackets, which means that the order is not guaranteed. For example, if
you send a request {“name”:”9tut”,”preferredColor”:”Blue”}, it is not always guaranteed that the
receiver receives them in the same order.
Note: In contrast to object, an array is an ordered sequence of zero or more values. For example
[“a”,”b”,”c”]. Arrays use square brackets to denote arrays. Order is guaranteed in JSON arrays.
Question 26
An engineer needs to add an old switch back into a network. To prevent the switch from corrupting
the VLAN database which action must be taken?
A. Add the switch in the VTP domain with a lower revision number
B. Add the switch in the VTP domain with a higher revision number
C. Add the switch with DTP set to dynamic desirable
D. Add the switch with DTP set to desirable
Answer: A
Question 28
An engineering team asks an implementer to configure syslog for warning conditions and error
conditions. Which command does the implementer configure to achieve the desired result?
A. logging trap 2
B. logging trap 3
C. logging trap 4
D. logging trap 5
Answer: C
Explanation
The highest level is level 0 (emergencies). The lowest level is level 7. If we configure syslog level 4
then it will send all the syslog messages from level 0 to 4.
Question 29
Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right.
Answer:
Explanation
Wireless Standards
IEEE Frequency/Medium Speed Topology Transmission Access
Standar Range Method
d
802.11ac uses dual-band wireless technology, supporting simultaneous connections on both 2.4 GHz
and 5 GHz Wi-Fi devices. 802.11ac offers backward compatibility to 802.11a/b/g/n and bandwidth
rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.
Question 30
A. RADIUS
B. TACACS+
C. Telnet
D. SCP
E. SSH
Answer: C E
Explanation
The service-port interface controls communications through and is statically mapped by the system to
the service port. The service port can be used for out-of-band management.
The service port can obtain an IPv4 address using DHCP, or it can be assigned a static IPv4 address,
but a default gateway cannot be assigned to the service-port interface. Static IPv4 routes can be
defined through the controller for remote network access to the service port.
If the service port is in use, the management interface must be on a different supernet from the
service-port interface.
Question 31
How must router A be configured so that it only sends Cisco Discovery Protocol Information to router
C?
Option A Option B
conf t conf t
RouterA(config)#no cdp run RouterA(config)#cdp run
RouterA(config)#interface RouterA(config)#interface
gi0/0/1 gi0/0/1
RouterA(config)#cdp enable RouterA(config)#cdp enable
Option C Option D
conf t conf t
RouterA(config)#cdp run RouterA(config)#cdp run
RouterA(config)#interface RouterA(config)#interface
gi0/0/0 gi0/0/0
RouterA(config)#cdp enable RouterA(config)#no cdp
enable
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
============================= New Questions (added on 5th-May-2021)
=============================
Question 32
Answer: D
Question 33
A. enable secret
B. enable password-encryption
C. service password-encryption
D. password-encrypt
Answer: C
Explanation
The service password-encryption command will encrypt all current and future passwords so any
password existed in the configuration will be encrypted.