0% found this document useful (0 votes)
108 views6 pages

New Question 8june2021

The document contains 17 multiple choice questions about networking topics like SDN, Ethernet standards, wireless security protocols, network device configuration, QoS, syslog, cloud computing, and IPsec. Each question is followed by a short explanation of the answer. The questions cover a wide range of networking technologies and concepts.

Uploaded by

Hoai Duc Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views6 pages

New Question 8june2021

The document contains 17 multiple choice questions about networking topics like SDN, Ethernet standards, wireless security protocols, network device configuration, QoS, syslog, cloud computing, and IPsec. Each question is followed by a short explanation of the answer. The questions cover a wide range of networking technologies and concepts.

Uploaded by

Hoai Duc Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Question 1

Which communication interaction takes place when a southbound API is used?

A. between the SDN controller and PCs on the network


B. between the SDN controller and switches and routers on the network
C. between the SDN controller and services and applications on the network
D. between network applications and switches and routers on the network

Answer: B

Question 2

What is a similarly between 1000BASE-LX and 1000BASE-T standards?

A. Both use the same data-link header and trailer formats


B. Both cable types support LP connectors
C. Both cable types support RJ-45 connectors
D. Both support up to 550 meters between nodes

Answer: A

Explanation

1000BASE-T standard only supports up to 100 meters while 1000BASE-LX is a standard which uses a
1,270–1,355 nm laser for longer wavelength. It has a distance capability of up to 5 kilometers over a
Single-mode fiber -> Answer D is not correct.

1000BASE-LX is an optical fiber Gigabit Ethernet standard so it does not support RJ-45 connectors
directly -> Answer C is not correct.

1000BASE-LX only support LC connectors so answer B is not correct.

Question 3

How does WPA3 improve security?

A. It uses SAE for authentication.


B. It uses a 4-way handshake for authentication.
C. It uses RC4 for encryption.
D. It uses TKIP for encryption.

Answer: A

Explanation

WPA3 incorporates Simultaneous Authentication of Equals (SAE), a secure key establishment protocol
between devices. By using a stronger ‘handshaking’ protocol, users should be protected from
password guessing attempts. For home networks, that equates to password-based authentication
that’s more resilient, even if users choose unsophisticated passwords.

Question 4

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and
Provisioning of Wireless Access Points (CAPWAP) protocol?

A. bridge
B. route
C. autonomous
D. lightweight
 

Answer: D

Explanation

Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight
+ Autonomous: self-sufficient and standalone. Used for small wireless networks.
+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to function.
LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.

Question 5

Refer to the exhibit.

Which change to the configuration on Switch allows the two switches to establish an EtherChannel?

A. Change the protocol to EtherChannel mode on


B. Change the LACP mode to active
C. Change the LACP mode to desirable
D. Change the protocol to PAgP and use auto mode

Answer: B

Question 6

Where does wireless authentication happen?


A. SSID
B. radio
C. band
D. Layer 2

Answer: D

Question 7

What is the path for traffic sent from one user workstation to another workstation on a separate
switch in a three-layer architecture model?

A. access – core – distribution – access


B. access – distribution – distribution – access
C. access – core – access
D. access -distribution – core – distribution – access

Answer: D

Question 8

What are two benefits of FHRPs? (Choose two)

A. They prevent loops in the Layer 2 network.


B. They allow encrypted traffic.
C. They are able to bundle multiple ports to increase bandwidth
D. They enable automatic failover of the default gateway.
E. They allow multiple devices to serve as a single virtual gateway for clients in the network

Answer: D E

Question 9

What is the purpose of an SSID?

A. It provides network security


B. It differentiates traffic entering access points
C. It identities an individual access point on a WLAN
D. It identifies a WLAN

Answer: C

Explanation

Stands for “Service Set Identifier.” An SSID is a unique ID that consists of 32 characters and is used
for naming wireless networks. When multiple wireless networks overlap in a certain location, SSIDs
make sure that data gets sent to the correct destination.

Question 10

What are two characteristics of an SSID? (Choose two)

A. It can be hidden or broadcast in a WLAN


B. It uniquely identifies an access point in a WLAN
C. It uniquely identifies a client in a WLAN
D. It is at most 32 characters long
E. It provides secured access to a WLAN
 

Answer: A D

Explanation

The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless
connectivity. The SSID can consist of up to 32 alphanumeric, case-sensitive, characters.

We can hide a SSID by choosing “Disabled” in the Basic Wireless Settings/Wireless/SSID Broadcast
section.

Question 11

In QoS, which prioritization method is appropriate for interactive voice and video?

A. expedited forwarding
B. traffic policing
C. round-robin scheduling
D. low-latency queuing

Answer: A

Explanation

The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-
time, interactive traffic.

Question 12

An engineer is configuring data and voice services to pass through the same port. The designated
switch interface fastethernet0/1 must transmit packets using the same priority for data when they are
received from the access port of the IP phone. Which configuration must be used?

A. interface fastethernet0/1
switchport priority extend cos 7
B. interface fastethernet0/1
switchport voice vlan untagged

C. interface fastethernet0/1
switchport voice vlan dot1p

D. interface fastethernet0/1
switchport priority extend trust

Answer: D

Explanation

The command “switchport priority extend cos 7” sets the IP phone port to override the priority
received from the PC or the attached device (7 is the highest priority).

The command “switchport priority extend trust” tells the Cisco IP Phone to trust the CoS value of the
connected PC without remark all packets sent form PC to CoS 0, by default.

Question 13

Which port type supports the spanning-tree portfast command without additional configuration?

A. access ports
B. Layer 3 main interfaces
C. Layer 3 subinterfaces
D. trunk ports

Answer: A

Question 14

What is a syslog facility?

A. host that is configured for the system to send log messages


B. password that authenticates a Network Management System to receive log messages
C. group of log messages associated with the configured severity level
D. set of values that represent the processes that can generate a log message

Answer: C

Explanation

Facility levels and syslog levels are different. The purpose of using the facilities is to organize the
syslog messages received on the Syslog server from different sources. The default syslog facility
setting is local7.

Reference: https://www.oreilly.com/library/view/cisco-ios-cookbook/0596527225/ch18s08.html

Question 15
What are two characteristics of a public cloud implementation? (Choose two)

A. It is owned and maintained by one party, but it is shared among multiple organizations
B. It enables an organization to fully customize how it deploys network resources
C. It provides services that are accessed over the Internet
D. It is a data center on the public Internet that maintains cloud services for only one company
E. It supports network resources from a centralized third-party provider and privately-owned virtual
resources

Answer: A C

Explanation

Public clouds are managed by a third-party cloud provider. Public cloud computing resources are
shared among multiple customers, unlike private clouds.

Question 16

Which type of traffic is sent with pure IPsec?

A. broadcast packets from a switch that is attempting to locate a MAC address at one of several
remote sites
B. multicast traffic from a server at one site to hosts at another location
C. spanning-tree updates between switches that are at two different sites
D. unicast messages from a host at a remote site to a server at headquarters

Answer: D

Explanation

Pure IPSec configuration (no GRE tunnel) does not support multicast or broadcast traffic. Spanning-
tree updates use multicast too. -> Answer A, answer B and answer C are not correct.

Question 17

What prevents a workstation from receiving a DHCP address?

A. DTP
B. STP
C. VTP
D. 802.10

Answer: B

Explanation

STP can prevent DHCP clients from getting an IP address because the port doesn’t start forwarding
traffic until STP goes into the forwarding state.

You might also like