The show cdp neighbors detail command is used to obtain detailed information about directly connected Cisco neighbor devices.
TrueCorrect
The show ip interface brief and show ipv6 interface brief commands are used to display the up or down status and IP address of all interfaces on a device.
TrueCorrect
The show ip route and show ipv6 route commands are used to display the routing table in a router to learn the directly connected neighbors, more remote devices (through learned routes), and the routing protocols that have been configured.
TrueCorrect
The show monitor command is used to verify the SPAN session.
TrueCorrect
The use of BGP is most appropriate when an AS has connections to multiple autonomous systems.
TrueCorrect
These switches provide an application-aware switching fabric and work with an APIC to manage the virtual and physical network infrastructure.
Cisco Nexus 9000 series switchCorrect
This is a point established in a building or complex to separate customer equipment from service provider equipment
demarcation pointCorrect
This is typically regarded as the brains of a device.
control planeCorrect
This type of SDN uses a centralized controller that has knowledge of all devices in the network.
Controller-based SDNCorrect
To verify the state of a GRE tunnel, use the show interface tunnel command.
TrueCorrect
Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement.
99Correct
topology illustrates how devices are logically connected to the network, meaning how devices actually transfer data across the network when communicating with other devices.
logical networkCorrect
topology shows the physical layout of the devices connected to the network.
Physical networkCorrect
transmits bits from one computer to another and regulates the transmission of a stream of bits over the physical medium.
physical layerCorrect
Under which condition does congestion occur on a converged network with voice, video, and data traffic?
if the request for bandwidth exceeds the amount of bandwidth availableCorrect
Use the show ip sla configuration operation-number command to display configuration values including all defaults for IP SLA operations or for a specific operation.
TrueCorrect
VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports.
TrueCorrect
What does the FIFO queuing stands for?
first-in first-outCorrect
What does the WFQ automated scheduling method stands for?
weighted fair queuingCorrect
What equipment at the cable service provider office connects the office to the subscriber locations?
CMTSCorrect
What function does NCP perform in the establishment of a PPP session?
It completes the specific configuration of the network layer protocol that is being used.Correct
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
Data is not forwarded along the pathway.Correct
What happens when the memory queue of a device fills up and new network traffic is received?
he network device will drop the arriving packets.Correct
What is a characteristic of a WAN?
WAN service providers include carriers such as a telephone network or satellite service.Correct
What is a characteristic of data flow processing in SDN?
Each data flow through the network must be approved by the SDN controller first.Correct
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
The leaf switches always attach to the spines, but they never attach to each other.Correct
What is a disadvantage of leased lines?
high costCorrect
What is an advantage offered by GRE tunnels?
support for IP multicast tunnelingCorrect
What is an example of an M2M connection?
a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickupsCorrect
What is an SNMP management agent?
software that is installed on devices managed by SNMPCorrect
What is Fog computing?
It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.Correct
What is the default queuing method used on the LAN interfaces of Cisco devices?
FIFOCorrect
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?
PPPoECorrect
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow?
Enable port securityCorrect
What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?
192.168.70.0 to 192.168.70.127Correct
What TCP port is used by BGP to exchange messages between routers?
179Correct
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router?
show interface dialer 1Correct
When is the most appropriate time to measure network operations to establish a network performance baseline?
at the same time each day across a set period of average working days, so that typical traffic patterns can be establishedCorrect
Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP?
authenticationCorrect
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
PaaSCorrect
Which command runs several other show commands in order to generate many pages of detailed troubleshooting information?
show tech-supportCorrect
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?
control planeCorrect
Which feature sends simulated data across the network and measures performance between multiple network locations?
IP SLACorrect
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?
172.16.2.0 to 172.16.3.255 Correct
Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?
fiber opticCorrect
Which mode is used to configure SNMP?
global configuration modeCorrect
Which model is the only QoS model with no mechanism to classify packets?
best-effortCorrect
Which network traffic management technology is a basic element in SDN implementations?
OpenFlowCorrect
Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic?
ISDN BRICorrect
Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination?
MultilinkCorrect
Which PPP protocol allows a device to specify an IP address for routing over the PPP link?
IPCPCorrect
Which protocol is used by PPP to provide authentication and protection from playback attacks?
CHAPCorrect
Which public WAN technology provides security by using encrypted tunnels over Internet connections?
VPNCorrect
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue?
CBWFQCorrect
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?
CDPCorrect
Which statement correctly describes a WAN technology?
MPLS can be used to deliver any type of packet between sites.Correct
Which statement describes a characteristic of standard IPv4 ACLs?
They filter traffic based on source IP addresses only.Correct
Which statement describes a difference between the operation of inbound and outbound ACLs?
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.Correct
Which statement describes the physical topology for a LAN?
It defines how hosts and network devices connect to the LAN.Correct
Which statement describes the QoS classification and marking tools?
Marking is the adding of a value to a packet header.Correct
Which term describes the data exchanges between virtual servers in a data center?
east-west trafficCorrect
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable?
cable testerCorrect
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used?
voiceCorrect
Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?
ATMCorrect
With which layers of the OSI model do the PPP control protocols interface?
NCP interfaces with Layer 3; LCP interfaces with Layer 1Correct