Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

F1 - Net 3

QuestionAnswer
Which wildcard mask matches only the host 10.1.1.1? 0.0.0.0
Keeping systems patched mainly helps guard against: Known vulnerabilities
Which OSPF message is used to establish adjacency? HELLO
Which command removes ACL 50 from an interface? no ip access-group 50 in
Standard IPv4 ACLs are identified by numbers: 1–99, 1300–1999
Which device inspects traffic for malicious patterns and blocks attacks? Intrusion Prevention System (IPS)
ACLs are typically applied on: Routers or layer-3 devices
Which command advertises 192.168.1.0/24 network in OSPF? network 192.168.1.0 0.0.0.255 area 0
A VPN primarily ensures which security principle? Confidentiality
Weak or default passwords create which kind of vulnerability? Configuration-based
ACLs can also be configured to log matches for: Diagnostic purposes
Which command shows OSPF neighbors? show ip ospf neighbor
Where should a standard ACL be placed to control traffic effectively? As close to the source as possible
In single-area OSPF, which area is always required? Area 0
What type of OSPF network requires a DR and BDR election? Broadcast multiaccess
Which ACL type is limited and inefficient for complex filtering? Standard
A best practice for ACL efficiency is to: Place extended ACLs near the source
Extended IPv4 ACL numbers span: 100–199, 2000–2699
Which command shows currently configured ACLs? show ip access-lists
What component enforces user privilege levels in network devices? AAA (Authentication, Authorization, Accounting)
What does ACL stand for? Access Control List
OSPF convergence is generally faster than RIP because it: Uses link-state and SPF algorithm
Which routing protocol is classified as a link-state protocol? OSPFv2
After applying ACL, to confirm its operation, use: show access-lists
Which OSPF database contains complete topology information? Link-state database
Which command begins defining ACL 10? access-list 10 permit …
What identifies each OSPF router uniquely? Router ID
A named standard ACL is created with: ip access-list standard NAME
To deny all other traffic not previously permitted, you should: Implicit deny does the job; no need to add
Extended ACLs can filter traffic by: Source, destination, protocol, and port
What does the “CIA triad” stand for in network security? Confidentiality, Integrity, Availability
Which of the following best describes a Designated Router (DR) on a broadcast network? The router with highest router ID
In single-area OSPF, all routers share the same: Link-state database
To allow only subnet 192.168.10.0/24, the wildcard mask is: 0.0.0.255
Which command verifies OSPF routes in the routing table? show ip route ospf
Which interface type does not elect a DR or BDR? Point-to-point
What benefit does OSPF area structure provide? Hierarchical scaling
Which command applies ACL 100 inbound on interface GigabitEthernet0/1? ip access-group 100 in
ACLs must always be explicitly applied to interfaces. TRUE
The primary purpose of ACLs is to: Filter network traffic
Standard ACLs filter based on: Source IP only
To configure ACL entries manually and name them “SALES”, use: ip access-list extended SALES
Which command sets up OSPF with process ID 10? router ospf 10
Which action ensures the integrity of log files? Encrypt and backup logs
What is the default behavior for traffic not explicitly permitted or denied in an ACL? Denied (implicit deny)
Applying the least privilege principle means: Granting minimal necessary access
Which ACL type provides the most granular filtering? Extended
Phishing is an example of which type of threat? Social Engineering
ACLs can also serve to: Restrict administrative access
Which vulnerability is exploited by intercepting communications between two parties? Man-in-the-middle
SA2 SA2
What does PAT stand for? Port Address Translation (overload)
Which REST format is human-readable and uses indentation? YAML
What does virtualization separate? Operating system from hardware
In CCNA, which layer handles MAC addressing? Layer 2
What language is Ansible based on? Python
What does API stand for? Application Programming Interface
In NAT configuration, what defines the internal network? ip nat inside
What cloud service offers on-demand software? SaaS
Which tool uses manifests? Puppet
What does the assurance element of IBN do? Verification and corrective action
Which command configures NAT overload on a Cisco router? ip nat inside source list 1 interface fa0/0 overload
What does PaaS provide? Platform for development
What does SaaS deliver? Applications over the internet
What is the main benefit of SDN? Centralized control and flexibility
What is the function of the data plane? Forwarding traffic
Which WAN technology uses a private network from the provider? MPLS
Which HTTP method is used to update resources? PUT or PATCH
What does IBN stand for? Intent-Based Networking
What type of NAT maps one private IP to one public IP? Static NAT
What is a public API typically used for? Open access by developers
What WAN service uses encryption over the Internet? VPN
What does QoS stand for? Quality of Service
Which tool uses playbooks? Ansible
Which Cisco component is the brains of ACI? Application Policy Infrastructure Controller
Which protocol is often paired with YANG models? NETCONF
What protocol is commonly used in SDN southbound API? OpenFlow
Which protocol allows REST-based configuration? NETCONF
What hypervisor type installs directly on server hardware? Type 1
What is the main purpose of SD-WAN? WAN optimization and control
In SDN, what is the function of the control plane? Decision-making and path calculation
What does CEF stand for? Cisco Express Forwarding
Which service allows renting hardware like routers? IaaS
Which technology translates private IPv4 addresses to public addresses? NAT
What cloud model uses both public and private? Hybrid cloud
What is the purpose of REST in networking? Web service architecture
Which technology is most scalable for MPLS? MPLS VPNs
Which type of cloud is dedicated to one organization? Private cloud
What is the OSI layer for IP routing? Layer 3
What data format is YAML a superset of? JSON
What table complements the FIB in CEF? Adjacency table
Which term refers to multiple VLANs across WAN? VLAN trunking
What populates the Forwarding Information Base (FIB)? Routing table
Which device typically is part of IaaS offerings? Switches or routers
What virtualization feature enables moving VMs between hosts? Live migration
Which cloud model is shared among specific organizations? Community cloud
Which virtual LAN technology encapsulates multiple VLANs? MPLS
Which VPN type uses the public internet? IPsec VPN
Which hypervisor runs on top of an existing OS? Type 2
Which is NOT a RESTful operation? Merge
Which tool uses pillars for configuration? SaltStack
Created by: user-1835460
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards