click below
click below
Normal Size Small Size show me how
F1 - Net 3
| Question | Answer |
|---|---|
| Which wildcard mask matches only the host 10.1.1.1? | 0.0.0.0 |
| Keeping systems patched mainly helps guard against: | Known vulnerabilities |
| Which OSPF message is used to establish adjacency? | HELLO |
| Which command removes ACL 50 from an interface? | no ip access-group 50 in |
| Standard IPv4 ACLs are identified by numbers: | 1–99, 1300–1999 |
| Which device inspects traffic for malicious patterns and blocks attacks? | Intrusion Prevention System (IPS) |
| ACLs are typically applied on: | Routers or layer-3 devices |
| Which command advertises 192.168.1.0/24 network in OSPF? | network 192.168.1.0 0.0.0.255 area 0 |
| A VPN primarily ensures which security principle? | Confidentiality |
| Weak or default passwords create which kind of vulnerability? | Configuration-based |
| ACLs can also be configured to log matches for: | Diagnostic purposes |
| Which command shows OSPF neighbors? | show ip ospf neighbor |
| Where should a standard ACL be placed to control traffic effectively? | As close to the source as possible |
| In single-area OSPF, which area is always required? | Area 0 |
| What type of OSPF network requires a DR and BDR election? | Broadcast multiaccess |
| Which ACL type is limited and inefficient for complex filtering? | Standard |
| A best practice for ACL efficiency is to: | Place extended ACLs near the source |
| Extended IPv4 ACL numbers span: | 100–199, 2000–2699 |
| Which command shows currently configured ACLs? | show ip access-lists |
| What component enforces user privilege levels in network devices? | AAA (Authentication, Authorization, Accounting) |
| What does ACL stand for? | Access Control List |
| OSPF convergence is generally faster than RIP because it: | Uses link-state and SPF algorithm |
| Which routing protocol is classified as a link-state protocol? | OSPFv2 |
| After applying ACL, to confirm its operation, use: | show access-lists |
| Which OSPF database contains complete topology information? | Link-state database |
| Which command begins defining ACL 10? | access-list 10 permit … |
| What identifies each OSPF router uniquely? | Router ID |
| A named standard ACL is created with: | ip access-list standard NAME |
| To deny all other traffic not previously permitted, you should: | Implicit deny does the job; no need to add |
| Extended ACLs can filter traffic by: | Source, destination, protocol, and port |
| What does the “CIA triad” stand for in network security? | Confidentiality, Integrity, Availability |
| Which of the following best describes a Designated Router (DR) on a broadcast network? | The router with highest router ID |
| In single-area OSPF, all routers share the same: | Link-state database |
| To allow only subnet 192.168.10.0/24, the wildcard mask is: | 0.0.0.255 |
| Which command verifies OSPF routes in the routing table? | show ip route ospf |
| Which interface type does not elect a DR or BDR? | Point-to-point |
| What benefit does OSPF area structure provide? | Hierarchical scaling |
| Which command applies ACL 100 inbound on interface GigabitEthernet0/1? | ip access-group 100 in |
| ACLs must always be explicitly applied to interfaces. | TRUE |
| The primary purpose of ACLs is to: | Filter network traffic |
| Standard ACLs filter based on: | Source IP only |
| To configure ACL entries manually and name them “SALES”, use: | ip access-list extended SALES |
| Which command sets up OSPF with process ID 10? | router ospf 10 |
| Which action ensures the integrity of log files? | Encrypt and backup logs |
| What is the default behavior for traffic not explicitly permitted or denied in an ACL? | Denied (implicit deny) |
| Applying the least privilege principle means: | Granting minimal necessary access |
| Which ACL type provides the most granular filtering? | Extended |
| Phishing is an example of which type of threat? | Social Engineering |
| ACLs can also serve to: | Restrict administrative access |
| Which vulnerability is exploited by intercepting communications between two parties? | Man-in-the-middle |
| SA2 | SA2 |
| What does PAT stand for? | Port Address Translation (overload) |
| Which REST format is human-readable and uses indentation? | YAML |
| What does virtualization separate? | Operating system from hardware |
| In CCNA, which layer handles MAC addressing? | Layer 2 |
| What language is Ansible based on? | Python |
| What does API stand for? | Application Programming Interface |
| In NAT configuration, what defines the internal network? | ip nat inside |
| What cloud service offers on-demand software? | SaaS |
| Which tool uses manifests? | Puppet |
| What does the assurance element of IBN do? | Verification and corrective action |
| Which command configures NAT overload on a Cisco router? | ip nat inside source list 1 interface fa0/0 overload |
| What does PaaS provide? | Platform for development |
| What does SaaS deliver? | Applications over the internet |
| What is the main benefit of SDN? | Centralized control and flexibility |
| What is the function of the data plane? | Forwarding traffic |
| Which WAN technology uses a private network from the provider? | MPLS |
| Which HTTP method is used to update resources? | PUT or PATCH |
| What does IBN stand for? | Intent-Based Networking |
| What type of NAT maps one private IP to one public IP? | Static NAT |
| What is a public API typically used for? | Open access by developers |
| What WAN service uses encryption over the Internet? | VPN |
| What does QoS stand for? | Quality of Service |
| Which tool uses playbooks? | Ansible |
| Which Cisco component is the brains of ACI? | Application Policy Infrastructure Controller |
| Which protocol is often paired with YANG models? | NETCONF |
| What protocol is commonly used in SDN southbound API? | OpenFlow |
| Which protocol allows REST-based configuration? | NETCONF |
| What hypervisor type installs directly on server hardware? | Type 1 |
| What is the main purpose of SD-WAN? | WAN optimization and control |
| In SDN, what is the function of the control plane? | Decision-making and path calculation |
| What does CEF stand for? | Cisco Express Forwarding |
| Which service allows renting hardware like routers? | IaaS |
| Which technology translates private IPv4 addresses to public addresses? | NAT |
| What cloud model uses both public and private? | Hybrid cloud |
| What is the purpose of REST in networking? | Web service architecture |
| Which technology is most scalable for MPLS? | MPLS VPNs |
| Which type of cloud is dedicated to one organization? | Private cloud |
| What is the OSI layer for IP routing? | Layer 3 |
| What data format is YAML a superset of? | JSON |
| What table complements the FIB in CEF? | Adjacency table |
| Which term refers to multiple VLANs across WAN? | VLAN trunking |
| What populates the Forwarding Information Base (FIB)? | Routing table |
| Which device typically is part of IaaS offerings? | Switches or routers |
| What virtualization feature enables moving VMs between hosts? | Live migration |
| Which cloud model is shared among specific organizations? | Community cloud |
| Which virtual LAN technology encapsulates multiple VLANs? | MPLS |
| Which VPN type uses the public internet? | IPsec VPN |
| Which hypervisor runs on top of an existing OS? | Type 2 |
| Which is NOT a RESTful operation? | Merge |
| Which tool uses pillars for configuration? | SaltStack |