scpadmin and your password was Sybex?
A.
Switch(config)#ip scp user scpadmin password Sybex
B.
Switch(config)#username scpadmin password Sybex
C.
Switch(config)#username scpadmin privilege-level 15
password Sybex
D.
Switch(config)#ip scp user scpadmin privilege-level 15
password Sybex
76. In a basic VLAN hopping attack, which switch feature do
attackers take advantage of?
A. An open Telnet connection
B. Automatic encapsulation negotiation
C. Forwarding of broadcasts
D. The default automatic trunking configuration
77. Which security mitigation technique can be used to stop a MAC
address flooding attack?
A. ACLs
B. NAT
C. Port security
D. VLAN access control lists (VACLs)
78. Which of the following is a recommended physical security
method?
A. Locking doors
B. Installing antivirus software
C. Enabling firewalls
D. Applying directory-level permissions
79. You are connected to the console of a switch. As you are
configuring the switch, console logging is disrupting your
commands and making it hard to configure the switch properly.
Which command will allow the console message to still appear
but not disrupt what you are typing?
A.
Switch#no logging inline
B.
Switch(config)#logging synchronous
C.
Switch(config-line)#logging synchronous
D.
Switch#logging synchronous
80. You have a router that you configured with a password, but you
have forgotten the password. You have a copy of a recent
configuration, and the password line reads as
password 7
06074352EFF6
. How can you access the router?
A. You must call the Cisco Technical Assistance Center to
reverse the password.
B. You need to enter the password 06074352EFF6.
C. Log into another router and type
decrypt-password
06074352EFF6
in privileged exec mode.
D. Perform a password recovery on the router.
81. Which port must be open to the RADIUS or AAA server for
authentication from the authenticator?
A. UDP/49
B. UDP/1821
C. UDP/1812
D. UDP/1813
82. What is a consideration that can restrict GRE tunnel creation?
A. The tunnel interface number
B. ACLs on the firewall
C. Speed of the tunnel
D. Number of hops between the source and destination
83. Which WAN protocol does not support multicast packets?
A. GRE
B. IPsec
C. PPP
D. MPLS
84. Which command will configure an access list that will deny
Telnet access from the 192.168.2.0/24 network and allow all
other traffic?
A.
Router(config)#access-list 101 deny tcp 192.168.2.0
0.0.0.255 any eq 23
Router(config)#access-list 101 permit ip any any
B.
Router(config)#access-list 101 deny 192.168.2.0
0.0.0.255 eq 23
Router(config)#access-list 101 permit ip any any
C.
Router(config)#access-list 101 block tcp 192.168.2.0
0.0.0.255 any eq 23
Router(config)#access-list 101 permit ip any any
D.
Router(config)#access-list 101 deny 192.168.2.0
0.0.0.255 any eq 23
Router(config)#access-list 101 permit any any
85. You need to make a modification to a rule in a standard
conventional access list. How can you achieve this?
A. Enter the ACL editor and change the entry.
B. Remove the entire ACL and add it back with the
modification.
C. Remove the line number and add the new line number back
with the modification.
D. Remove the entry with the
no
command and add it back.
86. Which command is used to view the DHCP snooping database?
A.
Switch#show dhcp binding
B.
Switch#show ip dhcp binding
C.
Switch#show ip dhcp snooping database
D.
Switch#show ip dhcp snooping binding
87. Refer to the following exhibit. What will happen when a
computer with a different MAC address connects to the
interface?
A. The computer will not be allowed to communicate, but the
port will remain up.
B. The computer will be allowed to communicate.
C. The computer will not be allowed to communicate and the
port will enter an
err-disabled state.
D. The computer will be allowed to communicate and the
access will be logged.
88. Which authentication method will allow an authenticated user
to access only certain commands on a router or switch?
A. TACACS+
B. AAA
C. RADIUS
D. 802.1X
89. You need to implement a wireless authentication system that
provides encryption and authentication of user accounts. Which
technology would you deploy?
A. WPA2-PSK
B. WPA2-EAP
C. WPA2-LEAP
D. WPA3-PSK
90. When configuring a WLAN with WPA2 PSK using the GUI of a
wireless LAN controller, which parameter policy should be
configured for the highest security?
A. 802.1X
B. WPA2 Policy-AES
C. WPA Policy
D. PSK
91. Which is the most important aspect to understand when
automating changes across an enterprise?
A. How to automate the change
B. The effect of the change
C. The topology of the network
D. The connections between the devices
92. Which is a popular scripting language used to automate changes
that also allows for easy readability of the script?
A. C++
B. Python
C. C#
D. JSON
93. Which tool allows you to manage all of your Cisco device
licensing needs through a single user interface?
A. Cisco SMARTnet
B. Cisco License Manager
C. Cisco Network Assistant
D. Cisco Prime Infrastructure
94. Which is a protocol found on the overlay of an SDN?
A. VXLAN
B. OSPF
C. OpenFlow
D. JSON
95. Which is commonly used with the northbound interface of an
SDN controller?
A. CLOS
B. OpenFlow
C. Python
D. NETCONF
96. You need to configure some default servers for DNS, AAA, and
NTP for device provisioning. Which section in Cisco DNA Center
will allow you to configure these defaults?
A. Design
B. Discovery
C. Provision
D. Platform
97. Which REST-based HTTP verb is used to update or replace data
via the API?
A. POST
B. GET
C. UPDATE
D. PUT
98. You just finished creating a script that will interface with Cisco
DNA Center via the REST-based API. When you run the script,
you receive a 400 status code. What is wrong?
A. Nothing, it is okay.
B. Forbidden request.
C. Bad request.
D. Internal server error.
99. Which programming language is used for creating a Chef recipe
to apply configuration management?
A. Ruby
B. Python
C. PowerShell
D. YAML
100. Which statement best describes how the JSON file format starts
and ends?
A. A JSON file starts with double quotes and ends with double
quotes.
B. A JSON file starts with single quotes and ends with single
quotes.
C. A JSON file starts with square brackets and ends with
square brackets.
D. A JSON file starts with curly brackets and ends with curly
brackets.
Do'stlaringiz bilan baham: |