30 Questions
What is the default maximum number of MAC addresses to be learned in port security?
One
Where are MAC addresses learned on ports configured with port security displayed?
show mac address-table secure command
Which mode allows a branch office to have an AP without deploying a branch controller?
FlexConnect
What should be done to save sticky MAC addresses in the startup configuration file?
Manually save the running-config
After plugging in a new AP into WLC port 4, what did the administrator notice was missing?
CiscoAirProvision SSID
What is required for WLAN Express to work after changing an AP on a WLC?
The AP has to be reset to factory defaults
In network automation, which of the following uses valid JSON object syntax?
{"type","code": "1", "2"}
What should be enabled on the switch to fix the problem when an IP phone fails to establish a connection with a switch configured with the correct voice VLAN?
CDP
Which logging level has been enabled in the output of OSPF routing protocol debugs?
Level 6
What will be the cost of the root path in SW0 for the network shown in the exhibit?
4
Refer to the LACP configuration to enable it as the main interface to the WAN. What is missing in the configuration?
The LACP administrative key is not set.
Regarding IP phone connectivity issues, what is a possible solution when a switch is correctly configured with the voice VLAN?
{"type","code":[1,2]}
What is required for Multi-Factor Authentication (MFA)?
At least two factors of proof from different categories
Which of the following is considered a true MFA solution?
Fingerprints and retina scan
What is a benefit of controller-based networking over traditional networks?
Ability to control the network devices via southbound APIs
In a controller-based networking setup, why is it beneficial to have southbound APIs?
Enables control of network devices
Based on the routing table output provided, what will Core2 do with a packet destined for 192.168.3.129?
Core2 will drop the packet
Why does Core2 drop a packet destined for 192.168.3.129 based on the routing table output?
Missing route entry for that destination
What is the purpose of the Fast Transition section in WPA/WPA2 Parameters?
To optimize roaming of devices
What authentication method is used in WPA protocols according to the text?
WPA-PSK
Why is the Protected Management Frame important in a wireless network?
To increase network security
What does Wireless Roaming refer to?
Moving clients between access points
In the context of VLANs, what does a trunk typically do?
Allow multiple VLANs over one link
What configuration will result from executing 'switchport trunk allowed vlan 5' on interface Gi0/1 on SW0?
VLAN 5 will be allowed and active on the trunk
What is the key difference between Telnet and SSH in managing network devices?
Telnet uses clear text while SSH uses an encrypted connection
Why would an ACL still be required even if a script is used to pull interface information using SSH?
To restrict access to authorized users
Why is Spanning Tree Protocol (STP) not used in a spine and leaf architecture design?
There are no loops in the design
What feature of spine and leaf architecture allows for high access port scalability?
Adding leaf switches to every spine switch
Why is Equal Cost Multipathing (ECMP) considered a desirable feature in spine and leaf designs?
Improves total available bandwidth by utilizing multiple network paths
In a spine and leaf architecture, why is it crucial for leaf and spine switches to have redundant connections?
To ensure high availability and redundancy
Study Notes
Multi-Factor Authentication (MFA)
- MFA requires at least two independent factors of proof
- Three main types of authentication factors:
- Something you know (passwords, PINS)
- Something you have (smart cards, mobile phones)
- Something you are (fingerprints, retina scans)
Controller-Based Networking
- Benefit: Ability to control network devices via southbound APIs
Routing
- Core2 will use the OSPF path to route a packet destined for 192.168.3.129
- Based on the partial output of the routing table
DNS
- Domain name to IP address mapping can be checked using the nslookup command
Implementing VLANs and STP
- Cost of the root path in SW0 is 4
- To enable LACP configuration, the LACP administrative key must be set
- CDP (Cisco Discovery Protocol) should be enabled on the switch to fix an IP phone connection issue
Network Automation
- Valid JSON object syntax: {"type","code": "1","2"}
- CDP informs the IP phone about the voice VLAN ID and QoS settings
IP Services
- Logging level 7 (debug) has been enabled in the OSPF routing protocol output
Wi-Fi
- FlexConnect is an AP mode that allows a branch office to have an AP without deploying a branch controller
- WLAN Express is used to configure a WLC over a wireless network
- CiscoAirProvision SSID will only be broadcast when the AP is connected to port 1 on a WLC
Network Architecture
- Spine and leaf architecture allows for access port scalability without using STP or ECMP
WPA and WPA2
- The Authentication Key Management section provides an option to configure a pre-shared key (PSK)
- Fast Transition optimizes roaming of devices
- Protected Management Frame increases security of a wireless network and protects against eavesdropping and forging attacks
Test your knowledge on networking commands such as nslookup and configuration setups like VLANs and STP. Questions cover topics like domain name to IP address mapping, root path costs, and LACP configurations for WAN interfaces.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free