Networking Commands and Configuration Quiz

SupportiveTulip avatar
SupportiveTulip
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the default maximum number of MAC addresses to be learned in port security?

One

Where are MAC addresses learned on ports configured with port security displayed?

show mac address-table secure command

Which mode allows a branch office to have an AP without deploying a branch controller?

FlexConnect

What should be done to save sticky MAC addresses in the startup configuration file?

Manually save the running-config

After plugging in a new AP into WLC port 4, what did the administrator notice was missing?

CiscoAirProvision SSID

What is required for WLAN Express to work after changing an AP on a WLC?

The AP has to be reset to factory defaults

In network automation, which of the following uses valid JSON object syntax?

{"type","code": "1", "2"}

What should be enabled on the switch to fix the problem when an IP phone fails to establish a connection with a switch configured with the correct voice VLAN?

CDP

Which logging level has been enabled in the output of OSPF routing protocol debugs?

Level 6

What will be the cost of the root path in SW0 for the network shown in the exhibit?

4

Refer to the LACP configuration to enable it as the main interface to the WAN. What is missing in the configuration?

The LACP administrative key is not set.

Regarding IP phone connectivity issues, what is a possible solution when a switch is correctly configured with the voice VLAN?

{"type","code":[1,2]}

What is required for Multi-Factor Authentication (MFA)?

At least two factors of proof from different categories

Which of the following is considered a true MFA solution?

Fingerprints and retina scan

What is a benefit of controller-based networking over traditional networks?

Ability to control the network devices via southbound APIs

In a controller-based networking setup, why is it beneficial to have southbound APIs?

Enables control of network devices

Based on the routing table output provided, what will Core2 do with a packet destined for 192.168.3.129?

Core2 will drop the packet

Why does Core2 drop a packet destined for 192.168.3.129 based on the routing table output?

Missing route entry for that destination

What is the purpose of the Fast Transition section in WPA/WPA2 Parameters?

To optimize roaming of devices

What authentication method is used in WPA protocols according to the text?

WPA-PSK

Why is the Protected Management Frame important in a wireless network?

To increase network security

What does Wireless Roaming refer to?

Moving clients between access points

In the context of VLANs, what does a trunk typically do?

Allow multiple VLANs over one link

What configuration will result from executing 'switchport trunk allowed vlan 5' on interface Gi0/1 on SW0?

VLAN 5 will be allowed and active on the trunk

What is the key difference between Telnet and SSH in managing network devices?

Telnet uses clear text while SSH uses an encrypted connection

Why would an ACL still be required even if a script is used to pull interface information using SSH?

To restrict access to authorized users

Why is Spanning Tree Protocol (STP) not used in a spine and leaf architecture design?

There are no loops in the design

What feature of spine and leaf architecture allows for high access port scalability?

Adding leaf switches to every spine switch

Why is Equal Cost Multipathing (ECMP) considered a desirable feature in spine and leaf designs?

Improves total available bandwidth by utilizing multiple network paths

In a spine and leaf architecture, why is it crucial for leaf and spine switches to have redundant connections?

To ensure high availability and redundancy

Study Notes

Multi-Factor Authentication (MFA)

  • MFA requires at least two independent factors of proof
  • Three main types of authentication factors:
    • Something you know (passwords, PINS)
    • Something you have (smart cards, mobile phones)
    • Something you are (fingerprints, retina scans)

Controller-Based Networking

  • Benefit: Ability to control network devices via southbound APIs

Routing

  • Core2 will use the OSPF path to route a packet destined for 192.168.3.129
  • Based on the partial output of the routing table

DNS

  • Domain name to IP address mapping can be checked using the nslookup command

Implementing VLANs and STP

  • Cost of the root path in SW0 is 4
  • To enable LACP configuration, the LACP administrative key must be set
  • CDP (Cisco Discovery Protocol) should be enabled on the switch to fix an IP phone connection issue

Network Automation

  • Valid JSON object syntax: {"type","code": "1","2"}
  • CDP informs the IP phone about the voice VLAN ID and QoS settings

IP Services

  • Logging level 7 (debug) has been enabled in the OSPF routing protocol output

Wi-Fi

  • FlexConnect is an AP mode that allows a branch office to have an AP without deploying a branch controller
  • WLAN Express is used to configure a WLC over a wireless network
  • CiscoAirProvision SSID will only be broadcast when the AP is connected to port 1 on a WLC

Network Architecture

  • Spine and leaf architecture allows for access port scalability without using STP or ECMP

WPA and WPA2

  • The Authentication Key Management section provides an option to configure a pre-shared key (PSK)
  • Fast Transition optimizes roaming of devices
  • Protected Management Frame increases security of a wireless network and protects against eavesdropping and forging attacks

Test your knowledge on networking commands such as nslookup and configuration setups like VLANs and STP. Questions cover topics like domain name to IP address mapping, root path costs, and LACP configurations for WAN interfaces.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Networking Commands Quiz
5 questions
Networking Configuration Commands Quiz
18 questions
Use Quizgecko on...
Browser
Browser