Networking Commands and Configuration Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the default maximum number of MAC addresses to be learned in port security?

  • Four
  • One (correct)
  • Ten
  • Unlimited
  • Where are MAC addresses learned on ports configured with port security displayed?

  • show mac address-table all command
  • show mac address-table dynamic command
  • show mac address-table static command
  • show mac address-table secure command (correct)
  • Which mode allows a branch office to have an AP without deploying a branch controller?

  • Bridge
  • Sniffer
  • Client
  • FlexConnect (correct)
  • What should be done to save sticky MAC addresses in the startup configuration file?

    <p>Manually save the running-config</p> Signup and view all the answers

    After plugging in a new AP into WLC port 4, what did the administrator notice was missing?

    <p>CiscoAirProvision SSID</p> Signup and view all the answers

    What is required for WLAN Express to work after changing an AP on a WLC?

    <p>The AP has to be reset to factory defaults</p> Signup and view all the answers

    In network automation, which of the following uses valid JSON object syntax?

    <p>{&quot;type&quot;,&quot;code&quot;: &quot;1&quot;, &quot;2&quot;}</p> Signup and view all the answers

    What should be enabled on the switch to fix the problem when an IP phone fails to establish a connection with a switch configured with the correct voice VLAN?

    <p>CDP</p> Signup and view all the answers

    Which logging level has been enabled in the output of OSPF routing protocol debugs?

    <p>Level 6</p> Signup and view all the answers

    What will be the cost of the root path in SW0 for the network shown in the exhibit?

    <p>4</p> Signup and view all the answers

    Refer to the LACP configuration to enable it as the main interface to the WAN. What is missing in the configuration?

    <p>The LACP administrative key is not set.</p> Signup and view all the answers

    Regarding IP phone connectivity issues, what is a possible solution when a switch is correctly configured with the voice VLAN?

    <p>{&quot;type&quot;,&quot;code&quot;:[1,2]}</p> Signup and view all the answers

    What is required for Multi-Factor Authentication (MFA)?

    <p>At least two factors of proof from different categories</p> Signup and view all the answers

    Which of the following is considered a true MFA solution?

    <p>Fingerprints and retina scan</p> Signup and view all the answers

    What is a benefit of controller-based networking over traditional networks?

    <p>Ability to control the network devices via southbound APIs</p> Signup and view all the answers

    In a controller-based networking setup, why is it beneficial to have southbound APIs?

    <p>Enables control of network devices</p> Signup and view all the answers

    Based on the routing table output provided, what will Core2 do with a packet destined for 192.168.3.129?

    <p>Core2 will drop the packet</p> Signup and view all the answers

    Why does Core2 drop a packet destined for 192.168.3.129 based on the routing table output?

    <p>Missing route entry for that destination</p> Signup and view all the answers

    What is the purpose of the Fast Transition section in WPA/WPA2 Parameters?

    <p>To optimize roaming of devices</p> Signup and view all the answers

    What authentication method is used in WPA protocols according to the text?

    <p>WPA-PSK</p> Signup and view all the answers

    Why is the Protected Management Frame important in a wireless network?

    <p>To increase network security</p> Signup and view all the answers

    What does Wireless Roaming refer to?

    <p>Moving clients between access points</p> Signup and view all the answers

    In the context of VLANs, what does a trunk typically do?

    <p>Allow multiple VLANs over one link</p> Signup and view all the answers

    What configuration will result from executing 'switchport trunk allowed vlan 5' on interface Gi0/1 on SW0?

    <p>VLAN 5 will be allowed and active on the trunk</p> Signup and view all the answers

    What is the key difference between Telnet and SSH in managing network devices?

    <p>Telnet uses clear text while SSH uses an encrypted connection</p> Signup and view all the answers

    Why would an ACL still be required even if a script is used to pull interface information using SSH?

    <p>To restrict access to authorized users</p> Signup and view all the answers

    Why is Spanning Tree Protocol (STP) not used in a spine and leaf architecture design?

    <p>There are no loops in the design</p> Signup and view all the answers

    What feature of spine and leaf architecture allows for high access port scalability?

    <p>Adding leaf switches to every spine switch</p> Signup and view all the answers

    Why is Equal Cost Multipathing (ECMP) considered a desirable feature in spine and leaf designs?

    <p>Improves total available bandwidth by utilizing multiple network paths</p> Signup and view all the answers

    In a spine and leaf architecture, why is it crucial for leaf and spine switches to have redundant connections?

    <p>To ensure high availability and redundancy</p> Signup and view all the answers

    Study Notes

    Multi-Factor Authentication (MFA)

    • MFA requires at least two independent factors of proof
    • Three main types of authentication factors:
      • Something you know (passwords, PINS)
      • Something you have (smart cards, mobile phones)
      • Something you are (fingerprints, retina scans)

    Controller-Based Networking

    • Benefit: Ability to control network devices via southbound APIs

    Routing

    • Core2 will use the OSPF path to route a packet destined for 192.168.3.129
    • Based on the partial output of the routing table

    DNS

    • Domain name to IP address mapping can be checked using the nslookup command

    Implementing VLANs and STP

    • Cost of the root path in SW0 is 4
    • To enable LACP configuration, the LACP administrative key must be set
    • CDP (Cisco Discovery Protocol) should be enabled on the switch to fix an IP phone connection issue

    Network Automation

    • Valid JSON object syntax: {"type","code": "1","2"}
    • CDP informs the IP phone about the voice VLAN ID and QoS settings

    IP Services

    • Logging level 7 (debug) has been enabled in the OSPF routing protocol output

    Wi-Fi

    • FlexConnect is an AP mode that allows a branch office to have an AP without deploying a branch controller
    • WLAN Express is used to configure a WLC over a wireless network
    • CiscoAirProvision SSID will only be broadcast when the AP is connected to port 1 on a WLC

    Network Architecture

    • Spine and leaf architecture allows for access port scalability without using STP or ECMP

    WPA and WPA2

    • The Authentication Key Management section provides an option to configure a pre-shared key (PSK)
    • Fast Transition optimizes roaming of devices
    • Protected Management Frame increases security of a wireless network and protects against eavesdropping and forging attacks

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on networking commands such as nslookup and configuration setups like VLANs and STP. Questions cover topics like domain name to IP address mapping, root path costs, and LACP configurations for WAN interfaces.

    More Like This

    Networking Commands Quiz
    5 questions
    Networking Commands and OSI Model
    31 questions

    Networking Commands and OSI Model

    SatisfactoryDidactic4162 avatar
    SatisfactoryDidactic4162
    Use Quizgecko on...
    Browser
    Browser