Ip Connectivity 1. What are configuration characteristics and feature support of OSPFv2 (select 2) a. Unlimited hop count, classless routing protocol b. Explanation - OSPF is link-state routing protocol that builds and maintains global topology. This is accomplished by link-state advertisements(LSA) between OSPF neighbors. Topology and routing info is communicated with LSAs 2. What OSPF network type is assigned to an Ethernet network interface . Point-to-point a. OSPF automatically assigns broadcast network type to an Ethernet interface. There are serial interfaces as well that are assigned point-to-point network type 3. What is the primary purpose of OSPF router ID . Identify OSPF router to routing domain a. OSPF routers must be assigned a router ID that is an unique identifier to an OSPF routing domain, because it is how the router is identified in the OSPF database. Duplicate routing ID’s will prevent FULL adjacency from forming 4. When does a router discard a packet . When there is no default route a. A router will discard a packet when there is no route at all. This includes dynamic, OSPF, static, and default. All packets forwarded from a host must have a destination IP address or they aren’t sent 5. After network convergence has occurred what standard OSPF packets are sent at regular intervals between routers. . Hello packet a. OSPF hello packets are sent at fixed intervals based on the hello timer setting. Hello packets are sent to discover neighbors, establish neighbors, and act as keepalives. A neighbor is declared unreachable when hello packets are not received for the interval of the dead timer. 6. What attributes determine route and best path selection (select three) . Longest match rule, lowest administrative distance, lowest metric a. Route with lowest AD is installed in the routing table when routes exist from different routing protocols to the same destination. Route with lowest metric is installed in the routing table when multiple routes exist from the same routing protocol to the same destination.Route in the routing table with the longest match is selected when multiple routes exist to the same destination. 7. Refer to the network topology drawing. Select the correct IOS command to configure a floating static route on router-1 to destination 192.168.3.0/24. . a. a. b. Ip route 192.168.3.0 255.255.255.0 172.16.2.2 200 Ad of 200 makes something floating static 8. Refer to the network drawing. Select two commands that when configured on router-1, would provide a static route to network 172.16.12.0/24 connected to router-3. Ip route 172.16.1.20 255.255.255.0 172.16.1.2, ip route 172.16.12.0 255.255.255.0 s0/1 1st route creates static route,second just forwards all traffic for 172.16.12.0 through s1/1 9. What additional route is added to the routing table when interface Gi0/0 is enabled with IP address 172.33.2.1/24. a. 172.33.2.1/32 b. Connected routers are not manually configured or dynamic. They are automatically added to a routing table. The route entry includes a local network interface.The router installs a corresponding local host route for each connected interface. It is assigned a /32 subnet mask that indicates a host route. 10. What is the purpose of OSPF hello packets? (select two) . Neighbor adjacency, DR/BDR election a. Refer to question 1 11. What are three possible reasons why routers cannot establish an OSPF adjacency . Incorrect wildcard mask, duplicate router ID, hello timer mismatch a. Duplicate router ID will cause FULL adjacencies to not form. 12. The following is an OSPF route entry from a routing table. What is the metric calculation? 192.168.12.8/30 [110/128] via 192.168.12.5, 00:35:36, Serial 0/0 . 128 a. You can tell from [110/128] 13. What IOS command is used to display the collection of OSPF neighbor link-states . Show ip ospf database a. IOS command show ip ospf database displays the database topology table. Network Fundamentals 1. What are three characteristics of Spine-Leaf architecture Alternative to older STP designs, full mesh, designed for east-west traffic Composed of a 2-Tier layered design with switches connected via full mesh topology. 2. Select two statements that correctly describe frame switching operation . Switches read source and destination MAC address, Switch will flood frames out all ports except where the frame was learned when destination MAC address is not in MAC address table a. The primary purpose of a switch is to make forwarding decisions based on the destination MAC address. MAC flooding is used when there is an unknown destination MAC 3. What IOS commands will display the operational status of IPv4 configured addresses . Show protocols, show ip interface brief, show interfaces a. The operational status (up/up) of any Cisco network interface cannot be verified from sh running-config cmd. The show interfaces trunk command displays the status of a switch port with trunk mode enabled a. b. 4. What are two components of a Virtual Machines (VM) Operating system,application ? 5. What are two advantages of private RFC 1918 addressing . Conserve address space, network security a. The primary advantages of private RFC 1918 address (exmp 10.1.1.1) is address and conservation since 1918 addresses are only internal hosts and network devices. As a result they are non routable and used by many different organizations 6. What are three advantages of next-generation firewalls over traditional firewalls . Real-time monitoring, throughput, malware protection . a. a. Next-generation firewall (NGFW) optimize security for connecting directly to internetbased and cloud services. The newest firewall provides inbound/outbound stateful packet inspection to application-layer and higher Network Access 1. What is the purpose of Spanning Tree protocol (STP)? a. Prevent Layer 2 topology loops b. The primary reason for deploying stp is to prevent layer 2 topology loops by configuring some switch ports to forward and some to block traffic 2. Select the correct commands to configure a switch access port with PortFast enabled and assign VLAN 10 . Switchport mode access, switchport access vlan 10, spanning-tree portfast a. Vlans are auto created when assigned to a switch port interface, unless explicitly configured. 3. What is the number assigned to the switch management VLAN . 1 a. Vlan 1 is default for any Cisco switch port interface. Primary purpose is to forward management frames between switches. The following are cisco default switch configuration settings : i. Single broadcast domain (VLAN1) ii. All switch ports are assigned to VLAN 1 as a default iii. VLAN 1 forwards management traffic and cannot be deleted iv. Switch port default operational mode is access port 4. What statements correctly describe switch trunking? (select two) . Forward multiple VLANs across Layer 2 domain, enable communication between the same VLANs a. The purpose of a switch trunk is to forward multiple VLANs between switches across a Layer 2 domain and only enable communication between the same VLAN. IP Services 1. What IOS commands are mandatory to enable SSHv2 on a Cisco network device Crypto key gen rsa, ip domain-name, ip ssh version 2 2. What occurs after client is assigned DHCP address, before it can connect to a server . DNS query a. There is a DNS query sent to the DNS server that resolves the IP address of a server. That occurs after the client sends a request to the DHCP server for addressing. The DNS server resolves the hostname and returns destination IP address of server that is added to packet header 3. What are two primary services provided by Dynamic Host configuration Protocol (DHCP) . Configure TCP/IP address settings on hosts, renew host addressing automatically a. DHCP server supports allocation of dynamic addressing to clients that include hosts and network devices. DHCP also manages the renewal of IP addresses from an address pool. The pool is defined on the server along with the lease time period. 4. What are two advantages of Network Address Translation . Eases management of internet connectivity, conceals private IP address assignments from the internet a. a. The primary advantage of NAT is to map multiple privateIP addresses to a single or multiple public routable IP addresses. Automation and Programmability 1. What are three advantages of SDN compared with traditional network architecture a. Centralized control plane, open standard, software-based control plane b. Software Defined Networking (SDN) is an architecture that separates the control plane from the data plane. The software on all network devices is moved to an SDN controller. This allows programmanility of all network devices supporting SDN architecture. i. SDN decouples control and data plane ii. Control plane is software-based and not a hardware module iii. SDN controller is a centralized control plane with a policy engine iv. Network transport infrastructure is abstracted from software 2. How does cisco DNA center enable automation . Controllers, REST APIs a. Controller is network management software? REST APIs is what sends configurations between layers 3. What statements correctly describe SDN architecture . SDN controller is a centralized control plane with a policy engine, SDN architecture decouples the control and data plane 4. What is the corresponding CRUD operation for an HTTP GET verb . READ 5. Select three network overlays . VXLAN, VPN, CAPWAP a. An overlay is comprised of multiple virtual interconnects between endpoints. In this context an endpoint can be either a host or network device. 6. What are four advantages of an SDN controller . Network appears as a single switch, moves control plane from physical devices to software abstracted layer, network services are dynamically configurable, centralized management and network intelligence a. See previous explanations 7. What are two advantages of automation . centralized , test and deploy a. Centralized because coming from one place, most offer a cmd emulator that will show results of a configuration pushout Security Fundamentals 1. What are the components of a standard ACL? Source address, wildcard mask Most basic ACL as follows i. Access-list 99 deny host 172.33.1.1 ii. Access-list 99 permit any 2. What port number or keyword is assignable to permit or deny DNS within an extended ACL . Domain a. In ACLs DNS is assigned the keyword domain or application port 53 because it uses udp and tcp 53 3. What wireless authentication protocol provides the most security . WPA2 a. WPA2-PSK stands for WPA2 pre shared keys and is less secure and intended for a SOHO environment 4. a. b.