Ben Piper - CCNP Enterprise Certification Study Guide - Implementing and Operating Cisco Enterprise Network Core Technologies

Здесь есть возможность читать онлайн «Ben Piper - CCNP Enterprise Certification Study Guide - Implementing and Operating Cisco Enterprise Network Core Technologies» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The practical and conceptual knowledge you need to attain CCNP Enterprise certification From one of the most trusted study guide publishers comes
. This guide helps you develop practical knowledge and best practices for critical aspects of enterprise infrastructure so you can gain your CCNP Enterprise certification. If you’re hoping to attain a broader range of skills and a solid understanding of Cisco technology, this guide will also provide fundamental concepts for learning how to implement and operate Cisco enterprise network core technologies By focusing on real-world skills, each chapter prepares you with the knowledge you need to excel in your current role and beyond. It covers emerging and industry-specific topics, such as SD-WAN, network design, wireless, and automation. This practical guide also includes lessons on:
● Automation
● Network assurance
● Security
● Enterprise infrastructure
● Dual-stack architecture
● Virtualization
In addition to helping you gain enterprise knowledge, this study guidecan lead you toward your Cisco specialist certification.
When you purchase this guide, you get access to the information you need to prepare yourself for advances in technology and new applications, as well as online study tools such as:
● Bonus practice exams
● Pre-made flashcards
● Glossary of key terms
● Specific focus areas
Expand your skillset and take your career to the next level with

CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

1 IP depends on which of the following?Address Resolution ProtocolData link layerNetwork layerTransport layer

2 Which is not a function of a bridge?Simulating some properties of a shared physical Ethernet cableMAC-based routingReducing the size of a broadcast domainFrame check sequence validation

3 What are the purposes of TCP sequence numbers? (Choose two.)Error controlOrderingFlow controlReliable delivery

4 Three switches are connected via 802.1Q trunk links. You need to prevent VLAN 25 traffic from reaching two of the switches. Which of the following can accomplish this? (Choose two.)Prune VLAN 25 on the trunk links.Use routed interfaces instead of trunks.Configure Spanning Tree to block the ports to the switches.Delete VLAN 25 on the switches.

5 Switch SW1 is running RPVST+ and is connected via a routed interface to SW2, which is running Multiple Spanning Tree. If you add VLAN 2 to both switches and map VLAN 2 to MST1 on SW2, which switch will necessarily be the root for VLAN 2?SW1SW2The switch with the lowest bridge priorityBoth SW1 and SW2

6 Which of the following can effectively prune a VLAN from a trunk?BPDU GuardBPDU FilterLoop GuardUDLD

7 Which of the following is the most scalable physical architecture for East-West traffic patterns?Two-tier collapsed coreLeaf-and-spine architectureRoutedThree-tier

8 What are two reasons to choose a routed topology over a switched topology?Better scalabilityBetter use of IP address spaceThe ability to stretch subnetsFaster convergence

9 Which protocol does not use multicast?LACPEtherChannelVRRPHSRP

10 An access point running in lightweight mode has clients connected to two SSIDs. The total number of connected clients is 25. How many CAPWAP tunnels are there between the AP and its WLAN controller (WLC)?1225Lightweight mode doesn't use a WLC.

11 A client performs an intra-controller roam, keeping its IP address. Which of the following is true of this roam?The SSID changes.The VLAN changes.It's a layer 2 roam.It's a layer 3 roam.

12 What are two disadvantages of 5 GHz Wi-Fi versus 2.4 GHz Wi-Fi?Incompatibility with 802.11gIncompatibility with 802.11nIncreased free space path lossLower throughput

13 There are three OSPF routers connected to the same subnet. Which is the designated router?The one with the lowest router IDThe first one that became activeThe one with the highest router IDThe one with the highest priority

14 Two OSPF routers are connected to each other. One router's interface is configured as a broadcast network type, whereas the other router's interface is configured as a point-to-point network type. Which of the following is true of this configuration? (Choose two.)They won't form an adjacency.They will form an adjacency.They won't exchange routes.They will exchange routes.

15 You have a router with an interface that's connected to a subnet dedicated to servers. You want to advertise this subnet into OSPF but don't want any servers running OSPF software to form an adjacency with the router. How can you accomplish this?Configure null authentication.Use a distribute list.Advertise a default route.Configure the interface as a passive interface.

16 An OSPF autonomous system boundary router (ASBR) is redistributing the prefix 192.168.0.0/16 into EIGRP AS 1. What is the administrative distance of the route?20110170200

17 Which of the following are considered in calculating an EIGRP metric? (Choose all that apply.)BandwidthDelayMTUReliabilityLatencyWeight

18 Consider the following EIGRP output.P 10.0.36.0/29, 1 successors, FD is 3328via 10.0.45.4 (3328/3072), GigabitEthernet0/3.via 10.0.56.6 (5632/2816), GigabitEthernet0/0.Which of the following is the feasible successor?10.0.36.110.0.56.610.0.45.410.0.36.2

19 What occurs when an eBGP router receives a route that already has its own AS number in the path?Removes the AS and advertises the routeAdvertises the route as isDiscards the routeInstalls the route in its BGP RIBDiscards all routes from the router it received the route from

20 R1 has the prefix 172.16.0.0/16 in its IP routing table, learned from EIGRP AS 16. There are no other BGP, IGP, or static routes in the routing table. You execute the following BGP router configuration commands on R1:network 172.16.0.0 mask 255.255.255.0redistribute eigrp 16Which of the following will be true regarding the route R1 advertises for the 172.16.0.0/16 prefix?172.16.0.0/16 will have an incomplete origin type.172.16.0.0/24 will have an incomplete origin type.R1 will not advertise the 172.16.0.0/16 prefix.172.16.0.0/16 will have an IGP origin type.

21 Consider the following prefix list and route map on router R1:ip prefix-list all-private: 3 entriesseq 5 permit 10.0.0.0/8 le 32seq 10 deny 0.0.0.0/0 le 32route-map allow-public, deny, sequence 10Match clauses:ip address prefix-lists: all-privateSet clauses:Policy routing matches: 0 packets, 0 bytesroute-map R4, permit, sequence 20Match clauses:Set clauses:Policy routing matches: 0 packets, 0 bytesWhich prefix will this route map allow?10.255.255.0/2410.0.0.0/3210.0.0.0/80.0.0.0/0

22 Consider the following output from a NAT router:R2#debug ip natIP NAT debugging is onR2#NAT*: s=7.0.0.12->2.0.0.2, d=10.0.12.1 [155]Which of the following is the inside global address?2.0.0.210.0.12.17.0.0.1210.0.12.155

23 A router running PIM has a single multicast RIB entry marked (223.3.2.1, 239.8.7.6). What does this indicate?The router has received an IGMP Membership Report from 223.3.2.1.239.8.7.6 has sent unicast traffic to 223.3.2.1.223.3.2.1 has sent multicast traffic to 239.8.7.6.The router has received a PIM Join/Graft from 223.3.2.1.

24 Which of the following commands individually configures port address translation?ip nat inside source list 1 pool natpoolip nat inside destination list 1 pool natpool overloadip nat outside source list 1 pool natpool overloadip nat inside source list 1 interface gi0/2 overload

25 Which QoS Class Selector has the lowest priority?CS0CS1CS7EF

26 Which of the following prevent TCP global synchronization? (Choose two.)Explicit congestion notificationPolicingWeighted random early detectionFair queuing

27 Which of the following queues can never exceed its bandwidth allocation during times of congestion?Low-latency queueClass-based weighted fair queuePolicing queuePriority queue

28 What is another term for reflective relay?Virtual network functionVirtual Ethernet bridgeVirtual switchingExternal edge virtual bridging

29 Which of the following might you need to allow in order to use IPsec in transport mode? (Choose two.)TCP port 50IP protocol 50UDP port 500IP protocol 51IP protocol 41

30 By default, what does VXLAN use for MAC address learning? (Choose two.)MulticastEVPNData plane learningControl plane learning

31 What type of encapsulation does SD-Access use?LISPIPsecVXLANGRE

32 Which of the following is not a component of SD-WAN?DTLSBGPOMPIPsec

33 Which of the following HTTP response codes indicates successful authentication using a GET or PUT request?200201204401500

34 You want to control which commands administrators can run on a router. Which of the following should you configure?TACACS+ authorizationRADIUS authorizationLocal authenticationTACACS+ accounting

35 Which of the following can authenticate only a machine but not a user?PEAP802.1XMAC authentication bypassWebAuth

36 Which of the following can't be used to block ARP packets or Spanning Tree BPDUs? (Choose two.)Port ACLVLAN access mapMAC ACLExtended IP ACL

Answers to Assessment Test

1 B. The Data Link layer facilitates data transfer between two nodes. IP addresses are logical addresses based on an abstraction of the Data Link layer. See Chapter 1 for more information.

2 C. A bridge maintains a Media Access Control (MAC) address table that it uses to perform a crude form of routing. This reduces the need for flooding but doesn't reduce the size of the broadcast domain. Bridges forward received frames, thus simulating some of the properties of a shared physical Ethernet cable. Bridges discard frames that fail frame check sequence validation. See Chapter 1 for more information.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies»

Представляем Вашему вниманию похожие книги на «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies»

Обсуждение, отзывы о книге «CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x