Topic 1: Exam Pool A
desc about topic
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
A.
management plane
B.
control plane
C.
policy plane
D.
data plane
data plane
Refer to the exhibit.
Which password must an engineer use to enter the enable mode?
A.
adminadmin123
B.
default
C.
testing 1234
D.
cisco123
testing 1234
Explanation: If neither the enable password command nor the enable secret command is
configured, and if there is a line password configured for the console, the console line
password serves as the enable password for all VTY sessions -> The “enable secret” will
be used first if available, then “enable password” and line password.
What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
A.
Filter traffic based on destination IP addressing
B.
Sends the default route to the hosts on a network
C.
ensures a loop-free physical topology
D.
forwards multicast hello messages between routers
forwards multicast hello messages between routers
Explanation: FHRP is layer 3 protocol whose purpose is to protect the default gateway by
offering redundancy of the gateway in a subnet. This is achieved by allowing two or more
routers to provide a backup for the first-hop IP router address. If a failure of an active router
occurs, the backup router will take over the address. The routers negotiate their roles
(Active/Standby) with each other by multicast hello messages to share the VIP (virtual IPaddress) between the FHRP routers. The terms Active/Standby vary between the different
types of FHRP. The active router will act as the default gateway and the standby router
acts as a backup the active router
A port security violation has occurred on a switch port due to the maximum MAC address
count being exceeded. Which command must be configured to increment the securityviolation
count and forward an SNMP trap?
A.
switchport port-security violation access
B.
switchport port-security violation protect
C.
switchport port-security violation restrict
D.
switchport port-security violation shutdown
switchport port-security violation restrict
Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/25ew/configuration/guide/conf/port_sec.html
What is the function of a controller in controller-based networking?
A.
It serves as the centralized management point of an SDN architecture.
B.
It centralizes the data plane for the network.
C.
It is the card on a core router that maintains all routing decisions for a campus.
D.
It is a pair of core routers that maintain all routing decisions for a campus
It serves as the centralized management point of an SDN architecture.
Page 2 out of 173 Pages |
Previous |