Home > Operations Questions

Operations Questions

Question 1

Which two statements are true about OTV? (Choose two)

A. It relies on flooding to propagate MAC address reachability information.
B. It uses a full mesh of point-to-multipoint tunnels to prevent head-end replication of multicast traffic.
C. It can work over any transport that can forward IP packets.
D. It supports automatic detection of multihoming.


Answer: C D

Question 2

What is a cause for unicast flooding?

A. Unicast flooding occurs when multicast traffic arrives on a Layer 2 switch that has directly connected multicast receivers.
B. When PIM snooping is not enabled, unicast flooding occurs on the switch that interconnects the PIM-enabled routers.
C. A man-in-the-middle attack can cause the ARP cache of an end host to have the wrong MAC address. Instead of having the MAC address of the default gateway, it has a MAC address of the man-in-the-middle. This causes all traffic to be unicast flooded through the man-in-the-middle, which can then sniff all packets.
D. Forwarding table overflow prevents new MAC addresses from being learned, and packets destined to those MAC addresses are flooded until space becomes available in the forwarding table.


Answer: D

Question 3

A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but attempts to transmit larger amounts of data hang and then time out. What is the cause of this problem?

A. A link is flapping between two intermediate devices.
B. The processor of an intermediate router is averaging 90 percent utilization.
C. A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a port that has a sniffer attached.
D. There is a PMTUD failure in the network path.


Answer: D

Question 4

Refer to the exhibit.

RouterA(config) #ip options drop

At which location will the benefit of this configuration be observed?

A. on Router A and its upstream routers
B. on Router A and its downstream routers
C. on Router A only
D. on Router A and all of its ARP neighbors


Answer: B

Question 5

In GETVPN, which key is used to secure the control plane?

A. Traffic Encryption Key (TEK)
B. content encryption key (CEK)
C. message encryption key (MEK)
D. Key Encryption Key (KEK).


Answer: D

Question 6

Which two options are causes of out-of-order packets? (Choose two)

A. a routing loop
B. a router in the packet flow path that is intermittently dropping packets
C. high latency
D. packets in a flow traversing multiple paths through the network
E. some packets in a flow being process-switched and others being interrupt-switched on a transit router


Answer: D E

Question 7

Which two statements describe characteristics of HDLC on Cisco routers? (Choose two)

A. It supports multiple Layer 3 protocols.
B. It supports multiplexing.
C. It supports only synchronous interfaces.
D. It supports authentication.


Answer: A C

Question 8

Refer to the exhibit.

snmp-server community public RO 2
snmp-server trap-source Loopback0
snmp-server chassis-id HONGKONG
snmp-server enable traps snmp linkdown linkup coldstart
snmp-server enable traps ospf state-change
snmp-server enable traps bgp state-changes
snmp-server enable traps pim neighbor-change
snmp-server enable traps cpu threshold
snmp-server enable traps mpls ldp
snmp-server host version 2c public

Which statement about this device configuration is true?

A. The NMS needs a specific route configured to enable it to reach the Loopback0 interface of the device.
B. The ifindex of the device could be different when the device is reloaded.
C. The device will allow anyone to poll it via the public community.
D. The device configuration requires the AuthNoPriv security level.


Answer: B

Question 9

Which two methods change the IP MTU value for an interface? (Choose two)

A. Configure the default MTU.
B. Configure the IP system MTU.
C. Configure the interface MTU.
D. Configure the interface IP MTU.


Answer: C D

Question 10

Which three statements about implementing a NAT application layer gateway in a network are true? (Choose three)

A. It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used.
B. It maintains granular security over application-specific data.
C. It allows synchronization between multiple streams of data between two hosts.
D. Application layer gateway is used only in VoIP/SIP deployments.
E. Client applications require additional configuration to use an application layer gateway.
F. An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network.


Answer: A B C

Comments (5) Comments
  1. source_route
    December 4th, 2014

    Q8 – not sure about B, wouldn’t it also be true that the NMS would need a route to loopback0

  2. Hamid Saffarzadeh
    December 15th, 2014

    Q5 – Two different types of encryption keys- the Key Encryption Key (KEK) is used to secure GET VPN control plane, and the Traffic Encryption Key (TEK) which encrypts the data traffic.

  3. Mostafa
    January 8th, 2015

    Please explain Q#8 in details.


  4. lew
    January 13th, 2015

    Q4. Kindly explain.

  5. DIEGO
    March 17th, 2015

    for Q8 read, http://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol-snmp/28420-ifIndex-Persistence.html
    as you can see if there is now persistence command the interface can register in other order causing the change in the ifindex,

Add a Comment

Reload Image