CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies. Ben Piper. Читать онлайн. Newlib. NEWLIB.NET

Автор: Ben Piper
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119658801
Скачать книгу
10 2.2 Configure and verify data path virtualization technologies 10 2.3 Describe network virtualization concepts 10 Domain 3: Infrastructure 30% 3.1 Layer 2 1, 2, 3 3.2 Layer 3 1, 5, 6, 7 3.3 Wireless 4 3.4 IP Services 3, 8, 12 Domain 4: Network Assurance 10% 4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog 12 4.2 Configure and verify device monitoring using syslog for remote logging 12 4.3 Configure and verify NetFlow and Flexible NetFlow 12 4.4 Configure and verify SPAN/RSPAN/ERSPAN 12 4.5 Configure and verify IPSLA 12 4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management 11 4.7 Configure and verify NETCONF and RESTCONF 11 Domain 5: Security 20% 5.1 Configure and verify device access control 12 5.2 Configure and verify infrastructure security features 12 5.3 Describe REST API security 11 5.4 Configure and verify wireless security features 4, 12 5.5 Describe the components of network security design 4, 12 Domain 6: Automation 15% 6.1 Interpret basic Python components and scripts 11 6.2 Construct valid JSON encoded file 11 6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG 11 6.4 Describe APIs for Cisco DNA Center and vManage 11 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF 11 6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection 11 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack 11

      1 IP depends on which of the following?Address Resolution ProtocolData link layerNetwork layerTransport layer

      2 Which is not a function of a bridge?Simulating some properties of a shared physical Ethernet cableMAC-based routingReducing the size of a broadcast domainFrame check sequence validation

      3 What are the purposes of TCP sequence numbers? (Choose two.)Error controlOrderingFlow controlReliable delivery

      4 Three switches are connected via 802.1Q trunk links. You need to prevent VLAN 25 traffic from reaching two of the switches. Which of the following can accomplish this? (Choose two.)Prune VLAN 25 on the trunk links.Use routed interfaces instead of trunks.Configure Spanning Tree to block the ports to the switches.Delete VLAN 25 on the switches.

      5 Switch SW1 is running RPVST+ and is connected via a routed interface to SW2, which is running Multiple Spanning Tree. If you add VLAN 2 to both switches and map VLAN 2 to MST1 on SW2, which switch will necessarily be the root for VLAN 2?SW1SW2The switch with the lowest bridge priorityBoth SW1 and SW2

      6 Which of the following can effectively prune a VLAN from a trunk?BPDU GuardBPDU FilterLoop GuardUDLD

      7 Which of the following is the most scalable physical architecture for East-West traffic patterns?Two-tier collapsed coreLeaf-and-spine architectureRoutedThree-tier

      8 What are two reasons to choose a routed topology over a switched topology?Better scalabilityBetter use of IP address spaceThe ability to stretch subnetsFaster convergence

      9 Which protocol does not use multicast?LACPEtherChannelVRRPHSRP

      10 An access point running in lightweight mode has clients connected to two SSIDs. The total number of connected clients is 25. How many CAPWAP tunnels are there between the AP and its WLAN controller (WLC)?1225Lightweight mode doesn't use a WLC.

      11 A client performs an intra-controller roam, keeping its IP address. Which of the following is true of this roam?The SSID changes.The VLAN changes.It's a layer 2 roam.It's a layer 3 roam.

      12 What are two disadvantages of 5 GHz Wi-Fi versus 2.4 GHz Wi-Fi?Incompatibility with 802.11gIncompatibility with 802.11nIncreased free space path lossLower throughput

      13 There are three OSPF routers connected to the same subnet. Which is the designated router?The one with the lowest router IDThe first one that became activeThe one with the highest router IDThe one with the highest priority

      14 Two OSPF routers are connected to each other. One router's interface is configured as a broadcast network type, whereas the other router's interface is