How do TCP and UDP differ in the way that they establish a connection between two endpoints?
ATCP uses synchronization packets, and UDP uses acknowledgment packets.
BUDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits.
CUDP provides reliable message transfer and TCP is a connectionless protocol.
DTCP uses the three-way handshake and UDP does not guarantee message delivery.
Correct Answer:D
QUESTION 23 When OSPF learns multiple paths to a network, how does it select a route? A. It multiple the active K value by 256 to calculate the route with the lowest metric. B. For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth. C. It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost. D. It count the number of hops between the source router and the destination to determine the router with the lowest metric. Correct Answer
Q242. Network Access
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
Aadminadmin123
Bdefault
Ctesting1234
Dcisco123
Correct Answer:C
If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console, the console line password serves as the enable password for all VTY sessions -> The "enable secret" will be used first if available, then "enable password" and line password. Reference: https://www.cisco.com/c/en/us/td/docs/optical/cpt/r9_3/configuration/guide/cpt93_configuration/cpt93_configuration_chapter_0100
Q255. Security Fundamentals
Which configuration is needed to generate an RSA key for SSH on a router?
AConfigure the version of SSH. B. Configure VTY access.
CCreate a user with a password.
DAssign a DNS domain name.
Correct Answer:D
In order to generate an RSA key for SSH, we need to configure the hostname and a DNS domain name on the router (a username and password is also required). Therefore in fact both answer C and answer D are correct.
Q266. Automation and Programmability
Which output displays a JSON data representation? A. Option A
BOption B
COption C
DOption D
Correct Answer:C
JSON data is written as name/value pairs. A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value: “name”:”Mark” JSON can use arrays. Array values must be of type string, number, object, array, boolean or null. For example: { “name”:”John”, “age”:30, “cars”:[ “Ford”, “BMW”, “Fiat” ] } JSON can have empty object like “taskId”:{}
Q275. Security Fundamentals
What is the primary different between AAA authentication and authorization?
AAuthentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.
BAuthentication identifies a user who is attempting to access a system, and authorization validates the users password.
CAuthentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.
DAuthentication controls the system processes a user can access and authorization logs the activities the user initiates.
Correct Answer:C
AAA stands for Authentication, Authorization and Accounting. + Authentication: Specify who you are (usually via login username & password) + Authorization: Specify what actions you can do, what resource you can access + Accounting: Monitor what you do, how long you do it (can be used for billing and auditing) An example of AAA is shown below: + Authentication: "I am a normal user. My username/password is user_tom/learnforever" + Authorization: "user_tom can access LearnCCNA server via HTTP and FTP" + Accounting: "user_tom accessed LearnCCNA server for 2 hours". This user only uses "show
Q282. Network Access
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?
AIt allows the traffic to pass through unchanged.
BIt drops the traffic.
CIt tags the traffic with the default VLAN.
DIt tags the traffic with the native VLAN.
Correct Answer:A
Untagged traffic from the device attached to the Cisco IP Phone passes through the phone unchanged, regardless of the trust state of the access port on the phone. Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/vlan/configuration_guide/b_vlan_152ex_2960-x_cg/b_vlan_152ex_2960-x_cg_chapter_0110.pdf
Q291. Network Fundamentals
An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
Ainterface e0/0 description to HQ-A370:98968 ip address 10.2.1.3 255.255.255.252
Binterface e0/0 description to HQ-A370:98968 ip address 192.168.1.1 255.255.255.248
Cinterface e0/0 description to HQ-A370:98968 ip address 172.16.1.4 255.255.255.248
Dinterface e0/0 description to HQ-A370:98968 ip address 209.165.201.2 255.255.255.252
Correct Answer:D
A /30 subnet means subnet mask of 255.255.255.252. But 10.2.1.3 255.255.255.252 is a broadcast IP address; only 209.165.201.2/30 is the usable IP address.
Q301. Network Fundamentals
What is a benefit of using a Cisco Wireless LAN Controller?
ACentral AP management requires more complex configurations.
BUnique SSIDs cannot use the same authentication method.
CIt supports autonomous and lightweight APs.
DIt eliminates the need to configure each access point individually.
Correct Answer:D
Q316. Automation and Programmability
What are two characteristics of a controller-based network? (Choose two)
Choose 2 — select all that apply
AThe administrator can make configuration updates from the CLI.
BIt uses northbound and southbound APIs to communicate between architectural layers.
CIt moves the control plane to a central point.
DIt decentralizes the control plane, which allows each device to make its own forwarding decisions.
EIt uses Telnet to report system issues.
Correct Answer:BC
Q323. IP Connectivity
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
Adual algorithm
Bmetric
Cadministrative distance
Dhop count
Correct Answer:C
Administrative distance is the feature used by routers to select the best path when there are two or more different routes to the same destination from different routing protocols. Administrative distance defines the reliability of a routing protocol.