Topic 1: Exam Pool A
desc about topic
Which CRUD operation corresponds to the HTTP GET method?
A.
read
B.
update
C.
create
D.
delete
read
Explanation: GET: This method retrieves the information identified by the request URI. In
the context of the RESTful web services, this method is used to retrieve resources. This is
the method used for read operations (the R in CRUD).
https://hub.packtpub.com/crud-operations-rest/
Which type of wireless encryption is used for WPA2 in preshared key mode?
A.
TKIP with RC4
B.
RC4
C.
AES-128
D.
AES-256
AES-256
Explanation:
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the
WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.
What is the difference regarding reliability and communication type between TCP and
UDP?
A.
TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol
B.
TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol
C.
TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connectionoriented
protocol
D.
TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connectionoriented
protocol
TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol
A network administrator must enable DHCP services between two sites. What must be
configured for the router to pass DHCPDISCOVER messages on to the server?
A.
a DHCP Relay Agent
B.
DHCP Binding
C.
a DHCP Pool
D.
DHCP Snooping
a DHCP Relay Agent
Drag and drop the AAA functions from the left onto the correct AAA services on the right
Which access layer threat-mitigation technique provides security based on identity?
A.
Dynamic ARP Inspection
B.
using a non-default native VLAN
C.
802.1x
D.
DHCP snooping
802.1x
Refer to the exhibit.
What is the result if Gig1/11 receives an STP BPDU?
A.
The port transitions to STP blocking
B.
The port transitions to the root port
C.
The port immediately transitions to STP forwarding.
D.
The port goes into error-disable state
The port goes into error-disable state
in Which way does a spine and-leaf architecture allow for scalability in a network when
additional access ports are required?
A.
A spine switch and a leaf switch can be added with redundant connections between them
B.
A spine switch can be added with at least 40 GB uplinks
C.
A leaf switch can be added with a single connection to a core spine switch.
D.
A leaf switch can be added with connections to every spine switch
A leaf switch can be added with connections to every spine switch
Explanation: Spine-leaf architecture is typically deployed as two layers: spines (such as
an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide
high-bandwidth, low-latency, nonblocking server-to-server connectivity.
Leaf (aggregation) switches are what provide devices access to the fabric (the network of
spine and leaf switches) and are typically deployed at the top of the rack. Generally,
devices connect to the leaf switches.
Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN
or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf
architecture, every leaf should connect to every spine in a full mesh.
Spine (aggregation) switches are used to connect to all leaf switches and are typically
deployed at the end or middle of the row. Spine switches do not connect to other spine
switches.
Refer to exhibit.
Which statement explains the configuration error message that is received?
A.
It is a broadcast IP address
B.
The router does not support /28 mask.
C.
It belongs to a private IP address range.
D.
IT is a network IP address
It is a broadcast IP address
Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)
A.
OSPF area
B.
OSPF MD5 authentication key
C.
iPv6 address
D.
OSPf process ID
E.
OSPf stub flag
OSPF area
OSPf process ID
Which virtual MAC address is used by VRRP group 1?
A.
0050.0c05.ad81
B.
0007.c061.bc01
C.
0000.5E00.0101
D.
0500.3976.6401
0000.5E00.0101
Explanation: The virtual router MAC address associated with a virtual router is an IEEE
802 MAC Address in the following format:
00-00-5E-00-01-{VRID} (in hex in internet standard bit-order)
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
A.
on
B.
auto
C.
active
D.
desirable
on
Explanation: The Static Persistence (or “on” mode) bundles the links unconditionally and
no negotiation protocol is used. In this mode, neither PAgP nor LACP packets are sent or
received.
Page 7 out of 72 Pages |
Previous |