Home > Drag Drop Questions

Drag Drop Questions

Question 1

Explanation

OSPF metric is only dependent on the interface bandwidth & reference bandwidth while EIGRP metric is dependent on bandwidth and delay by default.

Both OSPF and EIGRP have three tables to operate: neighbor table (store information about OSPF/EIGRP neighbors), topology table (store topology structure of the network) and routing table (store the best routes).

Question 2

Question 3

Explanation

The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic policing propagates bursts. When the traffic rate reaches the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs. In contrast to policing, traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate.

traffic_policing_vs_shaping.jpg

Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the routing device.

Question 4

Explanation

ITR is the function that maps the destination EID to a destination RLOC and then encapsulates the original packet with an additional header that has the source IP address of the ITR RLOC and the destination IP address of the RLOC of an Egress Tunnel Router (ETR). After the encapsulation, the original packet become a LISP packet.

ETR is the function that receives LISP encapsulated packets, decapsulates them and forwards to its local EIDs. This function also requires EID-to-RLOC mappings so we need to point out an “map-server” IP address and the key (password) for authentication.

A LISP proxy ETR (PETR) implements ETR functions on behalf of non-LISP sites. A PETR is typically used when a LISP site needs to send traffic to non-LISP sites but the LISP site is connected through a service provider that does not accept nonroutable EIDs as packet sources. PETRs act just like ETRs but for EIDs that send traffic to destinations at non-LISP sites.

Map Server (MS) processes the registration of authentication keys and EID-to-RLOC mappings. ETRs sends periodic Map-Register messages to all its configured Map Servers.

Map Resolver (MR): a LISP component which accepts LISP Encapsulated Map Requests, typically from an ITR, quickly determines whether or not the destination IP address is part of the EID namespace

Question 5

Explanation

Unlike OSPF where we can summarize only on ABR or ASBR, in EIGRP we can summarize anywhere.

Manual summarization can be applied anywhere in EIGRP domain, on every router, on every interface via the ip summary-address eigrp as-number address mask [administrative-distance ] command (for example: ip summary-address eigrp 1 192.168.16.0 255.255.248.0). Summary route will exist in routing table as long as at least one more specific route will exist. If the last specific route will disappear, summary route also will fade out. The metric used by EIGRP manual summary route is the minimum metric of the specific routes.

Question 6

Explanation

When Secure Vault is not in use, all information stored in its container is encrypted. When a user wants to use the files and notes stored within the app, they have to first decrypt the database. This happens by filling in a previously determined Security Lock – which could be a PIN or a password of the user’s choosing.

When a user leaves the app, it automatically encrypts everything again. This way all data stored in Secure Vault is decrypted only while a user is actively using the app. In all other instances, it remains locked to any attacker, malware or spyware trying to access the data.

How token-based authentication works: Users log in to a system and – once authenticated – are provided with a token to access other services without having to enter their username and password multiple times. In short, token-based authentication adds a second layer of security to application, network, or service access.

OAuth is an open standard for authorization used by many APIs and modern applications. The simplest example of OAuth is when you go to log onto a website and it offers one or more opportunities to log on using another website’s/service’s logon. You then click on the button linked to the other website, the other website authenticates you, and the website you were originally connecting to logs you on itself afterward using permission gained from the second website.

Question 7

Explanation

To attach a policy map to an input interface, a virtual circuit (VC), an output interface, or a VC that will be used as the service policy for the interface or VC, use the service-policy command in the appropriate configuration mode.

Class of Service (CoS) is a 3 bit field within an Ethernet frame header when we use 802.1q which supports virtual LANs on an Ethernet network. This field specifies a priority value which is between 0 and 63 inclusive which can be used in the Quality of Service (QoS) to differentiate traffic.

The Differentiated Services Code Point (DSCP) is a 6-bit field in the IP header for the classification of packets. Differentiated Services is a technique which is used to classify and manage network traffic and it helps to provide QoS for modern Internet networks. It can provide services to all kinds of networks.

Traffic policing is also known as rate limiting as it propagates bursts. When the traffic rate reaches the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs.

Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time -> It causes delay.

Question 8

Question 9

Question 10

Explanation

+ StealthWatch: performs security analytics by collecting network flows via NetFlow
+ ESA: email security solution which protects against email threats like ransomware, business email compromise, phishing, whaling, and many other email-driven attacks
+ AMP for Endpoints (AMP4E): provides malware protection on endpoints
+ Umbrella: provides DNS protection by blocking malicious destinations using DNS
+ Firepower Threat Defense (FTD): provides a comprehensive suite of security features such as firewall capabilities, monitoring, alerts, Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

Comments
  1. david
    March 29th, 2020

    @admin
    D&D for Qos is not working in Composite Quizzes.
    please take a look.

  2. digitaltut
    March 29th, 2020

    @david: Thanks for your detection! We have just updated the Composite Quizzes.

  3. D&d
    April 26th, 2020

    Q1 is wrong.

    OSPF metric is based on BW, not delay and reliability. That answer should be dragged to the EIGRP part (EIGRP metric is based on BW, delay, reliability, load and MTU).

    And OSPF maintains 3 tables: neighbor, topology and routing table.

  4. Aussie
    April 27th, 2020

    Agree
    Q1
    OSPF – 2,5,6
    EIGRP – 1,3,4

  5. randy227
    May 25th, 2020

    On the QoS drag and drop Question 3, if Shaping typically has delays shouldn’t it also introduce delay and jitter?

  6. japanese
    September 22nd, 2020

    is it the eigrp should be based on bandwidth and delay by default ? not reliability ?

  7. digitaltut
    September 22nd, 2020

    @japanese: Yes, we also noticed it in the explanation but there is no better choice so we had to pick it.

  8. LK24
    February 13th, 2021

    Q8 D&D – Cloud : which sequence is correct please.
    Pay…, Very Scalable…, Physical location
    or
    Pay.., Physical location…, Very Scable…

  9. Fidonet
    April 22nd, 2021

    Q6.
    Seems like wrong, because:
    Oauth = through identity provider
    Proof: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2018/pdf/DEVNET-3613.pdf (just see page 12).

  10. ldnl
    April 22nd, 2021

    HTTP basic authentication — username and password in an encoded string
    token-based authentication — API-dependent secret
    secure vault — public API resource
    OAuth — authorization through identity provider

    Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2018/pdf/DEVNET-3613.pdf

  11. Fidonet
    April 22nd, 2021

    @ldnl
    Yes, this is exact it!

  12. longgee
    April 27th, 2021

    @digitaltut

    Please help to update question 6.

  13. Talal
    June 2nd, 2021

    Dear All,

    Please someone share the latest dumps at (suffianmanzoor at gmail dot com).
    many thanks in advance.

  14. Anonymous
    August 23rd, 2021

    Question 10, Umbrella should be provides DNS protection. Cisco bought OpenDNS and then rebranded it as Umbrella. We use Umbrella where I work and it has integration with the Meraki firewalls where the Meraki Firewalls hijack any outgoing DNS requests and pass them to Umbrella. (this is a beta feature we enabled.) Anyways. I’m 100 percent confident Umbrella is DNS protection

  15. Paui
    August 27th, 2021

    QoS drag and drop. Should it be??:
    Traffic Policing:
    -drop excessive traffic
    -causes TCP retransmissions when traffic is dropped
    -introduces no delays and jitter
    Traffic Shaping
    -buffers excessive traffic
    -typically delays, rather than drops traffic
    -introduces delays and jitter

  16. YarDDA
    March 21st, 2022

    Hi , So taken the exam & passed. 60% same Q and the rest are very close to current Q but . difference will be in the wording . lots of new automation Q .

  17. Jessica
    April 16th, 2022

    thanks for your help good website, but you do not have testing simulator like certkingdom thank to them also

    thank you

  18. Hans
    March 20th, 2023

    Hi,

    I have a question. Are the practical labs in the exam ?

    Best regards

    Hans

  1. No trackbacks yet.