Cisco CCNP Exam Questions

Page 10 of 25

181.

Which of the following REST API status codes indicate that a request failed? (Choose three.)

  • 400

  • 401

  • 403

  • 200

  • 201

4XX status codes indicate that the request failed due to a client-side issue. This could be a bad request (400), authentication failure (401), authorization failure (402), or other issue.

2XX status codes indicate successful requests. 200 OK is the desired request for most Cisco Application Programming Interfaces (APIs), and 201 Create indicates that some resource was successfully created as a result of the request.

182.

Which of the following is most commonly used to test the reachability of a remote host?

  • ping

  • traceroute

  • SNMP

  • debugs

Correct answer: ping

The ping command is a built-in utility used to determine whether a remote system is reachable via the network. The default ping command (ping ip-address) sends five Internet Control Message Protocol (ICMP) packets and looks for responses from the remote system.

The traceroute command maps the route that a packet takes between a source and destination, including the Internet Protocol (IP) address or Domain Name System (DNS) name and latency of each hop along the way. By default, traceroute will try connecting 30 times before considering a destination unreachable.

Debugging provides deeper insight into what might be going wrong with protocols such as Open Shortest Path First (OSPF).

The Simple Network Management Protocol (SNMP) enables device configuration and management over the network.

183.

Which of the following involves buffering excess traffic which can help prevent it from being dropped? (Choose two.)

  • Shaping

  • Congestion Mitigation

  • Congestion Avoidance

  • Policing

  • Marking

Quality of Service (QoS) provides priority to certain types of network traffic, reducing latency, jitter, and packet loss for them. Common components of QoS include:

  • Classification and Marking: Dividing network traffic into classes based on its purpose and importance to the business. After traffic is classified, it is marked to allow QoS policies to be applied to it.
  • Policing: Policing helps to enforce traffic rates by transmitting or remarking inbound or outbound traffic that complies with the rates and dropping or marking down traffic that exceeds it.
  • Shaping: Shaping implements a buffer for egress traffic that holds traffic exceeding the traffic rate until the rate drops to the defined level. If traffic is below the desired traffic rate, then egress traffic isn’t buffered.
  • Congestion Management: Congestion management buffers excess traffic, and then removes packets from the queue via various algorithms.
  • Congestion Avoidance: Congestion avoidance attempts to proactively prevent network congestion by selectively dropping packets.

184.

Which of the following is not true of policy-based routing?

  • It can cause the RIB to fill up with too many next-hop addresses

  • It is more resource-intensive than traditional routing

  • It may not be fully supported on all platforms

  • It doesn't take advantage of network intelligence

Correct answer: It can cause the RIB to fill up with too many next-hop addresses

Next-hop Internet Protocol (IP) addresses for conditional traffic aren’t included in the Routing Information Base (RIB) since they’re not universally applicable.

Defining and applying routes requires resources that limit scalability.

Conditional routing doesn’t leverage network intelligence (knowledge of failed links, etc.).

Not all hardware platforms support all available options.

185.

Where on a Cisco switch can you find the MAC addresses of each directly connected next-hop IP address?

  • AIB

  • RIB

  • FIB

  • CAM

  • TCAM

Correct answer: AIB

An adjacency table or the Adjacency Information Base (AIB) contains the next-hop Media Access Control (MAC) addresses for each directly connected next-hop Internet Protocol (IP) address as well as the MAC address of the egress interface. It’s populated by the Address Resolution Protocol (ARP) table or similar sources.

The Forwarding Information Base (FIB), part of the software Cisco Express Forwarding (CEF), stores the next-hop information for each network destination and is used to make IP destination prefix-based decisions about how to route packets.

Content Addressable Memory (CAM) holds the MAC address table and uses specialized search techniques to enable addresses to be found faster than with Random Access Memory (RAM).

The Routing Information Base (RIB) is Cisco’s term for a routing table, which stores information on how to reach different devices or networks.

Ternary Content Addressable Memory (TCAM) is memory on a Cisco switch that allows multiple different fields to be used to evaluate a packet. It’s used for Layer 2 and 3 searching and returns 0, 1, or X (don’t care).

186.

In YANG, a leaf node tagged as config false holds which of the following types of data?

  • State data

  • Configuration data

  • Management data

  • Notification data

  • Command data

Correct answer: State data

In Yet Another Next Generation (YANG), a node that contains config false holds state data. Otherwise, it contains configuration data.

Management, notification, and command data are not types of data held by YANG.

187.

Which of the following components of Flexible NetFlow define what type of data to collect? (Choose two.)

  • Flow record

  • Flow sampler

  • Flow monitor

  • Flow exporter

Flexible NetFlow defines several types of components. The four types include:

  • Flow Records: Include key and non-key fields. Combination of default and user-configured records. The match command selects key fields, and the collect command selects non-key fields. The combination of key and non-key fields specifies what data to collect.
  • Flow Samplers: Samples NetFlow data rather than analyzing all of it (with a tradeoff between resource utilization and accuracy). Specify what to collect like Flow Records do but don't collect everything.
  • Flow Monitors: Applied to a particular interface to monitor traffic.
  • Flow Exporters: Exports data from Flow Monitor cache in NetFlow Version 9 to a remote system.

188.

Which of the following algorithms has tokens in a bucket that are allocated for handling bursty traffic? (Choose two.)

  • Two-Rate, Three Color

  • Single-Rate, Three Color

  • Single-Rate, Two Color

  • Two-Rate, Two Color

Cisco supports three types of traffic policing algorithms:

  • Single-Rate, Two-Color: Traffic has a single Committed Information Rate (CIR), and traffic exceeding that rate (using up all tokens in the bucket) is downgraded in priority.
  • Single-Rate, Three Color: This is a two-bucket algorithm in which traffic for which there are no tokens available in the first bucket might use tokens in a second bucket designed to handle temporary bursts (which is filled using excess tokens from the first bucket). This traffic is usually marked down (but can be dropped), and any traffic beyond that is likely dropped (but can be marked down).
  • Two-Rate, Three-Color: Introduces a Peak Information Rate (PIR) in addition to the CIR, which defines the rate at which tokens are added to the second bucket. Otherwise operates similarly to Single-Rate, Three-Color.

Two-rate, two-color is not a traffic policing algorithm.

189.

Which of the following forms of Application Programming Interface (API) authentication uses data in a fixed format to communicate claims about a user to the relying party?

  • JWT

  • API keys

  • Digital certificates

  • Username and password

Correct answer: JWT

JSON Web Tokens (JWTs) encode a set of claims regarding a user that can be used to make access decisions. JWTs can use digital signatures (preferred) or Message Authentication Codes (MACs) to protect the integrity of the claims data. Core claims include iss (issuer), aud (audience), exp (expiration time), and nbf (not before time).

The other options can be used for authentication but don't fit this description.

190.

Which of the following HTTP headers is used to carry authentication information for the Cisco DNA Center Network Device API?

  • X-Auth-Token

  • x-www-form-urlencoded

  • Content

  • Auth

  • JSON

Correct answer: X-Auth-Token

The Cisco DNA Center Network Device Application Programming Interface (API) uses an API key from the Token API to perform authentication. This is provided via the X-Auth-Token header.

The other answers are not Hypertext Transfer Protocol (HTTP) header values used for this API.

191.

Which of the following ranges can be used by a numbered standard ACL? (Choose two.)

  • 0-99

  • 1900-1999

  • 100-199

  • 2000-2100

Numbered standard Access Control Lists (ACLs) look only at the source network and use numbered entries in the ranges 0-99 and 1300-1999.

Numbered extended ACLs look at various packet attributes (source, destination, protocol, port, etc.) and use the numbered entries 100-199 and 2000-2699.

192.

Which of the following statements is true of local SPAN?

  • A single source port can be used in multiple SPAN sessions.

  • Only a single SPAN session can run on a switch.

  • A single destination port can be used in multiple SPAN sessions.

  • SPAN source ports can only be switched ports.

Correct answer: A single source port can be used in multiple SPAN sessions.

A single source port can be used in multiple Switched Port Analyzer (SPAN) sessions and can be either a switched or routed port.

A switch can support multiple SPAN sessions, but a destination port can only be used in a single SPAN session.

193.

EEM applets can call which of the following types of scripts?

  • Tcl

  • Python

  • Perl

  • Ruby

Correct answer: Tcl

Embedded Event Manager (EEM) is a tool for building software applets for automation in Cisco IOS. Applets can call Tcl scripts and can run automatically based on events or actions on a local device.

Python, Perl, and Ruby are all programming languages but incorrect answers.

194.

Which of the following is the first criterion used for path selection?

  • Prefix length

  • Administrative distance

  • Metrics

  • Hop count

Correct answer: Prefix length

Path selection chooses a path for a packet by looking at the Forwarding Information Base (FIB), which is programmed using the Routing Information Base (RIB), for the prefix length programmed there. Three key components of path selection include:

  • Prefix Length: The prefix length defines the range of Internet Protocol (IP) addresses that a path applies to, specified by the number of 1 bits in the subnet mask. The longer the prefix length (meaning the more specific the address), the more preferred the route.
  • Administrative Distance (AD): The AD defines how trustworthy the source of a route is. When choosing between equivalent routes (same prefix length) from different routing protocols, the AD is used to decide.
  • Metrics: Metrics are the basis for a routing protocol’s decision (path length, link state, etc.) and can vary from one algorithm to another.

Hop count is a metric used to choose paths in a distance vector routing algorithm.

195.

In which of the following modes of 802.1D STP does the switch begin updating the MAC address table?

  • Learning

  • Blocking

  • Listening

  • Forwarding

  • Disabled

Correct answer: Learning

In 802.1D Spanning Tree Protocol (STP), a switch port can be in the following states:

  • Disabled: Turned off.
  • Blocking: Port is turned on but doesn’t forward traffic to protect against loops. Receives Bridge Protocol Data Units (BPDUs) but doesn’t send or change the Media Access Control (MAC) address table.
  • Listening: Next state after blocking where port can send and receive BPDUs but can’t forward network traffic. Duration depends on STP forwarding time.
  • Learning: Can modify the MAC address table based on received traffic but still can’t forward traffic. Duration depends on STP forwarding time.
  • Forward: The port can now forward traffic and can perform any updates to the MAC address table.
  • Broken: The port has a configuration or operational issue and discards packets until this is corrected.

196.

Which of the following are mechanisms used to protect against injection attacks in RESTful APIs? (Choose three.)

  • Input validation

  • Output encoding

  • Data sanitization

  • Rate limiting

  • Throttling

Input validation, data sanitization, and output encoding are methods of protecting against injection attacks.

Rate limiting and throttling protect against Application Programming Interface (API) abuse and Denial of Service (DoS) attacks by limiting the number of requests that a user can make.

197.

Which of the following IP SLA probes don't perform measurements in only one direction? (Choose three.)

  • Packet sequencing

  • Delay

  • Path

  • Jitter

  • Packet loss

Packet sequencing checks if packets are ordered correctly. Delay can be measured one-way or round-trip. Path probes are performed per hop.

Jitter and packet loss are measured in a specific direction.

198.

When first setting up a policy map for CoPP, which of the following protocols might have an initial violate setting of drop?

  • ICMP

  • ESP

  • NTP

  • OSPF

  • GRE

Correct answer: ICMP

When first setting up a policy map for Control Plane Policing (CoPP), vital protocols are typically set to transmit packets even if they violate the rates to ensure that rate limits don't cause normal traffic to be dropped. However, less essential protocols like the Internet Control Message Protocol (ICMP) can be set to drop from the beginning.

The other protocols listed are all vital protocols that should be permitted until baselines are established.

199.

In IGMPv2, which of the following message types is solely for backward compatibility?

  • 0x12

  • 0x16

  • 0x11

  • 0x17

  • 0x13

Correct answer: 0x12

The Internet Group Management Protocol Version 2 (IGMPv2) is common in multicast networks and is encapsulated in an IP packet with an IP router alert set and a Time-To-Live (TTL) of 1. IGMP messages have five types:

  • Version 2 membership report (0x16): An IGMP join request used by a receiver to join a specified group or to answer a router’s membership query.
  • Version 1 membership report: (0x12): Backward-compatible message to support IGMPv1.
  • Version 2 leave group (0x17): Receiver indicates that they want to leave the specified group.
  • General membership query (0x11): Sent to all-hosts group address (224.0.0.1) to check if the subnet contains any receivers. Uses a group address of 0.0.0.0. Each receiver will set random timers for each group and send a membership report for each assuming that they haven’t received a membership report for it from another receiver before the timer expires.
  • Group-specific query (0x11): Sent to group address after a receiver has asked to leave the group. Only sent if the receiver was the last one to respond to a general membership query. If no responses are received, then the router stops tracking and distributing that group’s messages.

0x13 is not an IGMPv2 message type.

200.

Which of the following is not a valid JSON object?

  • {'age': 25}

  • {"age": "25"}

  • {"age": 25}

  • {"ages": ["25", 26"]}

  • {"ages": [25,26]}

Correct answer: {'age': 25}

In JavaScript Object Notation (JSON), objects are encapsulated in curly braces, keys and non-numeric values in double-quotes, and arrays in square braces. Arrays can contain values or other objects. {'age': 25} is incorrect because it uses single quotes to contain the key.

The remaining answers are valid.