ENCORE7 at TU Berlin

Flashcards and summaries for ENCORE7 at the TU Berlin

Arrow Arrow

It’s completely free

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

Study with flashcards and summaries for the course ENCORE7 at the TU Berlin

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A. MACsec

B. IPsec 

C. SSL 

D. Cisco Trustsec

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network? 

A. security group tag ACL assigned to each port on a switch B. security group tag number assigned to each port on a network

C. security group tag number assigned to each user on a switch

D. security group tag ACL assigned to each router on a network

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers? 

A. uses flexible NetFlow 

B. assigns a VLAN to the endpoint 

C. classifies traffic based on the contextual identity of the endpoint rather than its IP address

D. classifies traffic based on advanced application recognition

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

What is the difference between the enable password and the enable secret password when password encryption is enable on an IOS device? 

A. The enable password is encrypted with a stronger encryption method 

B. There is no difference and both passwords are encrypted identically 

C. The enable password cannot be decrypted 

D. The enable secret password is protected via stronger cryptography mechanisms

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

The login method is configured on the VTY lines of a router with these parameters. – The first method for authentication is TACACS – If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task?

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which NGFW mode block flows crossing the firewall?

A. Passive 

B. Tap 

C. Inline tap 

D. Inline

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which method does the enable secret password option use to encrypt device passwords? 

A. AES 

B. CHAP 

C. PAP 

D. MD5

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which statement about Cisco Express Forwarding is true? A. It uses a fast cache that is maintained in a router data plane 

B. It maintains two tables in the data plane the FIB and adjacency table 

C. It makes forwarding decisions by a process that is scheduled through the IOS scheduler 

D. The CPU of a router becomes directly involved with packet-switching decisions

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which two statements about Cisco Express Forwarding load balancing are true? (Choose two)
A. Cisco Express Forwarding can load-balance over a maximum of two destinations
B. It combines the source IP address subnet mask to create a hash for each destination
C. Each hash maps directly to a single entry in the RIB
D. Each hash maps directly to a single entry in the adjacency table
E. It combines the source and destination IP addresses to create a hash for each destination

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

How are the Cisco Express Forwarding table and the FIB related to each other?

A. The FIB is used to populate the Cisco Express Forwarding table

B. The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for processing before they are sent to the FIB 

C. There can be only one FIB but multiple Cisco Express Forwarding tables on IOS devices 

D. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

What is the difference between a RIB and a FIB?

A. The RIB is used to make IP source prefix-based switching decisions 

B. The FIB is where all IP routing information is stored 

C. The RIB maintains a mirror image of the FIB 

D. The FIB is populated based on RIB content

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

Which action is the vSmart controller responsible for in an SD-WAN deployment? 

A. onboard vEdge nodes into the SD-WAN fabric 

B. distribute security information for tunnel establishment between vEdge routers

C. manage, maintain, and gather configuration and status for nodes within the SD-WAN fabric 

D. gather telemetry data from vEdge routers

Your peers in the course ENCORE7 at the TU Berlin create and share summaries, flashcards, study plans and other learning materials with the intelligent StudySmarter learning app.

Get started now!

Flashcard Flashcard

Exemplary flashcards for ENCORE7 at the TU Berlin on StudySmarter:

ENCORE7

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A. MACsec

B. IPsec 

C. SSL 

D. Cisco Trustsec

A. MACsec

ENCORE7

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network? 

A. security group tag ACL assigned to each port on a switch B. security group tag number assigned to each port on a network

C. security group tag number assigned to each user on a switch

D. security group tag ACL assigned to each router on a network

B. security group tag number assigned to each port on a network

ENCORE7

How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers? 

A. uses flexible NetFlow 

B. assigns a VLAN to the endpoint 

C. classifies traffic based on the contextual identity of the endpoint rather than its IP address

D. classifies traffic based on advanced application recognition

C. classifies traffic based on the contextual identity of the endpoint rather than its IP address 

Traffic classification is based on endpoint identity, not IP address

ENCORE7

What is the difference between the enable password and the enable secret password when password encryption is enable on an IOS device? 

A. The enable password is encrypted with a stronger encryption method 

B. There is no difference and both passwords are encrypted identically 

C. The enable password cannot be decrypted 

D. The enable secret password is protected via stronger cryptography mechanisms

D. The enable secret password is protected via stronger cryptography mechanisms

ENCORE7

The login method is configured on the VTY lines of a router with these parameters. – The first method for authentication is TACACS – If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task?

C. R1#sh run | include aaa 

aaa new-model

aaa authentication login default group tacacs+ none 

aaa session-id common 

R1#sh run | section vty 

line vty 0 4 

password 7 0202039485748

ENCORE7

Which NGFW mode block flows crossing the firewall?

A. Passive 

B. Tap 

C. Inline tap 

D. Inline

D. Inline
When Inline Pair Mode is in use, packets can be blocked since they are processed inline

ENCORE7

Which method does the enable secret password option use to encrypt device passwords? 

A. AES 

B. CHAP 

C. PAP 

D. MD5

D. MD5

ENCORE7

Which statement about Cisco Express Forwarding is true? A. It uses a fast cache that is maintained in a router data plane 

B. It maintains two tables in the data plane the FIB and adjacency table 

C. It makes forwarding decisions by a process that is scheduled through the IOS scheduler 

D. The CPU of a router becomes directly involved with packet-switching decisions

B. It maintains two tables in the data plane the FIB and adjacency table

ENCORE7

Which two statements about Cisco Express Forwarding load balancing are true? (Choose two)
A. Cisco Express Forwarding can load-balance over a maximum of two destinations
B. It combines the source IP address subnet mask to create a hash for each destination
C. Each hash maps directly to a single entry in the RIB
D. Each hash maps directly to a single entry in the adjacency table
E. It combines the source and destination IP addresses to create a hash for each destination

D. Each hash maps directly to a single entry in the adjacency table
E. It combines the source and destination IP addresses to create a hash for each destination

ENCORE7

How are the Cisco Express Forwarding table and the FIB related to each other?

A. The FIB is used to populate the Cisco Express Forwarding table

B. The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for processing before they are sent to the FIB 

C. There can be only one FIB but multiple Cisco Express Forwarding tables on IOS devices 

D. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions

D. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions

ENCORE7

What is the difference between a RIB and a FIB?

A. The RIB is used to make IP source prefix-based switching decisions 

B. The FIB is where all IP routing information is stored 

C. The RIB maintains a mirror image of the FIB 

D. The FIB is populated based on RIB content

D. The FIB is populated based on RIB content

ENCORE7

Which action is the vSmart controller responsible for in an SD-WAN deployment? 

A. onboard vEdge nodes into the SD-WAN fabric 

B. distribute security information for tunnel establishment between vEdge routers

C. manage, maintain, and gather configuration and status for nodes within the SD-WAN fabric 

D. gather telemetry data from vEdge routers

B. distribute security information for tunnel establishment between vEdge routers

Sign up for free to see all flashcards and summaries for ENCORE7 at the TU Berlin

Singup Image Singup Image
Wave

Other courses from your degree program

For your degree program ENCORE7 at the TU Berlin there are already many courses on StudySmarter, waiting for you to join them. Get access to flashcards, summaries, and much more.

Back to TU Berlin overview page

Chapter 8 OSPF

Chapter 2 WAN concepts

ENCORE 1

EMCORE 2

ENCORE3

ENCORE4

ENCORE5

What is StudySmarter?

What is StudySmarter?

StudySmarter is an intelligent learning tool for students. With StudySmarter you can easily and efficiently create flashcards, summaries, mind maps, study plans and more. Create your own flashcards e.g. for ENCORE7 at the TU Berlin or access thousands of learning materials created by your fellow students. Whether at your own university or at other universities. Hundreds of thousands of students use StudySmarter to efficiently prepare for their exams. Available on the Web, Android & iOS. It’s completely free.

Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards