00:00

QUESTION 6

Which component of the AAA service security model provides identity verification?

Correct Answer: C
The AAA service security model consists of three components: Authentication, Authorization, and Accounting.
•Authentication: This is the process of verifying the identity of a user or device. It ensures that only legitimate users can access the network or service.
•Authorization: This determines what an authenticated user is allowed to do or access within the network.
•Auditing/Accounting: This component tracks the actions of the user, including what resources they access and what changes they make.
Thus, the correct answer is C. Authentication. References :=
•Cisco AAA Overview
•Understanding AAA (Authentication, Authorization, and Accounting)

QUESTION 7

HOTSPOT
You want to list the IPv4 addresses associated with the host name www.companypro.net. Complete the command by selecting the correct option from each drop-down list.
CCST-Networking dumps exhibit
Solution:
To list the IPv4 addresses associated with the host name www.companypro.net, you should use the following command:
nslookup www.companypro.net
This command will query the DNS servers to find the IP address associated with the hostname provided.If you want to ensure that it returns the IPv4 address, you can specify the-type=Aoption, which stands for Address records that hold IPv4 addresses1. However,
thenslookupcommand by default should return the IPv4 address if available.
To list the IPv4 addresses associated with the host namewww.companypro.net, you should use thenslookupcommand.
✑ Command: nslookup
✑ Target:www.companypro.net So, the completed command is:
✑ nslookupwww.companypro.net
✑ nslookup: This command is used to query the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.
✑ www.companypro.net: This is the domain name you want to query to obtain its
associated IP addresses. References:
✑ Using nslookup: nslookup Command Guide

Does this meet the goal?

Correct Answer: A

QUESTION 8

Which device protects the network by permitting or denying traffic based on IP address, port number, or application?

Correct Answer: A
✑ Firewall: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It permits or denies traffic based on IP addresses, port numbers, or applications.
✑ Access Point: This is a device that allows wireless devices to connect to a wired
network using Wi-Fi. It does not perform traffic filtering based on IP, port, or application.
✑ VPN Gateway: This device allows for secure connections between networks over
the internet, but it is not primarily used for traffic filtering based on IP, port, or application.
✑ Intrusion Detection System (IDS): This device monitors network traffic for
suspicious activity and policy violations, but it does not actively permit or deny traffic.
References:
✑ Understanding Firewalls: Firewall Basics

QUESTION 9

You need to connect a computer's network adapter to a switch using a 1000BASE-T cable. Which connector should you use?

Correct Answer: D
•1000BASE-T Cable: This refers to Gigabit Ethernet over twisted-pair cables (Cat 5e or higher).
•Connector: RJ-45 connectors are used for Ethernet cables, including those used for 1000BASE-T.
•Coax: Used for cable TV and older Ethernet standards like 10BASE2.
•RJ-11: Used for telephone connections.
•OS2 LC: Used for fiber optic connections. References:
•Ethernet Standards and Cables: Ethernet Cable Guide

QUESTION 10

What is the purpose of assigning an IP address to the management VLAN interface on a Layer 2 switch?

Correct Answer: D
The primary purpose of assigning an IP address to the management VLAN interface on a Layer 2 switch is to facilitate remote management of the switch. By configuring an IP address on the management VLAN, network administrators can access the switch??s Command Line Interface (CLI) remotely using protocols such as Telnet or Secure Shell (SSH). This allows for convenient configuration changes, monitoring, and troubleshooting without needing physical access to the switch1.
References :=
•Understanding the Management VLAN
•Cisco - VLAN Configuration Guide
•Remote Management of Switches
Assigning an IP address to the management VLAN interface (often the VLAN 1 interface by default) on a Layer 2 switch allows network administrators to remotely manage the switch using protocols such as Telnet or SSH. This IP address does not affect the switch's ability to route traffic between VLANs but provides a means to access and configure the switch through its Command Line Interface (CLI).
•A: The switch does not act as a default gateway; this is typically a function of a Layer 3 device like a router.
•B: The switch does not resolve URLs; this is typically a function of DNS servers.
•C: The switch can relay DHCP requests but does not typically provide DHCP services itself; this is usually done by a dedicated DHCP server or router.
Thus, the correct answer is D. To enable access to the CLI on the switch through Telnet or SSH.
References :=
•Cisco VLAN Management Overview
•Cisco Catalyst Switch Management