100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CCNA 200-301 Exam/432 Questions and answers

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
18-10-2024
Written in
2024/2025

CCNA 200-301 Exam/432 Questions and answers

Institution
CCNA 200-301
Course
CCNA 200-301











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CCNA 200-301
Course
CCNA 200-301

Document information

Uploaded on
October 18, 2024
Number of pages
34
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CCNA 200-301 Exam/432
Questions and answers
AAA - -Authentication, authorization and accounting

-AAA Server - -Server providing authentication, authorization and
accounting services

-Access Control Entry (ACE) - -One line in an access control list (ACL)

-access interface - -A LAN network design term that refers to a switch
interface connected to end-user devices

-access layer - -In a Campus LAN design, the switches that connect directly
to end-point devices

-access link (WAN) - -A physical link between a service provider and its
customer

-access rate - -The speed at which bits are sent over an access link

-accounting - -In security, the recording of access attempts

-ACI - -Application Centric Infrastructure

-ACL - -Access Control List

-Active Directory - -A popular set of identity and directory services from
Microsoft, used in part to authenticate users

-administrative distance - -In Cisco routers, a means for one router to
choose between multiple routes to reach the same subnet when those routes
are learned by different routing protocols.

-agent - -Generally, an additional software process or component running in
a computing device for some specific purpose

-agent-based architecture - -An architecture that uses a software agent
inside the device being managed

-agentless architecture - -An architecture that does not need a software
agent

, -amplification attack - -A reflection attack that leverages a service on the
reflector to generate and reflect huge volumes of reply traffic to the victim

-Ansible - -A popular configuration management application

-Ansible inventory - -Device host names along with information about each
device

-Ansible playbook - -Files with actions and logic about what Ansible should
do

-anti-replay - -Preventing a man in the middle from copying and later
replaying the packets sent by a legitimate user, for the purpose of appearing
to be a legitimate user

-antivirus - -Software that monitors files transferred by any means, to look
for content that can be used to place a virus into the computer

-APIC - -Application Policy Infrastructure Controller

-APIC-EM - -Application Policy Infrastructure Controller -Enterprise Module

-Application Centric Infrastructure (ACI) - -Cisco's data center SDN solution

-Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) - -
The software that plays the role of controller in an enterprise network of
Cisco devices

-application programming interface (API) - -A software mechanism that
enables software components to communicate with each other

-application signature - -With Network Based Application Recognition
(NBAR), the definition of a combination of matchable fields that identify as
characteristics of a specific application

-Application Visibility and Control (AVC) - -A firewall device with advance
features (IPS, malware detection, VPN termination, etc.)

-application-specific integrated circuit (ASIC) - -An integrated circuit (chip)
designed for a specific purpose of application.

-AR - -Access Rate

-ARP - -Address Resolution Protocol. An internet protocol used to map an IP
address to a MAC address

, -ARP ACL - -A configuration feature on Cisco LAN switches that define MAC
and IP that will be filtered

-ARP Reply - -An ARP message used to supply information about an ARP
request. A device providing its MAC address in reply to a request

-ARP Request - -An ARP message used to request information from another
host located on the same subnet or broadcast domain

-ARP Table - -A list of IP addresses of neighbors on the same VLAN, along
with their MAC addresses

-ASAv - -A Cisco ASA firewall software image that runs as a virtual machine
rather than on hardware

-ASIC - -Application Specific Integrated Circuit

-authentication - -In security, the verification of the identity of a person,
device or process

-Authoritative DNS server - -The DNS server with the record that lists the
address that corresponds to a domain name (A Record) for that domain

-authorization - -In security, the determination of the rights allowed for a
particular user or device

-autonomous system (AS) - -An internetwork that is managed by one
organization

-autonomous system number (ASN) - -A number used by BGP to identify a
routing domain, often a single enterprise or organization.

-AutoQoS - -In Cisco switches and routers, an IOS feature that configures a
variety of QoS features with useful settings as defined by design guides

-bandwidth - -The speed at which bits can be sent and received over a link

-bandwidth profile - -In MetroEthernet, a contractual definition of the
amount of traffic that the customer can send into the service and receive out
of the service

-Brownfield - -A term that refers to the choice to add new configuration to
hardware and software that are already in use, rather than adding new
hardware and software specifically for a new project

, -brute-force attack - -An attack where a malicious user runs software that
tries every possible combination of letters, numbers and special characters
to guess a user's password

-buffer overflow attack - -An attack meant to exploit a vulnerability in
processing inbound traffic such that the target system's buffers overflow, the
target system can end up crashing or inadvertently running malicious code
injected by the attacker

-cable internet - -An internet access technology that uses a cable TV
(CATV), normally used for video, to send and receive data

-cacheable - -For resources that might be repeatedly requested over time,
an attribute that means that the requesting host can keep in storage (cache)
a copy of the resource for a specified amount of time

-carrier Ethernet - -A WAN service that uses Ethernet links as the access
link between the customer and the service provider

-CDP - -Cisco Discrovery Protocol. A media- and protocol-independent
device-discovery protocol that runs on most Cisco-manufactured equipment,
including routers, access servers, and switches. Using CDP, a device can
advertise its existence to other devices and receive information about other
devices on the same LAN or on the remote side of a WAN

-CDP neighbor - -A device on the other end of some communications cable
that is advertising CDP updates

-central office (CO) - -A term used by telcos to refer to a building that holds
switching equipment, into which the telco's cable plant runs so that the telco
has cabling from each home and business into the building

-centralized control plane - -An approach to architecting network protocols
and products that places the control plane functions into a centralized
function rather than distributing the function across the networking device

-Chef - -A popular configuration management application, which uses a
server and a pull model with in-device agents

-Chef client - -Any device whose configuration is being managed by Chef

-Chef Cookbook - -A set of recipes about the same kinds of work, grouped
together for easier management and sharing

-Cisco Access Control Server (ACS) - -A legacy Cisco product that acts as a
AAA Server

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AccurateScores Not yet listed
View profile
Follow You need to be logged in order to follow users or courses
Sold
541
Member since
3 year
Number of followers
336
Documents
15259
Last sold
1 day ago

3.7

112 reviews

5
50
4
18
3
18
2
11
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions