Arista ~ ACE Level One Exam

  • Arista Certified Engineering
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Steve
S
Steve
Community Contributor
Quizzes Created: 1 | Total Attempts: 326
| Attempts: 326 | Questions: 112
Please wait...
Question 1 / 112
0 %
0/100
Score 0/100
1. The MAC address is a combination of vendor assigned information and hardware assigned information. True or False?

Explanation

The MAC address, also known as the Media Access Control address, is a unique identifier assigned to network interfaces for communication on a network. It consists of a combination of vendor assigned information, which identifies the manufacturer of the network interface, and hardware assigned information, which is unique to each network interface. Therefore, the statement that the MAC address is a combination of vendor assigned information and hardware assigned information is true.

Submit
Please wait...
About This Quiz
Arista ~ ACE Level One Exam - Quiz

* Answer all questions
* You have 60 minutes for the entire exam
* You will not be able to revise your answer once you click Next
* Grading is based on all questions, not just the ones you answer
* 70% score is required to pass

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. DevOps brings agile/modern development together with operations of a data center. True or False?

Explanation

DevOps is a practice that combines software development (agile/modern development) and IT operations (operations of a data center) to improve collaboration and efficiency in the software development process. It focuses on automating processes, continuous integration and delivery, and fostering a culture of collaboration and communication between development and operations teams. Therefore, the statement that DevOps brings agile/modern development together with operations of a data center is true.

Submit
3. Which of the following routing algorithms is not correct below?

Explanation

not-available-via-ai

Submit
4. Cloud Networking compared with the older Legacy Networking allows Arista to get product and services to market faster than competitors. True or False?

Explanation

Cloud networking allows for faster product and service deployment compared to legacy networking. This is because cloud networking leverages virtualization and automation technologies, enabling quick provisioning and scalability of resources. Arista, by adopting cloud networking, can take advantage of these benefits to bring their products and services to market faster than their competitors. Therefore, the statement is true.

Submit
5. Network data is what?

Explanation

Network data is represented in binary form, which consists of only zeros and ones. This binary representation is used to transmit and store information in computer networks. Each zero or one represents a bit, and combinations of these bits are used to represent different types of data such as text, images, and videos. Therefore, the correct answer is that network data is made up of all zeros and ones.

Submit
6. If during an ARP, a match does not occur, what does a router do to the packet?

Explanation

If during an ARP (Address Resolution Protocol) process, a match does not occur, a router will discard the packet. This means that the router will not forward the packet to its intended destination and will instead drop it. This could happen if the router is unable to find the appropriate MAC address for the IP address in the ARP table. By discarding the packet, the router ensures that it does not send the packet to an incorrect or unknown destination.

Submit
7. Since switches basically broadcast all traffic to all other switches, what was the next invention that gave the network a boundary to control this excessive traffic?

Explanation

Layer 3 is the correct answer because it introduced the concept of routing, which allowed networks to be divided into smaller, more manageable segments. By using Layer 3, networks could control the flow of traffic and reduce the amount of unnecessary broadcast traffic that switches were generating. This helped to improve network efficiency and performance.

Submit
8. When Layer 3 was brought into the switch world, what process or term became the next generation of network control?

Explanation

When Layer 3 was introduced in the switch world, the next generation of network control became routing. Routing is the process of selecting the best path for network traffic to travel from one network to another. It involves analyzing the destination address of packets and determining the most efficient route for them to reach their destination. Routing plays a crucial role in directing network traffic and ensuring efficient communication between different networks.

Submit
9. The switchport command provides options for which layer interface?

Explanation

The switchport command provides options for configuring Layer 2 interfaces. Layer 2 refers to the data link layer in the OSI model, which is responsible for the reliable transmission of data between adjacent network nodes. The switchport command allows users to configure various settings such as VLAN membership, trunking, and port security on Layer 2 interfaces of a network switch.

Submit
10. A LAG does what in a network?

Explanation

A LAG, or Link Aggregation Group, combines multiple physical ports into a single logical unit. This allows for increased bandwidth and redundancy in the network. By combining the ports, the LAG can distribute traffic across them, improving overall network performance and providing fault tolerance. This is commonly used in scenarios where high bandwidth and reliability are required, such as connecting switches or servers to a network.

Submit
11. In addition to IP addresses, what other address is important in identifying data?

Explanation

The MAC address is important in identifying data, in addition to IP addresses. MAC address stands for Media Access Control address and it is a unique identifier assigned to network interfaces. It is used at the data link layer of a network to uniquely identify devices on a local network. Unlike IP addresses, which can change or be assigned dynamically, MAC addresses are typically assigned permanently to a device's network interface. Therefore, the MAC address is crucial in identifying data as it helps in determining the source and destination of network traffic within a local network.

Submit
12. Data Checksum is required with both TCP and UDP. True or False?

Explanation

Data Checksum is only required with TCP and not with UDP. TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable and ordered delivery of data packets. It uses a checksum to verify the integrity of the data being transmitted. On the other hand, UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery or order of data packets. It does not use a checksum for data integrity. Therefore, the statement "Data Checksum is required with both TCP and UDP" is false.

Submit
13. What is the maximum number of VLANs supported by Arista switches??

Explanation

Arista switches support a maximum of 4096 VLANs. VLANs are used to logically divide a network into smaller segments, allowing for better network management and security. This high number of supported VLANs allows for greater flexibility in network design and scalability, making Arista switches suitable for large and complex networks.

Submit
14. The Routing table really has two different tables.  One is the Routing Information Base (RIB) and the other is what type of Information Base?

Explanation

The Routing table consists of two different tables: the Routing Information Base (RIB) and the Forwarding Information Base (FIB). The RIB contains all the routes learned by the router through various routing protocols, while the FIB is a subset of the RIB and is used for actual packet forwarding. It contains only the routes that are actively used for forwarding packets. Therefore, the correct answer is Forwarding.

Submit
15. If a "match" is not found in a Routing Table, then what happens to packets; they are what?

Explanation

If a "match" is not found in a Routing Table, then the packets are dropped. This means that the packets are not forwarded to any destination and are discarded by the router.

Submit
16. Cabling is not a simple decision due to cost vs latest cabling vs future upgrade costs. True or False?

Explanation

The statement suggests that deciding on cabling is not an easy task because it involves considering factors such as cost, the latest cabling options, and potential future upgrade costs. This implies that the decision-making process for cabling is complex and requires careful consideration. Therefore, the correct answer is true.

Submit
17. What IEEE standard for wireless was put in place in 1997.  What was this standard?

Explanation

In 1997, the IEEE standard for wireless communication was introduced and it was known as 802.11. This standard revolutionized wireless networking by providing specifications for wireless local area networks (WLANs). It defined the protocols and technologies used for wireless communication, including the popular Wi-Fi.

Submit
18. IS-IS and OSPF are what kind of protocols?

Explanation

IS-IS and OSPF are both examples of routing protocols. Routing protocols are used in computer networks to determine the best path for data packets to travel from one network to another. These protocols exchange information about network topology and calculate the most efficient routes for data transmission. IS-IS (Intermediate System to Intermediate System) and OSPF (Open Shortest Path First) are two commonly used routing protocols in large-scale networks. They enable routers to dynamically update and maintain routing tables, ensuring efficient and reliable data transmission within the network.

Submit
19. What request/message is sent from a router to another adjacent router to detect if the router is up?

Explanation

The correct answer is "Hello". When a router wants to check if another adjacent router is up and functioning, it sends a "Hello" message. This message serves as a kind of handshake between the routers, allowing them to establish and maintain a connection. By receiving a "Hello" message, the receiving router can confirm that the other router is operational and ready to communicate.

Submit
20. Which technology allows customers on public WANs to feel more comfortable with transferring sensitive data across the internet?

Explanation

A VPN (Virtual Private Network) allows customers on public WANs (Wide Area Networks) to feel more comfortable with transferring sensitive data across the internet. By creating a secure and encrypted connection between the user's device and the destination server, a VPN ensures that the data transmitted remains private and protected from potential threats or unauthorized access. This technology provides an added layer of security and confidentiality, making it an ideal choice for transferring sensitive information over public networks.

Submit
21. The speed of a response using http requests is based on what factor below?

Explanation

The speed of a response using HTTP requests is based on the speed and traffic between the beginning and end of the journey the data takes. This means that the time it takes for a response to be received depends on the network conditions, including the speed of the internet connection and any congestion or delays along the route the data travels. The speed of the computer or router, as well as the firewall blocking mechanism, may have an impact on the overall performance of the system, but they are not directly responsible for the speed of the response in this context.

Submit
22. This binary number, 11001000, has what value?

Explanation

The binary number 11001000 can be converted to its decimal equivalent by multiplying each digit by its corresponding power of 2 and adding them together. In this case, the calculation would be: 1 * 2^7 + 1 * 2^6 + 0 * 2^5 + 0 * 2^4 + 1 * 2^3 + 0 * 2^2 + 0 * 2^1 + 0 * 2^0 = 128 + 64 + 0 + 0 + 8 + 0 + 0 + 0 = 200. Therefore, the value of the binary number 11001000 is 200.

Submit
23. When creating VLANs, what is the correct syntax for creating more than one at a time?

Explanation

The correct syntax for creating more than one VLAN at a time is "Arista(config-vlan-2)# vlan 3-4". This syntax indicates that VLANs 3 to 4 will be created simultaneously.

Submit
24. The Arista EOS is placed on what operating system?

Explanation

The correct answer is Linux because the Arista EOS (Extensible Operating System) is specifically designed to run on Linux-based operating systems. It is a network operating system that provides advanced network functionality and management capabilities for Arista switches. By running on Linux, Arista EOS benefits from the stability, security, and flexibility of the Linux platform, allowing for efficient and reliable network operations.

Submit
25. Which below is most accurate about Data Packets below?

Explanation

Data is sent in many small packets wrapped by headers. This is the most accurate statement about data packets. When data is transmitted over a network, it is divided into smaller packets. Each packet contains a portion of the data along with additional information in the form of headers. These headers contain important details such as the source and destination addresses, sequence numbers, and error-checking information. The packets are then sent individually across the network and reassembled at the receiving end to reconstruct the original data. This packet-based transmission allows for efficient and reliable data transfer.

Submit
26. DHCP and BOOTP are methods of making requests on a network and pass traffic. Routers do not pass what kind of traffic?

Explanation

Routers do not pass broadcast traffic. Broadcast traffic is a type of network traffic where a packet is sent to all devices on a network. Routers, on the other hand, are designed to forward packets between different networks or subnets. They do not forward broadcast packets because it would result in unnecessary network congestion and potential security risks. Instead, routers use routing tables to determine the best path for forwarding packets to their destination.

Submit
27. The movement from Mainframes to PC's to Servers caused the world to migrate to what concept?

Explanation

The movement from Mainframes to PC's to Servers caused the world to migrate to the concept of Data Centers. As technology advanced, the need for centralized storage and processing of data became crucial. Data Centers emerged as large-scale facilities that house computer systems and associated components, such as servers, networking equipment, and storage systems. They provide a secure and controlled environment for data management and processing, enabling organizations to efficiently store, manage, and distribute their data. The shift to Data Centers allowed for better scalability, reliability, and accessibility of data, leading to significant advancements in various industries.

Submit
28. If (4) 10Gbps interfaces are mapped to a chip that can handle 20Gbps, using LACP, capacity of this example yields what kind of maximum speed output?

Explanation

When (4) 10Gbps interfaces are mapped to a chip that can handle 20Gbps using LACP (Link Aggregation Control Protocol), the maximum speed output will be limited to the capacity of the chip, which is 20Gbps. Therefore, the correct answer is 20 Gbps.

Submit
29. In OSPF, if both ends of the link agree on protocol, parameters and config then they become what?

Explanation

When both ends of the link in OSPF agree on the protocol, parameters, and configuration, they become "Adjacent Neighbors." This means that they have established a direct connection and are able to exchange routing information with each other. Adjacent Neighbors play a crucial role in OSPF as they form the foundation for building the network topology and ensuring efficient routing.

Submit
30. In a network, servers, routers and switches are doing what below all the time?

Explanation

Servers, routers, and switches in a network are constantly listening. Listening refers to the act of passively receiving and processing incoming data packets or signals. These network devices are designed to constantly monitor the network for any incoming data or signals that they need to process or forward. By listening, these devices can effectively perform their roles in the network by receiving and processing data, allowing for efficient communication and data transfer between devices connected to the network.

Submit
31. The Arista software known as EOS stands for what?

Explanation

The correct answer is "Extensible Operating System." Arista's software, known as EOS, is an operating system that can be easily extended and customized to meet the specific needs of different networks and environments. It provides flexibility and scalability, allowing users to add new features and functionality as required.

Submit
32. The Service, POP3, commonly used in email service providers has a port number of what?

Explanation

POP3 (Post Office Protocol version 3) is a standard protocol used for receiving emails from a remote server. It operates on port number 110. This port allows email clients to connect to the email server and retrieve incoming messages. Therefore, the correct answer is 110.

Submit
33. In order for STP to function, switches must communicate and exchange and compare values to populate an algorithm. Which communication method below is used for this purpose?

Explanation

Bridge Protocol Data Unit (BPDU) is the communication method used for switches to exchange and compare values in order for STP (Spanning Tree Protocol) to function. BPDU is a frame format used by switches to share information about their status and the network topology. It contains information such as the switch's ID, the port ID, and the cost of the path. By exchanging and comparing these values, switches can determine the root bridge and the best path to reach it, thus preventing loops in the network.

Submit
34. What is the term used to enable switches to distribute traffic evenly across its ports in a network?

Explanation

Load balancing is the term used to enable switches to distribute traffic evenly across its ports in a network. This technique ensures that network resources are utilized efficiently and prevents any single port from becoming overwhelmed with traffic. Load balancing algorithms analyze factors such as network congestion, bandwidth availability, and response times to determine the optimal distribution of traffic across the ports. By evenly distributing the traffic, load balancing improves network performance, minimizes bottlenecks, and enhances overall network reliability.

Submit
35. When troubleshooting a network, it is good practice to do what in order to see fresh and current snapshots in time?

Explanation

Clearing the counters is a good practice when troubleshooting a network in order to see fresh and current snapshots in time. Counters keep track of various network statistics, such as the number of packets transmitted or received, errors, collisions, etc. By clearing the counters, any previous data is reset, allowing for a clear view of the current network activity. This can help identify any issues or abnormalities that may be affecting the network performance.

Submit
36. In Arista's EOS CLI mode, all commands are case sensitive. True or False?

Explanation

In Arista's EOS CLI mode, all commands are not case sensitive. This means that whether you enter a command in uppercase or lowercase, it will still be recognized and executed correctly.

Submit
37. Which traffic has the greater drain on CPUs, Broadcast or Unicast?

Explanation

Broadcast traffic has a greater drain on CPUs compared to unicast traffic. This is because broadcast traffic is sent to all devices on a network, causing each device to process and handle the received data. As a result, the CPU of each device needs to allocate resources to process the broadcast traffic, leading to a higher CPU usage. On the other hand, unicast traffic is specifically targeted to a single device, reducing the overall CPU load compared to broadcast traffic.

Submit
38. Deleting a Port Channel Interface with the "no interface port-channel" command deletes the configuration.  But removing all Ethernet interfaces does NOT remove the associated port channel interface from running-config. True of False?

Explanation

When using the "no interface port-channel" command to delete a Port Channel Interface, it will also delete the configuration associated with it. However, removing all Ethernet interfaces does not remove the corresponding port channel interface from the running-config. Therefore, the statement is true.

Submit
39. How long does a router wait to hear back from a request/message that is sent to another router before deciding this router is "dead"?

Explanation

The length of time a router waits to hear back from a request/message before considering itself "dead" depends on the specific setting of the router. Different routers may have different configurations and timeout values for determining when a router is considered unresponsive. Therefore, the waiting time can vary and is not fixed.

Submit
40. The OSI Model has 7 layers. Which is layer 4?

Explanation

The correct answer is Transport. The OSI Model consists of 7 layers, and layer 4 is known as the Transport layer. This layer is responsible for end-to-end communication between hosts and ensures reliable and error-free delivery of data. It establishes connections, manages flow control, and provides error recovery mechanisms.

Submit
41. Some would argue it is already here, but what is the "next stage" of networking?

Explanation

The Internet of Everything refers to the concept of connecting not only devices, but also people, data, and processes, creating a network where everything is interconnected. This next stage of networking goes beyond just mobile devices and smart devices, as it encompasses a broader range of connections and interactions. With the Internet of Everything, there will be a seamless integration of various technologies and systems, enabling greater automation, efficiency, and collaboration.

Submit
42. In order to communicate across subnets, what must be done with packets?

Explanation

Packets need to be routed in order to communicate across subnets. Routing involves the process of forwarding packets from one network to another based on their destination IP address. This is done by using routers, which examine the IP header of each packet and determine the best path for it to reach its destination. Routing allows for efficient and reliable communication between different subnets within a larger network.

Submit
43. In switches and routers, what is used to manage where traffic is sent?

Explanation

In switches and routers, tables are used to manage where traffic is sent. These tables contain information about the network and its connected devices, such as MAC addresses and IP addresses. By referencing these tables, switches and routers can determine the appropriate destination for incoming traffic and forward it accordingly. This allows for efficient and effective routing of network traffic.

Submit
44. In this script example, Arista-RTR2(config)#ip route 3.3.3.0/24 E4, the 3.3.3.0 represents what?

Explanation

In the given script example, "3.3.3.0" represents the destination IP. This is because the "ip route" command is used to configure a static route in a network device, and the destination IP is specified in the command to indicate the network or host to which the route should be directed.

Submit
45. The Command Mode of Arista's EOS CLI has different levels of control. This level structure is known as what?

Explanation

The Command Mode of Arista's EOS CLI has different levels of control, which are organized in a hierarchical structure. This structure allows users to navigate through different levels of commands and configurations, providing a clear and organized way to manage the network environment. The levels of control in the Command Mode are designed to offer different levels of access and functionality, ensuring that users can perform the necessary tasks while maintaining control and security.

Submit
46. In Command Mode, what is the shortest version of switch#show that is possible?

Explanation

The shortest version of the "switch#show" command in Command Mode is "sh".

Submit
47. Subnetting evolved when mainframes began to be replaced by pc's.  In a subnet, what devices do NOT pass broadcast traffic in a network?

Explanation

Routers do not pass broadcast traffic in a network. Routers are used to connect different networks together and they operate at the network layer of the OSI model. When a broadcast message is sent within a network, routers do not forward it to other networks. Instead, they use routing tables to determine the best path for the message to reach its destination. This helps in reducing network congestion and improving network performance.

Submit
48. Ethernet traffic doesn't travel at the same speeds due to many interferences and heavy traffic periods. Ethernet handles this inconsistent speed with something known as what?

Explanation

Ethernet traffic doesn't travel at the same speeds due to various interferences and heavy traffic periods. To handle this inconsistent speed, Ethernet uses a technique called buffering. Buffering allows the data to be temporarily stored in a buffer before being transmitted, ensuring a smooth and continuous flow of data. This helps to prevent data loss or delays caused by variations in network conditions.

Submit
49. The old days used load balancing to send individual packets to their destinations. Today, with ECMP we use what kind of load balancing?

Explanation

Flow based load balancing is used with ECMP (Equal Cost Multipath) in modern networking. Unlike the old days where individual packets were load balanced, flow based load balancing distributes traffic based on flows, which are a sequence of packets with the same source and destination IP addresses, protocol, and port numbers. This approach ensures that packets belonging to the same flow are sent to the same destination, improving performance and reducing the chances of out-of-order packet delivery.

Submit
50. Regarding IP, the following traffic types exist except one below.  Which one is incorrect?

Explanation

Anycast is not a type of traffic in the context of IP. Unicast refers to the transmission of data from one sender to one receiver, Multicast refers to the transmission of data from one sender to multiple receivers, and Broadcast refers to the transmission of data from one sender to all receivers in a network. However, Anycast refers to the routing of data to the nearest or best destination out of a group of potential destinations.

Submit
51. In the late 80's, what product eliminated network collisions altogether?

Explanation

In the late 80's, the product that eliminated network collisions altogether was a switch. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently directs data only to the intended recipient. This prevents collisions and allows for simultaneous communication between multiple devices on a network. A router, on the other hand, is responsible for connecting multiple networks and directing traffic between them. Bridging refers to the process of connecting two separate networks to create a larger network.

Submit
52. Within an Autonomous System (AS) routers are configured to "speak" the same language/protocol. What is the protocol used within an AS?

Explanation

Within an Autonomous System (AS), routers are configured to "speak" the same language/protocol. The protocol used within an AS is known as an Interior Gateway Protocol (IGP). IGPs are used to exchange routing information between routers within the same AS. This allows for efficient and effective communication and routing within the network.

Submit
53. A fundamental part of routing is connecting routers together to exchange (share) the networks they 'know' about. What is this term called?

Explanation

The term used to describe the fundamental part of routing where routers are connected together to exchange the networks they "know" about is called "Neighbors".

Submit
54. It is not possible to run multiple routing protocols on a single router. True or False?

Explanation

It is possible to run multiple routing protocols on a single router. This allows the router to exchange routing information with different networks that are using different routing protocols. By running multiple routing protocols, the router can effectively route traffic between these networks and ensure connectivity.

Submit
55. The financial/cost calculations on a network utilizing LACP, which gave faster failover and increased capacity but wasn't being used to the fullest extent, drove the industry to what next protocol?

Explanation

The financial/cost calculations on a network utilizing LACP, which gave faster failover and increased capacity but wasn't being used to the fullest extent, drove the industry to adopt MLAG as the next protocol. MLAG (Multi-Chassis Link Aggregation) allows for the creation of a logical link aggregation group between two switches, providing redundancy and load balancing capabilities. By implementing MLAG, organizations can fully utilize the benefits of link aggregation while ensuring high availability and improved network performance.

Submit
56. In the mid 80's, what was the networking device that brought devices together to access group resources, like servers and printers?

Explanation

In the mid 80's, the networking device that brought devices together to access group resources, like servers and printers, was a hub. A hub is a simple networking device that connects multiple devices in a network, allowing them to communicate with each other. It operates at the physical layer of the network and broadcasts all incoming data to all connected devices. However, hubs have limitations in terms of bandwidth and security, which led to the development of more advanced networking devices like switches.

Submit
57. Two problems were solved with LACP.  One of them is faster failover. What is the other?

Explanation

The other problem that was solved with LACP is increased capacity. LACP (Link Aggregation Control Protocol) allows for the bundling of multiple physical network links into a single logical link, increasing the overall bandwidth and capacity of the network connection. By combining multiple links, LACP provides a higher capacity for data transmission, enabling faster and more efficient network communication.

Submit
58. With MLAG configured, STP sees multiple switches as what?

Explanation

With MLAG (Multi-Chassis Link Aggregation) configured, STP (Spanning Tree Protocol) sees multiple switches as one. MLAG allows multiple switches to act as a single logical switch, providing redundancy and load balancing. By presenting themselves as a single switch to STP, MLAG eliminates the need for STP to block redundant links, resulting in improved network efficiency and faster convergence.

Submit
59. A port channel is a communication link between two switches supported by matching channel group interfaces on each switch. A port channel is also referred to as a what.

Explanation

A port channel is a communication link between two switches that is supported by matching channel group interfaces on each switch. It is also referred to as a LAG, which stands for Link Aggregation Group. LAG allows multiple physical links to be bundled together to increase bandwidth and provide redundancy. This helps in improving network performance and ensuring high availability.

Submit
60. The Arista software known as EOS is also named?

Explanation

The Arista software known as EOS is also named Cloud Vision because it provides a comprehensive and integrated approach to cloud networking. This software enables organizations to build and manage cloud networks efficiently and securely. It offers advanced features and capabilities for network automation, virtualization, and scalability, making it an ideal solution for cloud computing environments. By integrating cloud vision into their software, Arista ensures that their customers have a clear and holistic view of their cloud networks, allowing them to optimize performance and streamline operations.

Submit
61. DARPA was involved in the development of the Ethernet. True or False?

Explanation

The statement is true. DARPA (Defense Advanced Research Projects Agency) was indeed involved in the development of Ethernet. In the 1970s, DARPA funded the research and development of the ARPANET, which was a precursor to the modern internet. Ethernet, a widely used networking technology, was developed as part of the ARPANET project. Therefore, DARPA can be credited as being instrumental in the early stages of Ethernet's development.

Submit
62. In OSI, Layer 2 is known as what?

Explanation

Layer 2 in the OSI model is known as Switching. This layer is responsible for the efficient and reliable transfer of data between devices on a local area network (LAN). Switches operate at the data link layer and use MAC addresses to forward data packets to the correct destination. They make forwarding decisions based on the MAC address in the frame's header, allowing for efficient communication within a LAN. Switching helps to improve network performance by reducing collisions and optimizing the flow of data.

Submit
63. Fiber Optics provides improvement over Cabling with speed, longer signal strength and what other major benefit?

Explanation

Fiber optics provides improvement over cabling by eliminating crosstalk. Crosstalk is the interference caused by signals from adjacent cables interfering with each other. By using fiber optics, which transmit data using light signals instead of electrical signals, this interference is eliminated. This results in a clearer and more reliable signal transmission.

Submit
64. In networking, what is a fundamental concept?

Explanation

The concept of avoiding a single point of failure is fundamental in networking. This means that the network is designed in such a way that if one component or link fails, it does not cause a complete network outage. By having redundant components and multiple paths, the network can continue functioning even if one part fails. This ensures reliability and minimizes the risk of downtime.

Submit
65. Commands: Arista(config)#interface ethernet 8 Arista(config-if-Et8)#switchport mode trunk Arista(config-if-Et8)# What is the result of figure above?

Explanation

The command switchport mode trunk configures the interface to operate as a trunk port, which can carry traffic from multiple VLANs, enabling communication between VLANs across switches.

Submit
66. What does the industry call the ability to separate functions like data, VoIP, Wi-Fi, storage, etc. in the network?

Explanation

Segmentation refers to the industry term for the ability to separate functions like data, VoIP, Wi-Fi, storage, etc. in the network. This means that different types of traffic can be isolated and managed independently, allowing for more efficient and secure network operations. Segmentation helps in optimizing network performance and improving overall network security by preventing unauthorized access and minimizing the impact of any potential breaches.

Submit
67. In the past 15-20 years, what product changed the networking landscape for companies which provided roaming computing power?

Explanation

Laptops changed the networking landscape for companies by providing roaming computing power. With the advent of laptops, employees were no longer tied to their desks and could work from anywhere, enabling greater flexibility and productivity. Laptops allowed for easy access to company networks and resources while on the go, revolutionizing the way businesses operated and communicated.

Submit
68. With STP and VLANs, adding "priority" commands at the VLAN level allows what to occur?

Explanation

Adding "priority" commands at the VLAN level allows switches to become the root switch in a spanning tree protocol (STP) network. The root switch is the central switch that all other switches in the network are connected to. By configuring the priority of a switch to a lower value, it becomes more likely to be elected as the root switch. This can be useful in controlling the network topology and ensuring that a specific switch becomes the root switch, which can help in optimizing network performance and reducing the chances of network loops.

Submit
69. In MLAG configurations, each switch must have ______________ domain IDs. Fill in the blank.

Explanation

In MLAG configurations, each switch must have identical domain IDs. This is because the domain ID is used to uniquely identify each switch in the MLAG domain. Having identical domain IDs ensures that the switches can properly communicate and synchronize with each other, allowing for seamless failover and load balancing between the switches. If the switches had different domain IDs, they would not be recognized as part of the same MLAG domain and would not be able to function together effectively.

Submit
70. PortFast allows what to occur in the network?

Explanation

PortFast is a feature in Cisco switches that allows a port to bypass the Spanning Tree Protocol (STP) listening and learning states and transition directly from blocking to forwarding state. This means that when PortFast is enabled on a port, it overrides STP and allows the port to immediately start forwarding traffic. In the given answer, it is stated that PortFast overrides STP and the Edge Port changes from blocking to forwarding, which accurately describes the functionality of PortFast.

Submit
71. An IP address can be assigned to a VLAN, creating a switched virtual interface (SVI) that can be reached regardless of what status of the physical interface?

Explanation

An IP address can be assigned to a VLAN, creating a switched virtual interface (SVI) that can be reached regardless of the status of the physical interface. The physical interface can be in an up or down state, meaning it can be operational or not operational, but the SVI will still be reachable through the assigned IP address. This allows for connectivity and communication to the VLAN even if the physical interface is not currently active or functioning properly.

Submit
72. In ZTP mode, if no startup-config is found, what does the switch look for next?

Explanation

In ZTP (Zero Touch Provisioning) mode, if no startup-config is found, the switch looks for DHCP next. This means that the switch will attempt to obtain its configuration information from a DHCP server. DHCP is a network protocol that automatically assigns IP addresses and other network configuration parameters to devices on a network. By looking for DHCP, the switch can receive its configuration information without the need for manual intervention, allowing for easier and more automated provisioning of network devices.

Submit
73. Cloud computing provides the following benefits except which one?

Explanation

Cloud computing provides several benefits, including metered service, API driven functionality, and multi-tenancy. However, it does not provide engineer servicing. This means that cloud computing does not require the direct involvement or assistance of engineers for maintenance or troubleshooting purposes. Instead, the responsibility for servicing and maintaining the cloud infrastructure lies with the cloud service provider.

Submit
74. What tool below is not part of a typical NetOps tool suite?

Explanation

VPNs are not typically included in a NetOps tool suite. NetOps tool suites consist of various tools and technologies used for network operations, management, and monitoring. These tools include network controllers, which are used to manage and control network devices, APIs (Application Programming Interfaces) for integration and automation, and programming languages like Python for scripting and automation purposes. However, VPNs are not typically considered as part of a NetOps tool suite, as they are a separate technology used for secure remote access to a network.

Submit
75. Which of the following MLAG statuses is inaccurate?

Explanation

All the statuses listed are accurate and can be associated with Multi-chassis Link Aggregation Group (MLAG) configuration. Here’s what each status generally means:

Failed: This status indicates that the MLAG configuration or connection has encountered an error.

Connected: This status shows that the MLAG peers are successfully connected.

Domain Mismatch: This status is displayed when there is a mismatch in the domain configuration between the MLAG peers.

Invalid Peer: This status is shown when the MLAG peer is not valid or not correctly configured.

So, none of the statuses listed are inaccurate. 

Submit
76. What protocol was developed to solve the router "black hole" syndrome where data packets still went to a router that was "dead" or "off-line"?

Explanation

VRRP (Virtual Router Redundancy Protocol) was developed to solve the router "black hole" syndrome where data packets still went to a router that was "dead" or "off-line". VRRP allows for multiple routers to work together in a group, with one acting as the master and the others as backups. If the master router fails, one of the backups takes over as the new master, ensuring that data packets are still routed correctly even if one of the routers is offline.

Submit
77. The Back Bone Router (BB) connects routers in what area?

Explanation

The Back Bone Router (BB) connects routers within the same Area 0. Area 0 is the backbone area in a network running OSPF (Open Shortest Path First) protocol. The backbone area is responsible for connecting all other areas in the network. The Back Bone Router acts as a gateway for routers within Area 0, allowing them to communicate with routers in other areas.

Submit
78. The Open Systems Interconnect (OSI) was created in what years?

Explanation

The correct answer is the 80's. The OSI (Open Systems Interconnect) model was created in the 1980s. This model is a conceptual framework that standardizes the functions of a communication system into seven different layers. It was developed by the International Organization for Standardization (ISO) to facilitate interoperability between different computer systems and networks.

Submit
79. Which of the two routing protocols, IS-IS or OSPF, utilizes the 128-bit address space?

Explanation

IS-IS (Intermediate System to Intermediate System) is the routing protocol that uses the 128-bit address space. In contrast, OSPF (Open Shortest Path First) uses a 32-bit address space. The 128-bit address space in IS-IS allows for a larger number of addressable entities and supports the scalability requirements of modern networks.

Submit
80. Which of the following companies no longer have networking software that runs over ethernet?

Explanation

Novell no longer has networking software that runs over ethernet. This means that Novell has either discontinued or phased out their networking software that was compatible with ethernet connections.

Submit
81. ZTP requires the following except which one?

Explanation

Zero Touch Provisioning (ZTP) uses Option 66 (TFTP server IP) and Option 67 (file name) from DHCP to automatically configure devices. An FTP server is not typically required for ZTP, as TFTP is the standard protocol used for file transfer in this process.

Submit
82. ZTP Server was created by Arista employees. True or False?

Explanation

The given statement is true. The ZTP (Zero Touch Provisioning) Server was indeed created by Arista employees.

Submit
83. The benefit of LACP is that it is invisible to STP. The hashing utilized within LACP and implemented at the chip level enables the flows to shift to a new 'bucket' or port. How fast does this mapping take place?

Explanation

The mapping in LACP takes place instantly. This means that when a flow needs to shift to a new 'bucket' or port, it happens immediately without any noticeable delay. Unlike STP, which takes some time to converge and reconfigure the network, LACP provides a faster and seamless transition for the flows.

Submit
84. Because WAN connectivity is leased and is a public, shared infrastructure, corporations biggest concern is what?

Explanation

Corporations' biggest concern with leased WAN connectivity is protection. Since WAN connectivity is a public and shared infrastructure, corporations need to ensure the security and confidentiality of their data and communications. They must protect their network from unauthorized access, data breaches, and other cyber threats. This includes implementing robust security measures such as firewalls, encryption, and intrusion detection systems to safeguard their sensitive information and maintain the integrity of their network.

Submit
85. Address Resolution Protocol (ARP) handles interaction between L2 and L3. It is technically a L2 Protocol and does not use what?

Explanation

ARP is a Layer 2 protocol used to map IP addresses (Layer 3) to MAC addresses (Layer 2). It relies on Ethernet and MAC addresses but does not use gateways directly in its process. Gateways operate at Layer 3 to route traffic between networks.

Submit
86. Arista switches support four types of interfaces. Which one below is not a supported type?

Explanation

Arista switches support four types of interfaces: Port-channel, Management, and Ethernet. However, Loopback is not a supported type of interface.

Submit
87. In Loopback Interface Configuration, Loopback numbers range is from 0 to what?

Explanation

In Loopback Interface Configuration, the loopback numbers range from 0 to 1000. This means that the loopback interface can be assigned a number between 0 and 1000.

Submit
88. ECMP is dependent on what being used?

Explanation

ECMP (Equal Cost Multipath) is a routing technique that allows for load balancing across multiple paths with equal costs. In this context, "the chips" refer to the hardware chips used in networking devices such as routers and switches. ECMP relies on the capabilities and functionality of these chips to distribute traffic across multiple paths effectively. Therefore, the correct answer is "The chips."

Submit
89. Arista EOS Architecture have many benefits. Which below is not a benefit of the Arista EOS?

Explanation

The Arista EOS architecture offers several benefits, including fault isolation, 3rd party integration, and fault repair. However, the installation of RPMs with little downtime is not listed as a benefit of Arista EOS.

Submit
90. What term is used to describe the operational status of a router in a network?

Explanation

The term “Notification” is used to describe the operational status of a router in a network. This term refers to the messages that a router sends to indicate its status, such as whether it’s up (operational) or down (not operational). These notifications can help network administrators monitor the health and performance of the network. 

Submit
91. Regarding IP addresses, which of the following correctly identifies the format?

Explanation

Binary is the correct format for identifying IP addresses. IP addresses are made up of a series of numbers, and in binary format, these numbers are represented using only two digits, 0 and 1. Each section of the IP address is divided into 8 bits, resulting in a total of 32 bits for the entire address. This binary representation allows for efficient data transmission and routing on computer networks.

Submit
92. What is the initial state of a switch?

Explanation

The initial state of a switch is "Root". This is because when a switch is first powered on or reset, it starts in a default state known as the root state. In this state, the switch does not have any configuration or VLAN settings applied. It is essentially a blank slate waiting to be configured by an administrator.

Submit
93. It is not possible to send data or requests to a host that no longer exists on the network. True or False?

Explanation

It is possible to send data or requests to a host that no longer exists on the network. This can happen if the host was temporarily disconnected or turned off, but it may still exist on the network. Additionally, it is also possible to send data or requests to a host that has been permanently removed from the network, but the sender may not receive a response.

Submit
94. To maintain the STP Topology and react when failures occur, the ROOT device continues to send BPDUs every how many seconds?

Explanation

The ROOT device in STP (Spanning Tree Protocol) continues to send BPDUs (Bridge Protocol Data Units) every 2 seconds to maintain the STP topology and react to failures. BPDUs are used by STP to exchange information between network switches and determine the root bridge, as well as to prevent loops in the network. By sending BPDUs regularly, the ROOT device ensures that the network remains stable and can quickly respond to any failures or changes in the network topology.

Submit
95. In STP mode, total transition time typically is how many seconds?

Explanation

In STP (Spanning Tree Protocol) mode, the total transition time typically takes 50 seconds. This means that it takes 50 seconds for the network to go through the process of selecting the root bridge, determining the best path, and establishing connectivity. During this time, the network undergoes a series of calculations and adjustments to prevent loops and ensure a stable network topology.

Submit
96. When many operating systems are required to manage a network, we call this what type of Operating System?

Explanation

When many operating systems are required to manage a network, we call this a "Silo'd" operating system. In a silo'd operating system, each operating system functions independently and is responsible for managing a specific part of the network. This can result in a lack of interoperability and coordination between different operating systems, making it difficult to manage the network as a whole.

Submit
97. What is the term to identify config inconsistencies in MLAG configurations?

Explanation

A sanity check is a term used to identify configuration inconsistencies in MLAG configurations. It refers to a process of verifying that the configuration settings are logical and consistent, ensuring that there are no obvious errors or conflicts. By performing a sanity check, any potential issues or misconfigurations can be detected early on, allowing for prompt resolution and preventing further complications.

Submit
98. What concept is critical to the job of a network engineer at all stages of growth?

Explanation

Network engineers need to understand MAC addresses (hardware identifiers), the binary system (fundamental to IP addressing and subnetting), IP subnetting (for dividing networks), and dotted decimal notation (human-readable IP address format) at all stages of network design and management.

Submit
99. The predominant networking vendors all adopted variations of these two standards, but none of them implemented the full standard as published. They mixed elements of IS-IS with their own proprietary solutions. The results were very similar; they basically encapsulated the L2 Ethernet traffic within a L3 header and transported it across the 3-Tier L3 designs. This was not a bad solution; it was simply focused on solving the problem without interrupting their customers' current designs. This in turn locked the customers into their solution even more, ensuring what?

Explanation

The networking vendors implemented variations of the standards and mixed them with their own solutions to solve the problem without interrupting their customers' current designs. This approach locked the customers into their solution, ensuring that their revenues would be protected. By not fully implementing the standard and providing a solution that seamlessly integrated with their customers' existing infrastructure, the vendors were able to retain their customer base and continue generating revenue.

Submit
100. Arista recommends what for most leaf-spine data center designs?

Explanation

Arista recommends BGP for most leaf-spine data center designs. BGP, or Border Gateway Protocol, is a routing protocol that is commonly used in large-scale networks, such as data centers. It provides scalability and flexibility in routing decisions, making it suitable for the complex and dynamic nature of leaf-spine architectures. BGP allows for efficient traffic distribution and load balancing across the network, ensuring optimal performance and reliability. Additionally, BGP supports advanced features like route filtering and policy-based routing, which are essential in data center environments.

Submit
101. How is the term used to describe traditional networking, known as "Legacy," referred to in contemporary contexts and current technology?

Explanation

The networking of the past, which is referred to as "Legacy," is now commonly known as "Virtual" in today's context. This term signifies the shift towards virtualized networking technologies and the use of virtual machines, software-defined networks, and network virtualization to create flexible and scalable network infrastructures.

Submit
102. A Virtual Private Network (VPN) provides what?

Explanation

A Virtual Private Network (VPN) provides encapsulation of the original packet into the data portion of another packet. This means that the original packet is wrapped inside another packet, which helps to secure the data being transmitted over the network. This encapsulation process adds an extra layer of protection by encrypting the original packet, making it difficult for unauthorized individuals to intercept and access the data. By encapsulating the packet, VPNs ensure the privacy and confidentiality of the information being transmitted, making it an essential tool for secure communication over public networks.

Submit
103. A sniffer trace on an HTTP request has how many transactions before completing the request?

Explanation

The correct answer is usually between 10 and 100. When an HTTP request is made, it often passes through multiple computers or servers before reaching its destination. Each of these intermediate points can be considered as a transaction in the sniffer trace. Therefore, it is common for there to be between 10 and 100 transactions recorded in the sniffer trace before the request is completed.

Submit
104. In an IP header, which of the following is not part of this header?

Explanation

The IMP (Internet Message Protocol) is not part of an IP (Internet Protocol) header. The IP header contains various fields such as the checksum, destination address, and IHL (Internet Header Length), which specifies the length of the IP header in 32-bit words. However, the IMP is not a standard field in the IP header and is not used in the routing or delivery of IP packets.

Submit
105. PoE came along that changed the cabling needs going forward allowing devices to connect to the ethernet or phone. What is it that was brought over the ethernet that changed all of this?

Explanation

PoE (Power over Ethernet) allows electrical power to be transmitted along with data over standard Ethernet cables. This innovation eliminated the need for separate power cables for devices like IP phones, cameras, and wireless access points, simplifying installation and reducing costs.

Submit
106. What protocol was developed by Arista to solve the router "black hole" syndrome where data packets still went to a router that was "dead" or "off-line"?

Explanation

VARP stands for Virtual ARP (Address Resolution Protocol) and it was developed by Arista to solve the router "black hole" syndrome. This syndrome occurs when data packets are still sent to a router that is "dead" or "off-line". VARP allows for the creation of a virtual MAC address that can be associated with a group of routers. When a router in the group becomes unavailable, VARP automatically reassigns the virtual MAC address to another router in the group, ensuring that the packets are properly routed even if one router is offline.

Submit
107. The Arista's Quality comes from three places: Architecture and Testing are two.  What is the third?

Explanation

Culture is the third source of Arista's quality. While architecture and testing play a significant role in ensuring quality, culture also plays a crucial part. A positive and collaborative culture within the organization promotes teamwork, innovation, and a commitment to delivering high-quality products. It influences the mindset and behaviors of employees, encouraging them to prioritize quality in their work. By fostering a culture that values quality, Arista can consistently deliver products that meet or exceed customer expectations.

Submit
108. All of the below are features of the Leaf-Spine Architecture except which one?

Explanation

The given statement mentions that "Applications perform with high-bandwidth and high-latency" is not a feature of the Leaf-Spine Architecture. This means that in the Leaf-Spine Architecture, applications do not typically operate with both high-bandwidth and high-latency.

Submit
109. Scripts are run from what?

Explanation

Scripts are run from the switch. The switch is a networking device that connects multiple devices within a network. It is responsible for forwarding data packets between devices and ensuring efficient communication. Scripts can be executed on the switch to automate certain tasks or configure network settings.

Submit
110. The port priority of LACP determines the port that is active in a LAG in what mode?

Explanation

The port priority of LACP determines the port that is active in a LAG in fallback mode. In this mode, if the active port fails or goes offline, the LACP protocol will automatically switch to a backup port with a lower priority. This ensures that there is always an active port in the LAG, providing redundancy and preventing network downtime.

Submit
111. What is one of the key benefits of VRF?

Explanation

VRF (Virtual Routing and Forwarding) allows multiple instances of routing tables to coexist on the same router, effectively segmenting network traffic. This separation enhances data security by isolating traffic between different virtual networks. While VRF can improve network management, it does not inherently release packets faster or auto-configure on routers without setup.

Submit
112. During synchronization, interfaces transmit one LACP PDU per second. After synchronization is complete, interfaces exchange one PDU how often?

Explanation

After the synchronization process is complete, interfaces exchange one LACP PDU (Link Aggregation Control Protocol Protocol Data Unit) every 30 seconds. This periodic exchange helps to maintain the link aggregation and ensure the proper functioning of the bonded interfaces. By exchanging PDUs at regular intervals, the interfaces can stay updated about the status and availability of each other, allowing for efficient load balancing and fault tolerance in link aggregation.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 24, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 24, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 13, 2020
    Quiz Created by
    Steve
Cancel
  • All
    All (112)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The MAC address is a combination of vendor assigned information and...
DevOps brings agile/modern development together with operations of a...
Which of the following routing algorithms is not correct below?
Cloud Networking compared with the older Legacy Networking allows...
Network data is what?
If during an ARP, a match does not occur, what does a router do to the...
Since switches basically broadcast all traffic to all other switches,...
When Layer 3 was brought into the switch world, what process or term...
The switchport command provides options for which layer interface?
A LAG does what in a network?
In addition to IP addresses, what other address is important in...
Data Checksum is required with both TCP and UDP. True or False?
What is the maximum number of VLANs supported by Arista switches??
The Routing table really has two different tables.  One is the...
If a "match" is not found in a Routing Table, then what happens to...
Cabling is not a simple decision due to cost vs latest cabling vs...
What IEEE standard for wireless was put in place in 1997.  What...
IS-IS and OSPF are what kind of protocols?
What request/message is sent from a router to another adjacent router...
Which technology allows customers on public WANs to feel more...
The speed of a response using http requests is based on what factor...
This binary number, 11001000, has what value?
When creating VLANs, what is the correct syntax for creating more than...
The Arista EOS is placed on what operating system?
Which below is most accurate about Data Packets below?
DHCP and BOOTP are methods of making requests on a network and pass...
The movement from Mainframes to PC's to Servers caused the world to...
If (4) 10Gbps interfaces are mapped to a chip that can handle 20Gbps,...
In OSPF, if both ends of the link agree on protocol, parameters and...
In a network, servers, routers and switches are doing what below all...
The Arista software known as EOS stands for what?
The Service, POP3, commonly used in email service providers has a port...
In order for STP to function, switches must communicate and exchange...
What is the term used to enable switches to distribute traffic evenly...
When troubleshooting a network, it is good practice to do what in...
In Arista's EOS CLI mode, all commands are case sensitive. ...
Which traffic has the greater drain on CPUs, Broadcast or Unicast?
Deleting a Port Channel Interface with the "no interface port-channel"...
How long does a router wait to hear back from a request/message that...
The OSI Model has 7 layers. Which is layer 4?
Some would argue it is already here, but what is the "next stage" of...
In order to communicate across subnets, what must be done with...
In switches and routers, what is used to manage where traffic is sent?
In this script example, Arista-RTR2(config)#ip route 3.3.3.0/24 E4,...
The Command Mode of Arista's EOS CLI has different levels of control....
In Command Mode, what is the shortest version of switch#show that is...
Subnetting evolved when mainframes began to be replaced by pc's. ...
Ethernet traffic doesn't travel at the same speeds due to many...
The old days used load balancing to send individual packets to their...
Regarding IP, the following traffic types exist except one...
In the late 80's, what product eliminated network collisions...
Within an Autonomous System (AS) routers are configured to "speak" the...
A fundamental part of routing is connecting routers together to...
It is not possible to run multiple routing protocols on a single...
The financial/cost calculations on a network utilizing LACP, which...
In the mid 80's, what was the networking device that brought devices...
Two problems were solved with LACP.  One of them is faster...
With MLAG configured, STP sees multiple switches as what?
A port channel is a communication link between two switches supported...
The Arista software known as EOS is also named?
DARPA was involved in the development of the Ethernet. ...
In OSI, Layer 2 is known as what?
Fiber Optics provides improvement over Cabling with speed, longer...
In networking, what is a fundamental concept?
Commands: ...
What does the industry call the ability to separate functions like...
In the past 15-20 years, what product changed the networking landscape...
With STP and VLANs, adding "priority" commands at the VLAN level...
In MLAG configurations, each switch must have ______________ domain...
PortFast allows what to occur in the network?
An IP address can be assigned to a VLAN, creating a switched virtual...
In ZTP mode, if no startup-config is found, what does the switch look...
Cloud computing provides the following benefits except which one?
What tool below is not part of a typical NetOps tool suite?
Which of the following MLAG statuses is inaccurate?
What protocol was developed to solve the router "black hole" syndrome...
The Back Bone Router (BB) connects routers in what area?
The Open Systems Interconnect (OSI) was created in what years?
Which of the two routing protocols, IS-IS or OSPF, utilizes the...
Which of the following companies no longer have networking software...
ZTP requires the following except which one?
ZTP Server was created by Arista employees. True or False?
The benefit of LACP is that it is invisible to STP. The hashing...
Because WAN connectivity is leased and is a public, shared...
Address Resolution Protocol (ARP) handles interaction between L2 and...
Arista switches support four types of interfaces. ...
In Loopback Interface Configuration, Loopback numbers range is from 0...
ECMP is dependent on what being used?
Arista EOS Architecture have many benefits. ...
What term is used to describe the operational status of a router in a...
Regarding IP addresses, which of the following correctly identifies...
What is the initial state of a switch?
It is not possible to send data or requests to a host that no longer...
To maintain the STP Topology and react when failures occur, the ROOT...
In STP mode, total transition time typically is how many seconds?
When many operating systems are required to manage a network, we call...
What is the term to identify config inconsistencies in MLAG...
What concept is critical to the job of a network engineer at all...
The predominant networking vendors all adopted variations of these two...
Arista recommends what for most leaf-spine data center designs?
How is the term used to describe traditional networking, known as...
A Virtual Private Network (VPN) provides what?
A sniffer trace on an HTTP request has how many transactions before...
In an IP header, which of the following is not part of this header?
PoE came along that changed the cabling needs going forward allowing...
What protocol was developed by Arista to solve the router "black hole"...
The Arista's Quality comes from three places: Architecture and Testing...
All of the below are features of the Leaf-Spine Architecture except...
Scripts are run from what?
The port priority of LACP determines the port that is active in a LAG...
What is one of the key benefits of VRF?
During synchronization, interfaces transmit one LACP PDU per second....
Alert!

Advertisement