Prelim Cisco 2
Prelim Cisco 2
Prelim Cisco 2
A switch populates the MAC address table based on destination MAC addresses.
The ________________ switches do not support features or options beyond those that
originally came with the switch.
Fixed configuration
Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.
Daisy Chain
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Distribution layer
The primary function of this layer is to provide network access to the user.
Access layer
A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Store-and-forward switching
The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.
Modular configuration
When selecting the type of switch, rack units should always be considered. Rack units is the
number ports available in the network switch.
TRUE or FALSE. Cut-through switching has two primary characteristics: rapid frame
forwarding and invalid frame processing.
True
A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.
What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.
In the Switch port LED status, if the LED is blinking green what is the status of switch?
What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.
SSH
What is the command to configure the interface to automatically negotiate speed with the
connected device?
speed auto
What is the command used to determine the status of both physical and virtual interfaces
including IP address?
Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?
Ip default-gateway 172.10.90.1
configure terminal
This attack tries to crack a password on another device. The first phase of this attack starts
with the attacker using a list of common passwords and a program designed to try to
establish a Telnet session using each word on the dictionary list.
This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.
PRELIM
A switch populates the MAC address table based on destination MAC addresses.
Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.
Daisy Chain
A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward
compatibility with untagged traffic common to legacy LAN scenarios.
Native VLAN
This type of attack takes advantage of the way that hardware on most switches operates.
Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker
to embed a hidden 802.1Q tag inside the frame.
Trunks
This memory stores router bootup instructions and basic diagnostic software.
ROM
vlan.dat
In the Switch port LED status, if the LED is blinking green what is the status of switch?
This is a security technology that determines which devices attached to switch ports can
respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that
contain information such as IP address related data being provided to legitimate network
devices.
DHCP Snooping
In this attack, the attacker exploits a flaw in the Telnet server software running on the switch
that renders the Telnet service unavailable. This sort of attack prevents an administrator
from remotely accessing switch management functions. This can be combined with other
direct attacks on the network as part of a coordinated attempt to prevent the network
administrator from accessing core devices during the breach.
Core layer
Routers support a variety of interface types. Switches typically support Ethernet interfaces.
A protocol that provides an encrypted connection to a remote device.
SSH
TRUE or FALSE.
A host can be assigned it IP address information in one of the two way. Statically and
dynamically assigned. In statistically assigned IP address, the DHCP server provides a valid IP
address.
False
1. RAM permanently stores the configuration file used during the boot sequence.
2. ROM contains diagnostics executed on hardware modules.
3. NVRAM stores a backup copy of the IOS used during the boot sequence.
4. Flash memory does not lose its contents during a reboot.
5. ROM contains the most current and most complete version of the IOS.
6. Flash contains boot system commands to identify the location of the IOS
2&4
Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?
Ip default-gateway 172.10.90.1
What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.
Core layer
The following are switch port modes that DTP offers EXCEPT
Remote
In this attack, the attacker exploits a flaw in the Telnet server software running on the switch
that renders the Telnet service unavailable. This sort of attack prevents an administrator
from remotely accessing switch management functions. This can be combined with other
direct attacks on the network as part of a coordinated attempt to prevent the network
administrator from accessing core devices during the breach.
The ________________ switches do not support features or options beyond those that
originally came with the switch.
Fixed configuration
What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.
To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what
command to be used to check whether the local and peer native VLANs match?
What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.
This is a proprietary protocol that all Cisco devices can be configured to use. This checks
other Cisco devices that are directly connected, which allows the devices to auto-configure
their connection.
A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.
Which of the following is the command to specify a VLAN name? Name of VLAN is
employee.
name employee
What is the status of the Port speed LED if the LED light is blinking green?
In troubleshooting VLANs, what command should be used to check whether the port
belongs to the expected VLAN?
show vlan
A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.
Store-and-forward switching
If your routing table has a static, a RIP, and an IGRP route to the same network, which route
will be used to route packets by default?
Static route
This is used between a network device and server or other device that is equipped with an
appropriate 802.1Q-capable NIC.
Trunks
The primary function of this layer is to provide network access to the user.
Access layer
TRUE or FALSE.
Most network interfaces have one or two LED link indicators next to the interface. Typically,
a blinking green LED means a good connection.
False
Which of the following is NOT a characteristics of a network?
A network administrator configures the interface fa0/0 on the router R1 with the command
ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the
command show ip route, the routing table does not show the directly connected network.
What is the possible cause of the problem?
True of False. VLAN IDs 1 to 1005 are automatically created. ID 1 cannot be removed while
VLAN IDs 1002 to 1005 can still be removed.
False
This type of attack takes advantage of the way that hardware on most switches operates.
Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker
to embed a hidden 802.1Q tag inside the frame.
True or False.
The best way to prevent a basic switch spoofing attack is to turn off trunking on all ports,
except the ones that specifically require trunking.
True
Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.
Daisy Chain
Data VLAN
This is a point-to-point link between two network devices that carries more than one VLAN.
Trunks
Broadcast domain
Telnet protocol by default uses Port ______.
23
22
Broadcast domain
What is the command to configure the interface to automatically negotiate speed with the
connected device?
speed auto
Refer to the exhibit. A network administrator has configured R1 as shown. When the
administrator checks the status of the serial interface, the interface is shown as being
administratively down. What additional command must be entered on the serial interface of
R1 to bring the interface up?
no shutdown
If your routing table has a static, a RIP, and an OSPF route to the same network, which route
will be used to route packets by default?
Static route
What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for
specific Fast Ethernet interface?
To enable network access to a remote destination, what three pieces of information must be
configured on a host?
1. default gateway
2. hostname
3. DNS server address
4. DHCP server address
5. IP address
6. subnet mask
1, 5, 6
True or False.
If two devices in the same VLAN have different subnet addresses, they cannot communicate.
True
Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?
ip default-gateway 172.10.90.1
This is used between a network device and server or other device that is equipped with an
appropriate 802.1Q-capable NIC.
Trunks
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
Ip domain-name mycompany.com
Refer to the exhibit. According to the routing table, where will the router send a packet
destined for 10.1.5.65?
Network Interface Next-hop
10.1.1.0/24 e0 directly connected
10.1.2.0/24 e1 directly connected
10.1.3.0/25 s0 directly connected
10.1.4.0/24 s1 directly connected
10.1.5.0/24 e0 10.1.1.2
10.1.5.64/28 e1 10.1.2.2
10.1.5.64/29 s0 10.1.3.3
10.1.5.64/27 s1 10.1.4.4
10.1.3.3
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)
ip domain-name mycompany.com
The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.
Modular configuration
The network segments that share the same bandwidth between devices.
Collision domain
What is the command used to determine the status of both physical and virtual interfaces
including IP address?
2 & 3
VLAN 1
This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.
What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.
Load balancing allows a router to forward packets over multiple paths to the same
destination network.
If the port is assigned to the wrong VLAN, what command to be command to change the
VLAN membership on a particular port?
Sometimes switch ports must manually have their duplex mode manually configured. This
duplex mode increases effective bandwidth by allowing both ends of a connection to
transmit and receive data simultaneously.
In troubleshooting VLANs, what command should be used to check whether the port
belongs to the expected VLAN?
show vlan
Refer to the exhibit. A network administrator has configured R1 as shown. When the
administrator checks the status of the serial interface, the interface is shown as being
administratively down. What additional command must be entered on the serial interface of
R1 to bring the interface up?
no shutdown
2 & 3
What is the command to create a VLAN with a valid VLAN ID number 30?
vlan 30
Which two network parameters are used by EIGRP as metrics to select the best path to
reach a network?
1. Jitter
2. bandwidth
3. resiliency
4. hop count
5. delay
6. Confidentiality
2&5
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Distribution layer
What is the status of the Port speed LED if the LED light is blinking green?
TRUE or FALSE. Store-and-forward switching has two primary characteristics that distinguish
it from cut-through: error checking and automatic buffering.
True
Which two statements correctly describe the concepts of administrative distance and
metric?
1. The metric varies depending which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher administrative distances.
3. The value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count.
4 & 5
If an error occurs while loading the operating system because of missing or damaged
system files, the load loader can be access through a console connection. What button in
the switch you need to press while reconnecting the power cord?
Mode
This is the practice of inserting a VLAN ID into a packet header in order to identify which
VLAN (Virtual Local Area Network) the packet belongs to.
VLAN tagging
The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.
Modular configuration
Which command is used to configure an IPv6 address on a router interface so that the
router will combine a manually specified network prefix with an automatically generated
interface identifier?
True or False.
When configuring a switch port on a Cisco switch, configure devices so that they send
tagged frames on the native VLAN.
False
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.
Distribution layer
Core layer
This is a proprietary protocol that all Cisco devices can be configured to use. This checks
other Cisco devices that are directly connected, which allows the devices to auto-configure
their connection.
VLAN 1
vlan.dat
configure terminal
The network segments that share the same bandwidth between devices.
Collision domain
This memory provides temporary storage for various applications and processes, including
the running IOS, the running configuration file, IP routing table, Ethernet ARP table.
RAM
This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.
1 & 4
Load balancing allows a router to forward packets over multiple paths to the same
destination network.
Data VLAN
In the Switch port LED status, if the LED is blinking green what is the status of switch?
The ________________ switches do not support features or options beyond those that
originally came with the switch.
Fixed configuration
2 & 4
The primary function of this layer is to provide network access to the user.
Access layer
What is the command to create a VLAN with a valid VLAN ID number 30?
Vlan 30