0% found this document useful (0 votes)
188 views50 pages

Data Communications and Networking 1 and 2

The IEEE develops wired and wireless LAN and MAN networking standards. Protocols provide communication rules for specific types of exchanges. When a collision occurs on a bus network, all devices stop transmitting and try again later.

Uploaded by

rovejama caaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views50 pages

Data Communications and Networking 1 and 2

The IEEE develops wired and wireless LAN and MAN networking standards. Protocols provide communication rules for specific types of exchanges. When a collision occurs on a bus network, all devices stop transmitting and try again later.

Uploaded by

rovejama caaya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

Which organization develops the 802

IEEE family of standard for wired and wireless


LANs and MANs?
Which statement describes a
They vary depending on protocols characteristic of the frame header fields
of the data link layer?
Which organization develops the 802
IEEE family of standard for wired and wireless
LANs and MANs?
providing the rules required for a What is the purpose of protocols in data
specific type of communication to occur communications?
All devices stop transmitting and try What happens when a data collision
again later. occurs on an bus?
A client is downloading a large file from
The FTP client responds to the server
a server using FTP. Many of the
with a smaller window size in the TCP
segments are lost during transit. What
header.
will most likely happen?
it can rapidly adapt to the failure of
network devices and communication
For which three reasons was a packet
links, Data packets can travel through
switched connectionless data
the network using multiple different
communications technology used when
paths, Network devices dynamically
developing the Internet (Choose three.)
decide on the best available path to
forward each packet.
Which of the following TCP/IP exist at
TCP, UDP the of the TCP/IP reference model?
(Choose two.)
Which device acts as gateway to allow
local router hosts to send traffic to remote IP
networks?
The host portion of the IP addresses will What happens when two devices on the
be different same subnet are communicating?
Which organization is responsible for
The Telecommunications Industry
developing communications standards
Association (TIA)
for Voice over IP (VoIP) devices?
A user who is unable to connect to the
file server contacts the help desk. The
helpdesk technician asks the user to
to test if the workstation can
ping the IP address of the default
communicate on the network
gateway that is configured on the
workstation. What is the purpose for this
command?
What is encrypted with the enable
the privileged executive mode password
secret command?
Which is a function of the Logical Link
to identify which protocol is being used
Control (LLC) sublayer?
Which logical address is used for
destination IP address
delivery of data to a remote network?
What type of protocol describes
communication over a data link and the
Network access protocol
physical transmission of data on the
network media?
to add a password to a Cisco network Why would a network administrator use
device the CLI of the Cisco IOS?
providing a richer e-learning What are two benefits of collaboration
environment, providing better social and video-on-demand applications?
media opportunities (Choose two.)
What is the purpose of the physical link
to establish the media link
control field in a data link layer header?
Which device performs the function of
router determining the path that messages
should take through internet works?
"To save time, IOS commands may be
Tab partially entered and then completed by
typing which key or key combination?"
"Which statement is true about an
"- A link-local IPv6 address is
interface that is configured with the IPv6
automatically"
address command?"
"(config) # service password-encryption" "What command will prevent all
unencrypted passwords from displaying
in plain text in a configuration file?"
"Which action is performed by a client
"The client sends a synchronization
when establishing communication with a
segment to begin the session"
server via the use of UDP at the ?"
"What is initially entered at the CLI of
Command the Cisco IOS when typing a command
sequence?"
A router has a valid operating system
and a configuration file stored in
NVRAM. The configuration file contains
user EXEC mode
an enable secret password but no
console password. When the router
boots up, which mode will display?
UDP reassembles that data in the order What does UDP do when receiving
it was received and passes it to the messages that are more than one
application. datagram in length?
"A network administrator notices that
the default gateway devices sends an
"To notify the workstation, that another
ICMP Redirect message to the
router on the same network, is the
workstation when the workstation tries
better default-gateway to reach the
to connect to file server on another
remote server"
network. What is the purpose for this
ICMP message?"
"They define how messages are
"Which statement is correct about
exchanged between the sources and
network ?"
the destination"
Which two engineering organizations
International Telecommunication Union
define open standards and protocols
(ITU)
that apply to the data link layer?
"Products from different manufacturers "What is and advantage of using
can interoperate successfully" standards to develop and implement ?"
"Which type of network design
"a converged network" combines voice, video, and data on the
same communication channel?"
flash "During the boot process, in what
memory location will the router
bootstrap program look for the IOS
image if a TFTP server is not used?"
"What are the primary requirements of
Confidentiality, Integrity, Availability
information security? (Choose three.)"
"Products from different manufacturers "What is an advantage of using
can interoperate successfully" standards to develop and implement ?"
Which two message timing mechanisms
response timeout, flow control are used in data communication?
(Choose two.)
"The network provides predictable
"Which statement describes a network
levels of service to different types of
that supports QoS?"
traffic"
At which layers of does function?
Data link, Physical
(Choose two.)
"Which device acts as gateway to allow
"local router" hosts to send traffic to remote IP
networks?"
What three do email users and servers
SMTP, IMAP4, POP3
use to process email? (Choose three.)
"Which interface command must be
entered in a Layer 3 switch before IPv4
"no switchport"
address can be assigned to the
interface?"
"Which two statements are true of the
"The throughput is predictable, Devices
deterministic access method?(Choose
take turns transmitting"
two.)"
virtualization "A data center has recently updated a
physical server to host multiple
operating systems on a single CPU.
The data center can now provide each
customer with a separate web server
without having to allocate an actual
discrete server for each customer. What
is the network trend that is being
implemented by the data center in this
situation?"
They define how messages are
Which statement is correct about
exchanged between the source and the
network protocols?
destination.
"Public IP addresses must be unique "Which statement accurately describes
across the entire Internet" public IP addresses?"
What method can be used by two
computers to ensure that packets are
flow control
not dropped because too much data is
being sent too quickly?
In fiber optic meda, the signals are
light
represented as patterns of
"Which message timing factor impacts
"Flow control" how much information can be sent and
the speed at which it can be delivered?"
Which statement is correct about
network ?
"What method can be used by two
computers to ensure that packets are
flow control
not dropped because too much data is
being sent too quickly?"
to add a password to a Cisco network Why would a network administrator use
device the CLI of the Cisco IOS?
"when the end-user device will run an "When is a wired connection preffered
application that requires a dedicated to a wireless connection by an end-user
connection to the network" device?"
"Which term defines the processing
capabilities of a switch by rating how
"forwarding rate"
much data can be processed per
second?"
"providing a richer e-learning "What are two benefits of collaboration
environment, providing better social and video-on-demand applications?
media opportunities" (Choose two.)"
"providing the rules required for a "What is the purpose of in data
specific type of communication to occur" communications?"
"A router has a valid operating system
and a configuration file stored in
NVRAM. The configuration file contains
user EXEC mode
an enable secret password but no
console password. When the router
boots up, which mode will display?"
Which logical address is used for
destination IP address
delivery of data to a remote network?
"They originate the data that flows
through the network., They are the What are two functions of end devices
interface between humans and the on a network? (Choose two.)
communication network."
"A network that can reroute traffic in
"What is a fault-tolerant network?"
case of device failure"
Which message delivery option is used
broadcast when all devices need to receive the
same message simultaneously?
"Which technology would be best to
DSL provide a home user with a highspeed,
always-on Internet connection?"
"Which three fields are used in a UDP
"Length, Source Port, Checksum"
segment header? (Choose three.)"
to identify which network layer protocol Which is a function of the Logical Link
is being used Control (LLC) sublayer?
What is an advantage of using
Products from different manufacturers
standards to develop and implement
can interoperate successfully
protocols?
What is encrypted with the enable
the privileged executive mode password
secret command?
"Which two components are added to
"Trailer, frame header" the PDU at the network access layer?
(Choose two.)"
Connectionless What is a characteristic of UDP?
"Which command or key combination
allows a user to return to the previous
level in the command hierarchy?"
"When the command “Switch(config)#
hostname EaSt2+56” is entered in a
EaSt-2+56(config)#
Cisco IOS device using the CLI, what
will be returned in the CLI?"
"Which statement describes a
"They vary depending on" characteristic of the frame header fields
of the data link layer?"
is a private connection of LANs and
WANs that belongs to an organization,
and is designed to be accessible only
Intranet
by the members and employees of the
organization, or others with
authorization.
Segment "What is the PDU?"
"What is a characteristic of a contention-
"It is as nondeterministic method"
based access method?"
The farther you are from the central
slower office when utilizing a DSL connection,
the
"The host portion of the IP addresses "What happens when two devices on
will be different" the same subnet are communicating?"
"Where is the configuration used during
"Startup config"
startup on Cisco IOS devices located?"
"providing end devices with a unique
network identifier, directing data "What are two functions that are
packets to destination hosts on other provided by the ? (Choose two.)"
networks"
What process is used to place one
message inside another message for
encapsulation
transfer from the source to the
destination?
broadcast "Which message delivery option is used
when all devices need to receive the
same message simultaneously?"
Which type of network design combines
a converged network voice, video, and data on the same
communication channel?
What will a network administrator use to
IOS modify a configuration on a Cisco
router?
"Which type of traffic must receive the
VoIP
highest priority from QoS?"
"to keep track of multiple conversations "What is the purpose of using a source
between devices" port number in a TCP communication?"
"The operating system for the Cisco
"What is the Cisco IOS?"
network device"
"a farm in rural area without wired "In which scenario would the use of a
broadband access" WISP be recommended"
"an address that reaches a specific  "What type of address is 01-00-5E-0A-
group of hosts" 00-02?"
"A company is contemplating whether to
use a client/server or a peer-to-peer
"easy to create, lacks centralized
network. What are three characteristics
administration, less cost to implement"
of a peer-to-peer network? (Choose
three.)"
"A technician configures a switch with
SVI
these commands:"
"Why would a technician enter the
"to copy an existing configuration into
command copy startup-config running
RAM"
config?"
"Which of the following are
"No centralized administration,
disadvantages of peer-to-peer
Scalability"
networking? (Choose two.)"
"Which two files are loaded into RAM by
"startup configuration, IOS image"
the router when it boots? (Choose two.)"
What is the function of the kernel of an
operating software?
"It is responsible for Media Access "Which two functions or operations are
Control, it adds a header and trailer to performed by the MAC sublayer?
form an OSI Layer 2 PDU" (Choose two.)"
"Nothing must be done. Changes to the "An administrator has just changed the
configuration on an IOS device take IP address of an interface on an IOS
effect as soon as the command is typed device. What else must be done in
correctly and the Enter key has been order to apply those changes to the
pressed." device?"
"A network where voice, video, and data
"What is a converged network?"
move over the same infrastructure"
"A web client is sending a request for a
webpage to a web server. From the
perspective of the client, what is the
HTTP, TCP, IP,
correct order of the protocol stack that is
used to prepare the request for
transmission?"
What are the parts of an IPv4 address?
Host, Network
(Choose two.)
"Which procedure is used to access a
"Use the console port to locally access
Cisco 2960 switch when performing an
the switch from a serial or USB
initial configuration in a secure
interface of the PC."
environment?"
"Which term describes the state of a
network when the demand on the
congestion
network resources exceeds the
available capacity?"
Which address is a multicast MAC
01-00-5E-00-00-C8
address?
"What is a group of web pages that
Wiki groups of individuals can edit and view
together called?"
"The MTU is passed to the by the data
"How does the use the MTU value?"
link layer"
ROM "During troubleshooting procedures,
from which location will most Cisco
routers load a limited IOS"
Which field in an frame is used for error
Frame Check Sequence
detection?
What type of communication will send a
broadcast message to all devices on a local area
network?
Which standard specifies the MAC
IEEE 802.3 sublayer functionality in a computer
NIC?
They define how messages are
Which statement is correct about
exchanged between the sources and
network protocols?
the destination
"What three functions are defined by
"data encoding, message size, delivery network to allow communication
options" between known source and destination
IP addresses? (Choose three.)"
Which interface command must be
entered in a Layer 3 switch before IPv4
no switchport
address can be assigned to the
interface?
"Your organization is issued the IPv6
prefix of 2001:0000:130F::/48 by your
128 service provider. With this prefix, how
many bits are available for your
organization to create subnetworks?"
"UDP communication requires less "What is an advantage of UDP over
overhead" TCP?"
"the distance the selected medium can
"What two criteria are used to help
successfully carry a signal, the
select a network medium from various
environment where the selected
network media? (Choose two.)"
medium is to be installed"
"Which type of IPv6 address is not
"link-local address" routable and used for communication on
a single subnet?"
a router "Which device performs the function of
determining the path that messages
should take through internet works?"
"Which TCP/IP model layer is
Internet responsible for providing the best path
through the network?"
The TCP/IP effectively consists of which
Application, presentation, session
three OSI layers?
What three functions are defined by
network protocols to allow
data encoding, message size, delivery
communication between known source
options
and destination IP addresses? (Choose
three.)
"Which two connection options provide
an always-on, high-bandwidth Internet
DSL, cable
connection to computers in a home
office? (Choose two.)"
Nothing must be done. Changes to the An administrator has just changed the
configuration on an IOS device take IP address of an interface on an IOS
effect as soon as the command is typed device. What else must be done in
correctly and the Enter key has been order to apply those changes to the
pressed. device?
"What process is used to place one
message inside another message for
encapsulation
transfer from the source to the
destination?"
"The branch sites are connected to a "What is a characteristic of a WAN hub-
central site through point-point links" and-spoke topology?"
Which application use UDP as the
SMTP
protocol?
"Which PDU is processed when a host
computer is de-encapsulating a
message at the of the TCP/IP model?"
"This is the default mode on an "Which two statements are true
unconfigured router when first powered regarding the user EXEC mode?
up., Only some aspects of the router (Choose two.)"
configuration can be viewed"
it can rapidly adapt to the failure of
network devices and communication
For which three reasons was a packet
links, Data packets can travel through
switched connectionless data
the network using multiple different
communications technology used when
paths, Network devices dynamically
developing the Internet (Choose three.)
decide on the best available path to
forward each packet.
Which statement describes a feature of
It does not allow spaces
an IOS host name configuration?
What is a characteristic of a contention-
It is as nondeterministic method
based access method?
"Which devices would be considered
"Printer, IP phone, Server, Tablet
end devices on a network? (Choose
computer"
four.)"
sublayer is responsible for
mac communicating directly with the physical
layer.
"A network administrator needs to keep
the user ID, password, and session
contents private when establishing
SSH
remote CLI connectivity with a switch to
manage it. Which access method
should be chosen?"
"Which of the following elements do
both human and computer
Source, Channel, Receiver
communication systems have in
common? (Choose three.)"
"how connection between nodes "Which two factors influence the method
appears to the data link layer, how that is used for media access control?
nodes share the media" (Choose two.)"
What is assigned by the to identify an
Port
application or service?
"the original source port number that "When a client connects to an HTTP
was randomly generated by the client" server by the use of a randomly
generated source port number, what
destination port number will the HTTP
server use when building a response?"
"A network administrator needs to keep
the user ID, password, and session
contents private when establishing
remote CLI connectivity with a switch to
manage it. Which access method
should be chosen?"
"Which number or set of numbers
192.168.1.1:80
represents a socket?"
"What type of delivery uses data link
"local delivery"
layer addresses?"
"What organization is responsible for
IAB the overall management and
development of Internet standards?"
What is an advantage that UDP has
Low overhead
over TCP?
"Intermediary devices direct the path of
Which two statements describe
the data., Intermediary devices connect
intermediary devices? (Choose two.)
individual hosts to the network."
network is able to expand to accept new
Scalable devices and applications without
affecting performance.
"Which statement is true about an
"A link-local IPv6 address is
interface that is configured with the IPv6
automatically"
address command?"
A network administrator needs to keep
the user ID, password, and session
contents private when establishing
SSH
remote CLI connectivity with a switch to
manage it. Which access method
should be chosen?
"Which statement describes a feature of
"It does not allow spaces"
an IOS host name configuration?"
"What happens to frames that are too
"They are dropped."
long or too short for the channel used?"
A web client is sending a request for a
webpage to a web server. From the
perspective of the client, what is the
HTTP, TCP, IP, Ethernet
correct order of the protocol stack that is
used to prepare the request for
transmission?
"What name is given to a group of
"Protocol suite" interrelated necessary to perform a
communication function?"
"Which of the following are examples of
"AppleTalk, Novell NetWare"
proprietary ? (Choose two.)"
Which two components are added to
Trailer, frame header the PDU at the network access layer?
(Choose two.)
This is the default mode on an
Which two statements are true
unconfigured router when first powered
regarding the user EXEC mode?
up., Only some aspects of the router
(Choose two.)
configuration can be viewed
Intermediary devices direct the path of
Which two statements describe
the data., Intermediary devices connect
intermediary devices? (Choose two.)
individual hosts to the network.
What command will prevent all
(config) # service password-encryption unencrypted passwords from displaying
in plain text in a configuration file?
a web page that groups of people can
What is a wiki?
edit and review
The network provides predictable levels Which statement describes a network
of service to different types of traffic that supports QoS?
Why would a technician enter the
to copy an existing configuration into
command copy startup-config running
RAM
config?
spyware During a routine inspection, a technician
discovered that software that was
installed on a computer was secretly
collecting data about websites that were
visited by users of the computer. Which
type of threat is affecting this computer
"A network administer has forgotten the
argument of an IOS command. How
"Type the command and then press
would the administrator get help from
the? key"
the IOS CLI to complete the command
correctly?"
"When a client connects to an HTTP
server by the use of a randomly
"the original source port number that
generated source port number, what
was randomly generated by the client"
destination port number will the HTTP
server use when building a response?"
What type of delivery uses data link
local delivery
layer addresses?
"Which two Internet connection options
, do not require that physical cables be
run to the building? (Choose two.)"
Which TCP header field specifies the
number of bytes that can be accepted
Window size
before an acknowledgement is
required?
Which two Internet connection options
cellular, satellite do not require that physical cables be
run to the building? (Choose two.)
how connection between nodes Which two factors influence the method
appears to the data link layer, how that is used for media access control?
nodes share the media (Choose two.)
An administrator measured the transfer
of usable data across a 100 Mb/s
physical channel over a given period of
latency
time and obtained 60 Mb/s. Which kind
of measurement did the administrator
obtain
"What happens if part of an FTP
"The part of the FTP message that was
message is not delivered to the
lost is re-sent"
destination?"
"Which two message timing
"response timeout, flow control" mechanisms are used in data
communication? (Choose two.)"
"What is the primary defense against
a VTY password unauthorized remote access to network
devices?"
Which PDU is processed when a host
computer is de-encapsulating a
segment
message at the transport layer of the
TCP/IP model?
"What is the name given to a one-to-
Multicast
many message delivery option?"
Which procedure is used to access a
Use the console port to locally access
Cisco 2960 switch when performing an
the switch from a serial or USB
initial configuration in a secure
interface of the PC.
environment?
"Which destination address is used in
FFFF.FFFF.FFFF
an ARP request frame?"
Which area of the network would a
college IT staff most likely have to
redesign as a direct result of many
wireless LAN
students bringing their own tablets and
smartphones to school to access school
resources?
"Which command or key combination
exit allows a user to return to the previous
level in the command hierarchy?"
an intranet "An employee at a branch office is
creating a quote for a customer. In order
to do this, the employee needs to
access confidential pricing information
from internal servers at the Head Office.
What type of network would the
employee access?"
"During a routine inspection, a
technician discovered that software that
was installed on a computer was
spyware secretly collecting data about websites
that were visited by users of the
computer. Which type of threat is
affecting this computer"
A technician configures a switch with
SVI
these commands:
"What type of connection to a Cisco IOS
"Console port" switch is used to make the initial
configuration?"
"Which entities are involved in a
applications temporary communication that is
established by the ?"
Which address is used as a destination
FF-FF-FF-FF-FF-FF
address on a broadcast frame?
"Which of the following OSI model
layers have the same functionality as
"Physical, Data link"
the network access layer in the TCP/IP
model? (Choose two.)"
What are the primary functions
Frame delimiting, Addressing, Error
associated with data encapsulation at
detection
the MAC sublayer? (Choose three.)
an address that reaches a specific What type of address is 01-00-5E-0A-
group of hosts 00-02?
Which command or key combination
exit allows a user to return to the previous
level in the command hierarchy?
"Directed broadcasts are intended for all
"Which two statement describe
hosts on a local or remote network,
broadcast transmissions on a wired
Limited broadcasts are only intended for
network? (Choose two.)"
the hosts on a local network"
"What type of communication will send
broadcast a message to all devices on a local area
network?"
when the end-user device will run an When is a wired connection preffered to
application that requires a dedicated a wireless connection by an end-user
connection to the network device?
"Which of the following are business-
class Internet connection technologies
"Leased lines, Metro"
normally supplied by a service provider?
(Choose two.)"
"What is the command netstat –r used
"to display the host routing table"
for?"
An employee at a branch office is
creating a quote for a customer. In order
to do this, the employee needs to
an intranet access confidential pricing information
from internal servers at the Head Office.
What type of network would the
employee access?
"Which entities are involve in a
applications temporary communication that is
established by the ?"
"When transporting data from real-time
applications, such as streaming audio
and video, which field in the IPv6
"Flow Label" header can be used to inform the
routers and switches to maintain the
same path for the packets in the same
conversation?"
"Which area of the network would a
college IT staff most likely have to
redesign as a direct result of many
wireless LAN
students bringing their own tablets and
smartphones to school to access school
resources?"
"What is the purpose of the physical link
"to establish the media link"
control field in a data link layer header?"
Which term describes the state of a
network when the demand on the
congestion
network resources exceeds the
available capacity?
The branch sites are connected to a What is a characteristic of a WAN hub-
central site through point-point links and-spoke topology?
"Which action is performed by a client
"The client sends a synchronization
when establishing communication with a
segment to begin the session"
server via the use of UDP at the ?"
"A technician configures a switch with
SVI
these commands:"
"A user is unable to access the
company server from a computer. On
issuing the ipconfig command, the user
experimental
finds that the IP address of the
computer is displayed as 169.254.0.2.
What type of address is this?"
"it can rapidly adapt to the failure of
network devices and communication
"For which three reasons was a packet
links, Data packets can travel through
switched connectionless data
the network using multiple different
communications technology used when
paths, Network devices dynamically
developing the Internet (Choose three.)"
decide on the best available path to
forward each packet"
"What command will display a list of
"Switch# show?" keywords available for viewing the
status of an IOS switch?"
"Which OSI reference model layer is
responsible for common representation
Presentation
of the data transferred between
services?"
Type the command and then press the? A network administer has forgotten the
key argument of an IOS command. How
would the administrator get help from
the IOS CLI to complete the command
correctly?
What is the minimum and maximum
64 bytes – 1518 bytes
frame size as defined by IEEE 802.3?
"a farm in a rural area without wired "In which scenario would the use of a
broadband access" WISP be recommended?"
"What type of information would be
"IP addressing scheme"
found on a logical topology diagram?"
address is defined as a reserved
loopback address that routes packets back to the
host
"Which value, that is contained in an
Time-to-Live IPv4 header field, is decremented by
each router that receives a packet?"
"a web page that groups of people can
What is a wiki?
edit and review"
the distance the selected medium can
What two criteria are used to help select
successfully carry a signal, the
a network medium from various network
environment where the selected
media? (Choose two.)
medium is to be installed
The kernel provisions hardware
What is the function of the kernel of an
resources to meet software
operating software?
requirements.
A company is contemplating whether to
use a client/server or a peer-to-peer
easy to create, lacks centralized
network. What are three characteristics
administration, less cost to implement
of a peer-to-peer network? (Choose
three.)
Which two connection options provide
an always-on, high-bandwidth Internet
DSL, cable
connection to computers in a home
office? (Choose two.)
a farm in a rural area without wired In which scenario would the use of a
broadband access WISP be recommended?
The first 6 hexadecimal digits of a MAC
address represent the OUI., The vendor
is responsible for assigning the last 24 What is true about the MAC address?
bits of the MAC address., The MAC (Choose three.)
address is also known as a burned-in
address.
"During a routine inspection, a
technician discovered that software that
was installed on a computer was
spyware secretly collecting data about websites
that were visited by users of the
computer. Which type of threat is
affecting this computer?"
To save time, IOS commands may be
Tab partially entered and then completed by
typing which key or key combination?
"Which feature on a Cisco router
"gateway of last resort" permits the forwarding of traffic for
which there is no specific route?"
What is the name given to the MAC
Frame
sublayer PDU?
"This is the default mode on an
"Which two statements are true
unconfigured router when first powered
regarding the user EXEC mode?
up, Only some aspects of the router
(Choose two.)"
configuration can be viewed"
Which two statements are true of the
The throughput is predictable, Devices
deterministic access method?(Choose
take turns transmitting
two.)
"Which statement is correct about
network ?"
"What will a network administrator use
IOS to modify a configuration on a Cisco
router?"
"a web page that groups of people can
"What is a wiki?"
edit and review"
They originate the data that flows
through the network., They are the What are two functions of end devices
interface between humans and the on a network? (Choose two.)
communication network.
What range of ports can either be used
by TCP or UDP to identify the requested
1024 to 49151
service on the destination device or as a
client source port?
"Which protocol allows users on one
FTP network to reliably transfer files to and
from a host on another network?"
"Through the CLI using a terminal "How is the Cisco IOS generally
emulator" accessed and navigated?"
A data center has recently updated a
physical server to host multiple
operating systems on a single CPU.
The data center can now provide each
customer with a separate web server
virtualization
without having to allocate an actual
discrete server for each customer. What
is the network trend that is being
implemented by the data center in this
situation?
"The default gateway address is used to "Within a production network, what is
forward packets originating from the the purpose of a switch with a default
switch to remote networks." gateway address?"
"Which organization is responsible for
IEEE the standard that defines Media Access
Control for wired ?"

PAT Address Translation is also termed


NAT Overload
what?
4&5 "Which two statements correctly describe
the concepts of administrative distance and
metric? 1. The metric varies depending
which Layer 3 protocol is being routed, such
as IP. 2. A router first installs routes with
higher administrative distances. 3. The value
of the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6. The
metric is always determined based on hop
count."
What are the two main types of access
1 and 3
control lists (ACLs)?
Addresses are allocated after a
negotiation between the server and How does a DHCP server dynamically
the host to determine the length of assign IP address to host?
the agreement.
Why would a floating static route be
configured with an administrative distance
To be used as a backup route that is highierthan the administrative
distance of a dynamic routing protocol that is
running on the same router?
Which of the following is NOT a feature of a
None of the choices
Switched Network
Which command is used to configure an
IPv6 address on a router interface so that
ipv6 address ipv6-address/prefix-
the router will combine a manually specified
length eui-64
network prefix with an automatically
generated interface identifier?
What are the 3 layers of the distribution
Access, distribution and Core layer
access?
2, 3, 2005 "OSPF routing uses the concept of areas.
What are the characteristics of OSPF areas?
1. Each OSPF area requires a loopback
interface to be configured. 2. Areas may be
assigned any number from 0 to 65535. 3.
Area 0 is called the backbone area. 4.
Hierarchical OSPF networks do not require
multiple areas. 5. Multiple OSPF areas must
connect to area 0. 6. Single area OSPF
networks must be configured in area 1."
Which two statements describe a routed
2, 4
switch port on a multilayer switch?
The network segments that share the same
Collision domain
bandwidth between devices.
Refer to the graphic. It has been decided
that PC1 should be denied access to Server.
Which 2 of the following commands are
2&3
required to prevent only PC1 from accessing
Server1 while allowing all other traffic to flow
normally?
The OSPF Hello protocol performs which of
1&3
the following tasks?
Assign and renew IP address from Which task does the Dynamic Host
the default pool. Configuration Protocol perform?
Relays a DHCP request across
The ip helper-address command does what?
networks
A measure of the trustworthiness of
What does administrative distance refer to?
a routing information source.
A switch forwarding method that makes a
forwarding decision on a frame after it has
Store-and-forward switching
received the entire frame and then checked
the frame for errors.
Which of the following is NOT a
All of the choices
characteristics of a network?
Which of the following is the command to
Ip domain-name mycompany.com configure the IP domain name of the
network (mycompany.com)
Which three statements describe the routing
1, 3, 2005
protocol OSPF?
Which protocolis used to configure trunking
802.1q
on a switch?
What is the command to assign the port to a
switchport access vlanvlan-id particular VLAN when the interface is in
access mode?
Which command is used to determine if an
Show ip interface IP access list is enabled on a particular
interface?
Which of the following is NOT an element of
None of the choices
converged network?
Which command will allow you to see real-
debug ip nat
time translations on your router?
What is the command to set the IP address
ip address 192.168.10.2 (192.168.10.2) and subnet mask
255.255.0.0 (255.255.0.0) for specific Fast Ethernet
interface?
"There are two advantages of static routing
over dynamic routing among these choices.
What are these? 1. Static routing is more
secure because it does not advertise over
the network. 2. Static routing scales well with
1&4 expanding networks. 3. Static routing
requires very little knowledge of the network
for correct implementation. 4. Static routing
uses fewer router resources than dynamic
routing 5. Static routing is relatively easy to
configure for large networks."
Refer to the exhibit. A junior network
engineer in one of the biggest telecom
company in the Philippines has prepared the
2&5
exhibited configuration file. What two
statements are true of the planned
configuration for interface fa0/1?
Configure a static default route In reference with the network diagram of
from R1 to Edge, a default route RMS Defence Industries. What routing
solution will allow both PC A and PC B to
from Edge to the Internet, and a access the Internet with the minimum
static route from Edge to R1. amount of router CPU and network
bandwidth utilization?
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring,
show interfaces trunk
what command to be used to check whether
the local and peer native VLANs match?
A network engineer for a semiconductor
company wants to use the primary ISP
connection for all external connectivity.
"ip route 0.0.0.0 0.0.0.0 s0/0/0 ip
Refer at the diagram below. The backup ISP
route 0.0.0.0 0.0.0.0 s0/1/0 10"
connection is used only if the primary ISP
connection fails. Which set of commands
would accomplish this goal?
Refer to the exhibit. A network administrator
has configured R1 as shown. When the
administrator checks the status of the serial
no shutdown interface, the interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
If your routing table has a static, a RIP, and
an IGRP route to the same network, which
Static route
route will be used to route packets by
default?
Which two commands are required to
properly configure a router to run OSPF and
1&4
to add network 192.168.16.0/24 to OSPF
area 0?
Refer to the exhibit. The user at Workstation
The gateway for Server A is not on B reports that Server A cannot be reached.
the same subnet. What is preventing Workstation B from
reaching Server A?
physical topology This is the arrangement of the cables,
network devices, and end systems. It
describes how the network devices are
actually interconnected with wires and
cables.
Which three statements are generally
3, 4, 2005 considered to be best practices in the
placement of ACLs?
OSPF is configured using default classful
addressing. With all routers and interfaces
4 operational, how many networks will be in
the routing table of R1 that are indicated to
be learned by OSPF?
Which statement are generally considered to
Place standard ACLs close to the
be best practices in the placement of ACLs?
destination IP address of the traffic.
(Choose three.)
Which commands are required to properly
1&4 configure a router to run OSPF and to add
network 192.168.16.0/24 to OSPF area 0?
23 Telnet protocol by default uses Port ______.
Which parameter can be tuned to affect the
Administrative distance selection of a static route as a backup when
a dynamic protocol is also being used?
Network infrastructure devices require IP
addresses to enable remote management.
None in the choices Using the device IP address, the network
administrator can remotely connect to the
device using any of the following EXCEPT
ip route 209.165.200.228 What is the correct syntax of a floating static
255.255.255.248 10.0.0.1 120 route?
Which command will show you all the
show ipnat translations
translations active on your router?
VLANis a switching technology that reduces
The correct answer is 'True'.
the size of a broadcast domain.
ip route 209.165.200.228 What is the correct syntax of a floating static
255.255.255.248 10.0.0.1 135 route?
110 What is the default administrative distance of
the OSPF routing protocol?
Which of the following would be a good
Check your interfaces for the
starting point for troubleshooting if your
correct configuration.
router is not translating?
Why would a floating static route be
configured with an administrative distance
To be used as a backup route that is highier than the administrative
distance of a dynamic routing protocol that is
running on the same router?
Refer to the exhibit. Which two statements
2&3 are true about the loopback address that is
configured on RouterB?
This is used between a network device and
Trunks server or other device that is equipped with
an appropriate 802.1Q-capable NIC.
Which two characteristics are shared by
3&5
both standard and extended ACLs?
This memory provides temporary storage for
various applications and processes,
RAM including the running IOS, the running
configuration file, IP routing table, Ethernet
ARP table.
This is a security technology that determines
which devices attached to switch ports can
respond to DHCP requests. This can be
DHCP Snooping used to prevent unauthorized DHCP
messages that contain information such as
IP address related data being provided to
legitimate network devices.
1&4 "What are two advantages of static routing
over dynamic routing? 1. Static routing is
more secure because it does not advertise
over the network. 2. Static routing scales
well with expanding networks. 3. Static
routing requires very little knowledge of the
network for correct implementation. 4. Static
routing uses fewer router resources than
dynamic routing 5. Static routing is relatively
easy to configure for large networks."
Inbound ACLs are processed
Which statement describes a difference
before the packets are routed while
between the operation of inbound and
outbound ACLs are processed after
outbound ACLs?
the routing is completed.
"Which two statements correctly describe
the concepts of administrative distance and
metric? (Choose two.) 1. The metric varies
depending which Layer 3 protocol is being
routed, such as IP. 2. A router first installs
routes with higher administrative distances.
3. The value of the administrative distance
4&5
can not be altered by the network
administrator. 4. Routes with the smallest
metric to a destination indicate the best path.
5. Administrative distance refers to the
trustworthiness of a particular route. 6. The
metric is always determined based on hop
count."
ISL & IEEE 802.1q Which are the 2 trunking protocols?
Refering to the network diagram above of
RMS University. All hosts and router
RIPv2 is misconfigured on router interfaces are configured correctly. Pings to
R2. the server from both H1 and H2 and pings
between H1 and H2 are not successful.
What is causing this problem?
If the port is assigned to the wrong VLAN,
Switchport access vlan what command to be command to change
the VLAN membership on a particular port?
Which three statements about routed ports
2, 3, 2006
on a multilayer switch are true?
Addresses are leased to host. A How does a DHCP server dynamically
host will usually keep the same assign IP address to host?
address by periodically contacting
the DHCP sever to renew the
lease.
This is a point-to-point link between two
Trunks network devices that carries more than one
VLAN.
Which command can you use to manually
ipv6 address
assign a static IPV6 address to a router
2001:db8:2222:7272::72/64
interface?
What command sequence will configure a
"router ospf 1 network 10.1.1.0
router to run OSPF and add network
0.0.0.255 area 0"
10.1.1.0 /24 to area 0?
Refer to the exhibit below. Which two
1&5 statements about the configuration of the
switch interface are correct?
What is the default administrative distance of
110
OSPF?
The following are VLAN best practices
None of the choices
EXCEPT?
"The primary functions of a router are the
following? 1. Packet switching 2. Flow
1&4
control 3. Domain name resolution 4. Path
selection 5. Microsegmentation"
Refer to the diagram below. The network
administrator of RMS Overseas and
Employment Agency that has the IP address
of 10.0.70.23/25 needs to have access to
the corporate FTP server (10.0.54.5/28).
The FTP server is also a web server that is
3&5
accessible to all internal employees on
networks within the 10.x.x.x address. No
other traffic should be allowed to this server.
Which extended ACL would be used to filter
this traffic, and how would this ACL be
applied?
What is the command to configure the
speed auto interface to automatically negotiate speed
with the connected device?
"To enable network access to a remote
destination, what three pieces of information
must be configured on a host? 1. default
1, 5, 2006
gateway 2. hostname 3. DNS server
address 4. DHCP server address 5. IP
address 6. subnet mask"
Load balancing allows a router to
Which of the statements describe
forward packets over multiple paths
characteristic of load balancing?
to the same destination network.
"What are two functions of dynamic routing
protocols? 1. to maintain routing tables 2. to
assure low router overhead 3. to avoid
1&4
exposing network information 4. to discover
the network 5. to choose the path that is
specified by the administrator"
Refer to the exhibit below. What routing
Configure a static default route
solution will allow both PC A and PC B to
from R1 to Edge, a default route
access the Internet with the minimum
from Edge to the Internet, and a
amount of router CPU and network
static route from Edge to R1.
bandwidth utilization?
Which three elements must be used when
2, 4, 2005 you configure a router interface for VLAN
trunking?
All hosts in the networks have been
The hosts will continue to operational for several hours when the
communicate normally for a period DHCP server goes down. What happens to
of time. the hosts that have obtained service from
the DHCP server?
Which router command allows you to view
Show access-lists
the entire contents of all access lists?
Network 10.12.0.0 Refer to the sample configuration below.
Which (config-router) command will allow
the network represented on the interface to
be advertised by RIP?
Which command will allow you to see real-
debug ipnat
time translations on your router?
Which of the following is the command to
name employee specify a VLAN name? Name of VLAN is
employee.
It is a logical interface internal to What is a characteristic of an IPv4 loopback
the router. interface on a Cisco IOS router?
Which of the following is the command to
Ip default-gateway 172.10.90.1 configure the switch default gateway with IP
address of 172.10.90.1?
Refer to the exhibit. Which two statements
1, 5 about the configuration of the switch
interface are correct?
Which version of NAT allows many hosts
inside a private network to simultaneously
PAT
use a single inside global address for
connecting to the Internet?
"Which two features are characteristics of
flash memory? 1. Flash receives a copy of
the IOS from RAM when a device is
powered on. 2. Flash provides nonvolatile
2&3 storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers. 5.
The contents of flash may be lost during a
power cycle."
"Which two network parameters are used by
EIGRP as metrics to select the best path to
2&5 reach a network? 1. Jitter 2. bandwidth 3.
resiliency 4. hop count 5. delay 6.
confidentiality"
RIPv2 Which classless routing protocol supports
VLSM and CIDR, supports manual route
summarization, and uses the multicast
address 224.0.0.9?
"A network administrator in Stark Industries
is trying to add a new router into an
established OSPF network. The networks
attached to the new router do not appear in
The network wildcard mask is the routing tables of the other OSPF routers.
configured improperly. Given the information in the partial
configuration shown below, what
configuration error is causing this problem?
Router(config)# router ospf 1 Router(config-
router)# network 10.0.0.0 255.0.0.0 area 0"
This is a conduit for multiple VLANs between
Trunks
switches and routers.
The following access list below was applied
All traffic exiting E0 will be denied outbound on the E0 interface connected to
the 192.169.1.8/29 LAN:
This layer provide fault isolation and high-
Core layer
speed backbone connectivity.
What type of route allows a router to forward
packets even though its routing table
Default route
contains no specific route to the destination
network?
A protocol that provides an encrypted
SSH
connection to a remote device.
"Refer to the exhibit. According to the
routing table, where will the router send a
packet destined for 10.1.5.65? Network
Interface Next-hop 10.1.1.0/24 e0 directly
connected 10.1.2.0/24 e1 directly connected
10.1.3.3
10.1.3.0/25 s0 directly connected
10.1.4.0/24 s1 directly connected
10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1
10.1.2.2 10.1.5.64/29 s0 10.1.3.3
10.1.5.64/27 s1 10.1.4.4"
Routers compare metrics to Which statement is true regarding routing
determine the best path. metrics?
This is the path over which the data is
transferred in a network. It describes how
logical topology
the network devices appear connected to
network users.
Refer to the exhibit. What will happen to
Traffic will be dropped, because of
HTTP traffic coming from the Internet that is
the implicit deny all at the end of
destined for 172.12.12.10 if the traffic is
the ACL.
processed by this ACL?
Which two statements describe the process
3&4 identifier that is used in the command to
configure OSPF on a router?
Configurations are stored within a VLAN
vlan.dat
database file, called
"Which two features are characteristics of
flash memory? 1. The contents of flash may
be lost during a power cycle. 2. Flash
provides nonvolatile storage. 3. The
2&3 contents of flash may be overwritten. 4.
Flash is a component in Cisco switches but
not in Cisco routers. 5. Flash receives a
copy of the IOS from RAM when a device is
powered on."
2&4 "Which two statements correctly describe
the components of a router? 1. RAM
permanently stores the configuration file
used during the boot sequence. 2. ROM
contains diagnostics executed on hardware
modules. 3. NVRAM stores a backup copy
of the IOS used during the boot sequence.
4. Flash memory does not lose its contents
during a reboot. 5. ROM contains the most
current and most complete version of the
IOS. 6. Flash contains boot system
commands to identify the location of the
IOS"
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not been 255.255.255.0. However, when the
activated. administrator issues the command show ip
route, the routing table does not show the
directly connected network. What is the
possible cause of the problem?
Process, Fast, Cisco Express Routers support three packet-forwarding
Forwarding mechanisms. These are
Which of the following 3 methods/types of
1, 3, 2005
NAT?
There is an activity and the port is In the Switch port LED status, if the LED is
sending or receiving data. blinking green what is the status of switch?
What command sequence will configure a
"router ospf 1 network 10.1.1.0
router to run OSPF and add network
0.0.0.255 area 0"
10.1.1.0 /24 to area 0?
Which command would you place on
ip nat outside
interface connected to the Internet?
When selecting the type of switch,
rack units should always be
Which of the following statement is
considered. Rack units is the
INCORRECT?
number ports available in the
network switch.
What route would have the lowest
A directly connected network
administrative distance?
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2.
2&4
Microsegmentation 3. Domain name
resolution 4. Path selection 5. Flow control"
Telnet DoS attack In this attack, the attacker exploits a flaw in
the Telnet server software running on the
switch that renders the Telnet service
unavailable. This sort of attack prevents an
administrator from remotely accessing
switch management functions. This can be
combined with other direct attacks on the
network as part of a coordinated attempt to
prevent the network administrator from
accessing core devices during the breach.
A switch populates the MAC
Which of the following statement is
address table based on destination
INCORRECT?
MAC addresses.
Refer to the exhibit. Which two statements
4, 6 are true about interVLAN routing in the
topology that is shown in the exhibit?
A network administrator in XYZ Telecom is
troubleshooting an EIGRP problem on a
router and needs to confirm the IP
addresses of the devices with which the
Router#showipeigrp neighbors router has established adjacency. The
retransmit interval and the queue counts for
the adjacent routers also need to be
checked. What command will display the
required information?
Which factor directly affects the time to
Size of the network
convergence?
OSPF routing uses the concept of areas.
2, 3, 2005 What are the three characteristics of OSPF
areas?
VLANs are based on logical
connections, instead of physical Which of the following describes a VLAN?
connections.
This layer is considered as the network
Core layer
backbone.
This is used to connect a PC to the console
Console cable
port of a switch for configuration.
2&4 "Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2.
802.1q 3. IGP 4. ISL 5. 802.3u"
VLAN is a switching technology that reduces
The correct answer is 'True'.
the size of a broadcast domain.
Refer to the exhibit. The two connected
ports on the switch are not turning orange or
2, 4, 2006 green. What would be the most effective
steps to troubleshoot this physical layer
problem?
A collection of interconnected switches
Broadcast domain
forms a _______________________.
22 SSH protocol by default uses Port ______.
Permit all packets matching the first
The following configuration line was added
three octets of the source address
to router R1
to all destinations
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs
15, 30, and 45, according to the show
There is an incorrect IP address running-config command output. PCs on
configured on GigabitEthernet VLAN 45 that are using the 172.16.45.0 /24
0/0.30 network are having trouble connecting to
PCs on VLAN 30 in the 172.16.30.0 /24
network. Which error is most likely causing
this problem?
If an address conflict is detected,
the address is removed from the Which statement is correct regarding the
pool and an administrator must operation of DHCP?
resolve the conflict.
The ________________ switches do not
Fixed configuration support features or options beyond those
that originally came with the switch.
Stackable that are arranged one on top of
Daisy Chain the other with cables linking the switches in
a _____________ connection.
10 What is the OSPF default frequency, in
seconds, at which a Cisco router sends hello
packets on a multiaccess network?
Router On Stick is a method used for
The correct answer is 'True'.
communicating inter-vlan using a router.
A type of VLAN that is configured to carry
Data VLAN
user-generated traffic.
The following are VLAN best practices
Join native VLAN to VLAN.
EXCEPT?
This is a protocol that is used to synchronize
Network Time Protocol the clocks of computer systems over packet-
switched, variable-latency data networks.
What is the command used to determine the
show ip interface brief status of both physical and virtual interfaces
including IP address?
The network administrator of ABC
Supermarket configures the router with the
S 172.16.1.0 [1/0] via 172.16.2.2 "ip route 172.16.1.0 255.255.255.0
172.16.2.2" command. How will this route
appear in the routing table?
Refer to the exhibit. The network engineer in
RMSIndustries that is shown wants to use
the primary ISP connection for all external
"ip route 0.0.0.0 0.0.0.0 s0/0/0 ip
connectivity. The backup ISP connection is
route 0.0.0.0 0.0.0.0 s0/1/0 10"
used only if the primary ISP connection fails.
Which set of commands would accomplish
this goal.
What is the status of the Port speed LED if
The port is operating at 100 Mbps.
the LED light is green?
If an error occurs while loading the operating
system because of missing or damaged
system files, the load loader can be access
Mode
through a console connection. What button
in the switch you need to press while
reconnecting the power cord?
ip address 192.168.10.2 What is the command to set the IP address
255.255.0.0 (192.168.10.2) and subnet mask
(255.255.0.0) for specific Fast Ethernet
interface?
Dividing Layer 1,2 and 3 networks
into multiple physical workgroups Which of the following is NOT a benefit of
reduces unnecessary traffic on the VLAN?
network and boosts performance.
Dynamic Trunking Protocol is Which of the following describes Dynamic
disable by default. Trunking Protocol?
A switch forwarding method that begins the
forwarding process after the destination
Cut-through switch method
MAC address of an incoming frame and the
egress port has been determined.
A network associate in Genesis Aerospace
2, 3, 2006 Industries has configured OSPF with the
command:
Which of the following would be good
1, 2 and 4
reasons to run NAT?
What is the command to create a VLAN with
Vlan 30
a valid VLAN ID number 30?
What is an advantage of OSPF compared to
Fast convergence
RIP?
Which command will create a dynamic pool
ip nat pool Todd 171.16.10.65
named Todd that will provide you with 30
171.16.10.94 net 255.255.255.224
global addresses?
If all OSPF routers in a single area are
the highest IP address among its configured with the same priority value, what
active interfaces value does a router use for the OSPF router
ID in the absence of a loopback interface?
They filter traffic based on source Which statement describes a characteristic
IP addresses only. of standard IPv4 ACLs?
There is activity and the port is In the Switch port LED status, if the LED is
sending or receiving data. blinking green what is the status of switch?
This layer provides intelligent switching,
Distribution layer routing, and network access policy functions
to access the rest of the network.
A type of VLAN that is defined in the IEEE
802.1Q specification to maintain backward
Native VLAN
compatibility with untagged traffic common
to legacy LAN scenarios.
A switch is configured with all ports assigned
to vlan 2 with full duplex FastEthernet to
An additional broadcast domain will
segment existing departmental traffic. What
be created.
is the effect of adding switch ports to a new
VLAN on the switch?
Which IPv4 address range covers all IP
172.16.2.0 to 172.16.3.255 addresses that match the ACL filter specified
by 172.16.2.0 with wildcard mask 0.0.1.255?
Refer to the exhibit. What information can be
Network 10.10.1.0 is reachable.
gathered from the output?
Which command would you place on
ip nat inside
interface on a private network?
between 1006 and 4094 The extended range of VLAN ID is
Which command will show you the summary
show ipnat statistics
of the NAT configuration?
A network administrator has examined the
routing table of a router and noted that the
The route source was learned
entry for the destination network
dynamically.
172.16.4.0/24 begins with the letter D. What
does this letter signify?
Which command would you place on
ipnat outside
interface connected to the Internet?
The FastEthernet 0/0 interface on Refer to the exhibit. Which statement are
Router1 must be configured with true about interVLAN routing in the topology
subinterfaces. that is shown in the exhibit?
What two functions describe uses of an
3&5
access control list?
The default VLAN for Cisco switches is
VLAN 1
____________________.
A(config)# ip route 192.168.4.0 Refer to the given network diagram. Which
255.255.255.0 192.168.3.2 command would be used on router A to
configure a static route to direct traffic from
LAN A that is destined for LAN C?
Which 3 series of commands will configure
router R1 for LAN-to-LAN communication
1, 4, 2006 with router R2? The enterprise network
address is 192.1.1.0/24 and the routing
protocol in use is RIP.
1&5 What are two benefits of using NAT?
None of the choices Which of the following describes a VLAN?
Which two link protocols are used to carry
2, 4
multiple VLANs over a single link?
This is a proprietary protocol that all Cisco
devices can be configured to use. This
Cisco Discovery Protocol checks other Cisco devices that are directly
connected, which allows the devices to auto-
configure their connection.
A network administrator is trying to add a
new router into an established OSPF
network. The networks attached to the new
The network wildcard mask is router do not appear in the routing tables of
configured improperly. the other OSPF routers. Given the
information in the partial configuration shown
below, what configuration error is causing
this problem?
Which IPv6 ACL command entry will permit
Permit tcp any host
traffic from any host to an SMTP server on
2001:DB8:10:10::100 eq 25
network 2001:DB8:10:10::/64?
The _____ switches typically come with
Modular configuration different sized chassis that allow for the
installation of different numbers of line card.
"ip route 0.0.0.0 0.0.0.0 s0/0/0 ip Refer to the exhibit below. The network
route 0.0.0.0 0.0.0.0 s0/1/0 10" engineer for the company that is shown
wants to use the primary ISP connection for
all external connectivity. The backup ISP
connection is used only if the primary ISP
connection fails. Which set of commands
would accomplish this goal?
Which two parameters are used by EIGRP
2, 5 as metrics to select the best path to reach a
network?
"Which two statements are true for OSPF
Hello packets? 1. They are used to
negotiate correct parameters among
neighboring interfaces. 2. They are used to
2&4 maintain neighbor relationships. 3. They are
used to determine the complete network
topology. 4. They are used for dynamic
neighbor discovery. 5. They are used to
flood link-state information to all neighbors."
What type of DHCP attack where in an
attacker configures a fake DHCP server on
the network to issue DHCP addresses to
clients. The normal reason for this attack is
to force the clients to use false Domain
DHCP spoofing attack
Name System (DNS) or Windows Internet
Naming Service (WINS) servers and to
make the clients use the attacker, or a
machine under the control of the attacker, as
their default gateway.
You can configure one access list, Which statement about access lists that are
per direction, per layer 3 protocol applied to an interface is true?
Sometimes switch ports must manually have
their duplex mode manually configured. This
Full duplex mode duplex mode increases effective bandwidth
by allowing both ends of a connection to
transmit and receive data simultaneously.
Which of the following describes Dynamic
All of the choices
Trunking Protocol?
Administrative distance Which parameter would you tune to affect
the selection of a static route as a backup,
when a dynamic protocol is also being
used?
Which command would you place on
ipnat inside
interface on a private network?
Global configuration mode is used to
configure system globally, or to enter
specific configuration modes to configure
configure terminal
specific elements such as protocols. What is
the command to enter global configuration
mode?
Which command will show you all the
show ip nat translations
translations active on your router?
When a DHCP server is configured, which
3&6 two IP addresses should never be
assignable to hosts?
When a DHCP server is configured, which
4&6 two IP addresses should never be
assignable to hosts?
"Which three elements must be used when
you configure a router interface for VLAN
trunking? 1. one physical interface for each
subinterface 2. one IP network or
subnetwork for each subinterface 3. a
2, 4, 2005
management domain for each subinterface
4. subinterface encapsulation identifiers that
match VLAN tags 5. one subinterface per
VLAN 6. subinterface numbering that
matches VLAN tags"
The AJ company has a small network. The
network consists of one switch and one
router. The switch has been configured with
two VLANs. The router has been configured
two as a router-on- a-stick to allow inter-VLAN
routing. A trunk is configured to connect the
switch to the router. Whatis the minimum
number of router subinterfaces that are
required for all the VLANs to communicate?
This memory stores router bootup
ROM
instructions and basic diagnostic software.
The OSPF Hello protocol performs which of
1&3
the following 2 tasks?
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs
15, 30, and 45, according to the show
There is an incorrect IP address running-config command output. PCs on
configured on GigabitEthernet VLAN 45 that are using the 172.16.45.0 /24
0/0.30.* network are having trouble connecting to
PCs on VLAN 30 in the 172.16.30.0 /24
network. Which error is most likely causing
this problem?
"True of False. Ingress is used to describe
The correct answer is 'False'. frames leaving the device through a
particular port."
Which command is used to display the
show ip ospf database
collection of OSPF link states?
Which two statements about static NAT
1&2
translations are true?
"The primary functions of a router are the
following? 1. Packet switching 2. Flow
1&4
control 3. Domain name resolution 4. Path
selection 5. Microsegmentation"
"Which two features are characteristics of
flash memory? 1. Flash receives a copy of
the IOS from RAM when a device is
powered on. 2. Flash provides nonvolatile
2&3 storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers. 5.
The contents of flash may be lost during a
power cycle."
4&5 "Which two statements correctly describe
the concepts of administrative distance and
metric? (Choose two.) 1. The metric varies
depending which Layer 3 protocol is being
routed, such as IP. 2. A router first installs
routes with higher administrative distances.
3. The value of the administrative distance
can not be altered by the network
administrator. 4. Routes with the smallest
metric to a destination indicate the best path.
5. Administrative distance refers to the
trustworthiness of a particular route. 6. The
metric is always determined based on hop
count."
This type of attack takes advantage of the
way that hardware on most switches
operates. Most switches perform only one
Double Tagging Attack
level of 802.1Q de- encapsulation, which
allows an attacker to embed a hidden
802.1Q tag inside the frame.
Which command will show you the summary
show ip nat statistics
of the NAT configuration?
As a network administrator of RMS
Aerospace Industries, you have been
instructed to prevent all traffic originating on
ip access-group 101 in
the LAN from entering the R2 router. Which
the following command would implement the
access list on the interface of the R2 router?
Which three features are of OSPF routing
1, 3, 2005
protocol?
"Which two link protocols are used to carry
2&4 multiple VLANs over a single link? 1. VTP 2.
802.1q 3. IGP 4. ISL 5. 802.3u"
DHCP starvation attack What type of DHCP attack where in an
attacker floods the DHCP server with DHCP
requests to use all the available IP
addresses that the DHCP server can issue.
After these IP addresses are issued, the
server cannot issue any more addresses,
and this situation produces a denial-of-
service (DoS) attackas new clients cannot
obtain network access.
What is the default number of equal-cost
4 paths that can be placed into the routing of a
Cisco OSPF router?
Which classless routing protocol supports
VLSM and CIDR, bounded and triggered
EIGRP
updates, and uses the multicast address of
224.0.0.10?
Routers support a variety of
What is one feature that distinguishes
interface types. Switches typically
routers from Layer 2 switches?
support Ethernet interfaces.
Refer to the exhibit. The network
administrator that has the IP address of
10.0.70.23/25 needs to have access to the
corporate FTP server (10.0.54.5/28). The
FTP server is also a web server that is
3&5 accessible to all internal employees on
networks within the 10.x.x.x address. No
other traffic should be allowed to this server.
Which extended ACL would be used to filter
this traffic, and how would this ACL be
applied?
to provide an IP configuration
What is the purpose of the DHCP server?
information to hosts
Which two link protocols are used to carry
802.1q & ISL
multiple VLANs over a single link?
Why would a floating static route be
configured with an administrative distance
To be used as a backup route that is higher than the administrative
distance of a dynamic routing protocol that is
running on the same router?
1, 4 There are two advantages of static routing
over dynamic routing among these choices.
What are these?
Refer to the exhibit. The network engineer
for the company that is shown wants to use
the primary ISP connection for all external
"ip route 0.0.0.0 0.0.0.0 s0/0/0 ip
connectivity. The backup ISP connection is
route 0.0.0.0 0.0.0.0 s0/1/0 10"
used only if the primary ISP connection fails.
Which set of commands would accomplish
this goal.
"Which two network parameters are used by
EIGRP as metrics to select the best path to
2&5 reach a network? 1. Jitter 2. bandwidth 3.
resiliency 4. hop count 5. delay 6.
confidentiality"
VLAN IDs 1002 through 1005 are reserved
All of the Choices
for
In troubleshooting VLANs, what command
show vlan should be used to check whether the port
belongs to the expected VLAN?
Which of the following are 3 disadvantages
1, 3, 2005
of using NAT?
This is the practice of inserting a VLAN ID
into a packet header in order to identify
VLAN tagging
which VLAN (Virtual Local Area Network)
the packet belongs to.
The following are switch port modes that
Remote
DTP offers EXCEPT
If your routing table has a static, a RIP, and
an OSPF route to the same network, which
Static route
route will be used to route packets by
default?
Which of the following is an element of
All of the choices
converged network?
The route source was learned A network administrator of Stark Industries
dynamically. has examined the routing table of a router
and noted that the entry for the destination
network 172.16.4.0/24 begins with the letter
D. What does this letter signify?
"Which three elements must be used when
you configure a router interface for VLAN
trunking? 1. one physical interface for each
subinterface 2. one IP network or
subnetwork for each subinterface 3. a
2, 4, 2005
management domain for each subinterface
4. subinterface encapsulation identifiers that
match VLAN tags 5. one subinterface per
VLAN 6. subinterface numbering that
matches VLAN tags"
What happens to a static route entry in a
The Static route is removed from routing table when the outgoing interface
the routing table. associated with that route goes into a down
state?
Which command is used to display the
show ipospf database
collection of OSPF link states?
The primary function of this layer is to
Access layer
provide network access to the user.
A router has two FastEthernet interfaces and
needs to connect to four vlans in the local
Implement a router-on-a-stick
network. How can you accomplish this task,
configuration.
using the fewest physical interfaces and
without decreasing network performance?
This attack tries to crack a password on
another device. The first phase of this attack
starts with the attacker using a list of
Brute force password attack
common passwords and a program
designed to try to establish a Telnet session
using each word on the dictionary list.
RIPv2 is misconfigured on router Refer to the exhibit. All hosts and router
R2. interfaces are configured correctly. Pings to
the server from both H1 and H2 and pings
between H1 and H2 are not successful.
What is causing this problem?
Which 2 commands are required to properly
1&4 configure a router to run OSPF and to add
network 192.168.16.0/24 to OSPF area 0?
Which protocols are used to configure
802.1q
trunking on a switch?
Do not use the dynamic auto or What is the best practice relative to switch
dynamic desirable. port modes?
If a router has two interfaces and is routing
8 both IPv4 and IPv6 traffic, how many ACLs
could be created and applied to it?
access-list 50 deny 192.168.1.1
Which item represents the standard IP ACL?
0.0.0.255
Native VLAN Which is the VLAN not tagged by 802.1q?
Which parameter or parameters are used to
Bandwidth
calculate OSPF cost in Cisco routers?
As a network administrator, you have been
instructed to prevent all traffic originating on
ip access-group 101 in the LAN from entering the R2 router. Which
the following command would implement the
access list on the interface of the R2 router?
Refer to the exhibit. If the router Cisco
returns the given output and has not had its
2.2.2.2
router ID set manually, what value will OSPF
use as its router ID?
A network administrator needs to configure a
standard ACL so that only the workstation of
the administrator with the IP address
1&2 192.168.15.23 can access the virtual
terminal of the main router. Which two
configuration commands can achieve the
task?
What is the status of the Port speed LED if
The port is operating at 1000 Mbps.
the LED light is blinking green?
Load balancing allows a router to Which statement describe a characteristicof
forward packets over multiple paths
load balancing?
to the same destination network.
a measure of the trustworthiness of
What does administrative distance refer to?
a routing information source .
This layer provide fault isolation and high-
Core layer
speed backbone onnectivity.
R1 is configured with the default
configuration of OSPF. From the following
192.168.0.1 list of IP addresses configured on R1, which
address will the OSPF process select as the
router ID?
Which 3 statements describe the routing
1, 3, 2005
protocol OSPF?
If an address conflict is detected,
the address is removed from the Which statement is correct regarding the
pool and will not be reused until the operation of DHCP?
server is rebooted.
Refer to the exhibit. Which rule does the
The address is removed from the
DHCP server use when there is an IP
pool until the conflict is resolved.
address conflict?

You might also like