The IEEE develops wired and wireless LAN and MAN networking standards. Protocols provide communication rules for specific types of exchanges. When a collision occurs on a bus network, all devices stop transmitting and try again later.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
188 views50 pages
Data Communications and Networking 1 and 2
The IEEE develops wired and wireless LAN and MAN networking standards. Protocols provide communication rules for specific types of exchanges. When a collision occurs on a bus network, all devices stop transmitting and try again later.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50
Which organization develops the 802
IEEE family of standard for wired and wireless
LANs and MANs? Which statement describes a They vary depending on protocols characteristic of the frame header fields of the data link layer? Which organization develops the 802 IEEE family of standard for wired and wireless LANs and MANs? providing the rules required for a What is the purpose of protocols in data specific type of communication to occur communications? All devices stop transmitting and try What happens when a data collision again later. occurs on an bus? A client is downloading a large file from The FTP client responds to the server a server using FTP. Many of the with a smaller window size in the TCP segments are lost during transit. What header. will most likely happen? it can rapidly adapt to the failure of network devices and communication For which three reasons was a packet links, Data packets can travel through switched connectionless data the network using multiple different communications technology used when paths, Network devices dynamically developing the Internet (Choose three.) decide on the best available path to forward each packet. Which of the following TCP/IP exist at TCP, UDP the of the TCP/IP reference model? (Choose two.) Which device acts as gateway to allow local router hosts to send traffic to remote IP networks? The host portion of the IP addresses will What happens when two devices on the be different same subnet are communicating? Which organization is responsible for The Telecommunications Industry developing communications standards Association (TIA) for Voice over IP (VoIP) devices? A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to to test if the workstation can ping the IP address of the default communicate on the network gateway that is configured on the workstation. What is the purpose for this command? What is encrypted with the enable the privileged executive mode password secret command? Which is a function of the Logical Link to identify which protocol is being used Control (LLC) sublayer? Which logical address is used for destination IP address delivery of data to a remote network? What type of protocol describes communication over a data link and the Network access protocol physical transmission of data on the network media? to add a password to a Cisco network Why would a network administrator use device the CLI of the Cisco IOS? providing a richer e-learning What are two benefits of collaboration environment, providing better social and video-on-demand applications? media opportunities (Choose two.) What is the purpose of the physical link to establish the media link control field in a data link layer header? Which device performs the function of router determining the path that messages should take through internet works? "To save time, IOS commands may be Tab partially entered and then completed by typing which key or key combination?" "Which statement is true about an "- A link-local IPv6 address is interface that is configured with the IPv6 automatically" address command?" "(config) # service password-encryption" "What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?" "Which action is performed by a client "The client sends a synchronization when establishing communication with a segment to begin the session" server via the use of UDP at the ?" "What is initially entered at the CLI of Command the Cisco IOS when typing a command sequence?" A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains user EXEC mode an enable secret password but no console password. When the router boots up, which mode will display? UDP reassembles that data in the order What does UDP do when receiving it was received and passes it to the messages that are more than one application. datagram in length? "A network administrator notices that the default gateway devices sends an "To notify the workstation, that another ICMP Redirect message to the router on the same network, is the workstation when the workstation tries better default-gateway to reach the to connect to file server on another remote server" network. What is the purpose for this ICMP message?" "They define how messages are "Which statement is correct about exchanged between the sources and network ?" the destination" Which two engineering organizations International Telecommunication Union define open standards and protocols (ITU) that apply to the data link layer? "Products from different manufacturers "What is and advantage of using can interoperate successfully" standards to develop and implement ?" "Which type of network design "a converged network" combines voice, video, and data on the same communication channel?" flash "During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?" "What are the primary requirements of Confidentiality, Integrity, Availability information security? (Choose three.)" "Products from different manufacturers "What is an advantage of using can interoperate successfully" standards to develop and implement ?" Which two message timing mechanisms response timeout, flow control are used in data communication? (Choose two.) "The network provides predictable "Which statement describes a network levels of service to different types of that supports QoS?" traffic" At which layers of does function? Data link, Physical (Choose two.) "Which device acts as gateway to allow "local router" hosts to send traffic to remote IP networks?" What three do email users and servers SMTP, IMAP4, POP3 use to process email? (Choose three.) "Which interface command must be entered in a Layer 3 switch before IPv4 "no switchport" address can be assigned to the interface?" "Which two statements are true of the "The throughput is predictable, Devices deterministic access method?(Choose take turns transmitting" two.)" virtualization "A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation?" They define how messages are Which statement is correct about exchanged between the source and the network protocols? destination. "Public IP addresses must be unique "Which statement accurately describes across the entire Internet" public IP addresses?" What method can be used by two computers to ensure that packets are flow control not dropped because too much data is being sent too quickly? In fiber optic meda, the signals are light represented as patterns of "Which message timing factor impacts "Flow control" how much information can be sent and the speed at which it can be delivered?" Which statement is correct about network ? "What method can be used by two computers to ensure that packets are flow control not dropped because too much data is being sent too quickly?" to add a password to a Cisco network Why would a network administrator use device the CLI of the Cisco IOS? "when the end-user device will run an "When is a wired connection preffered application that requires a dedicated to a wireless connection by an end-user connection to the network" device?" "Which term defines the processing capabilities of a switch by rating how "forwarding rate" much data can be processed per second?" "providing a richer e-learning "What are two benefits of collaboration environment, providing better social and video-on-demand applications? media opportunities" (Choose two.)" "providing the rules required for a "What is the purpose of in data specific type of communication to occur" communications?" "A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains user EXEC mode an enable secret password but no console password. When the router boots up, which mode will display?" Which logical address is used for destination IP address delivery of data to a remote network? "They originate the data that flows through the network., They are the What are two functions of end devices interface between humans and the on a network? (Choose two.) communication network." "A network that can reroute traffic in "What is a fault-tolerant network?" case of device failure" Which message delivery option is used broadcast when all devices need to receive the same message simultaneously? "Which technology would be best to DSL provide a home user with a highspeed, always-on Internet connection?" "Which three fields are used in a UDP "Length, Source Port, Checksum" segment header? (Choose three.)" to identify which network layer protocol Which is a function of the Logical Link is being used Control (LLC) sublayer? What is an advantage of using Products from different manufacturers standards to develop and implement can interoperate successfully protocols? What is encrypted with the enable the privileged executive mode password secret command? "Which two components are added to "Trailer, frame header" the PDU at the network access layer? (Choose two.)" Connectionless What is a characteristic of UDP? "Which command or key combination allows a user to return to the previous level in the command hierarchy?" "When the command “Switch(config)# hostname EaSt2+56” is entered in a EaSt-2+56(config)# Cisco IOS device using the CLI, what will be returned in the CLI?" "Which statement describes a "They vary depending on" characteristic of the frame header fields of the data link layer?" is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only Intranet by the members and employees of the organization, or others with authorization. Segment "What is the PDU?" "What is a characteristic of a contention- "It is as nondeterministic method" based access method?" The farther you are from the central slower office when utilizing a DSL connection, the "The host portion of the IP addresses "What happens when two devices on will be different" the same subnet are communicating?" "Where is the configuration used during "Startup config" startup on Cisco IOS devices located?" "providing end devices with a unique network identifier, directing data "What are two functions that are packets to destination hosts on other provided by the ? (Choose two.)" networks" What process is used to place one message inside another message for encapsulation transfer from the source to the destination? broadcast "Which message delivery option is used when all devices need to receive the same message simultaneously?" Which type of network design combines a converged network voice, video, and data on the same communication channel? What will a network administrator use to IOS modify a configuration on a Cisco router? "Which type of traffic must receive the VoIP highest priority from QoS?" "to keep track of multiple conversations "What is the purpose of using a source between devices" port number in a TCP communication?" "The operating system for the Cisco "What is the Cisco IOS?" network device" "a farm in rural area without wired "In which scenario would the use of a broadband access" WISP be recommended" "an address that reaches a specific "What type of address is 01-00-5E-0A- group of hosts" 00-02?" "A company is contemplating whether to use a client/server or a peer-to-peer "easy to create, lacks centralized network. What are three characteristics administration, less cost to implement" of a peer-to-peer network? (Choose three.)" "A technician configures a switch with SVI these commands:" "Why would a technician enter the "to copy an existing configuration into command copy startup-config running RAM" config?" "Which of the following are "No centralized administration, disadvantages of peer-to-peer Scalability" networking? (Choose two.)" "Which two files are loaded into RAM by "startup configuration, IOS image" the router when it boots? (Choose two.)" What is the function of the kernel of an operating software? "It is responsible for Media Access "Which two functions or operations are Control, it adds a header and trailer to performed by the MAC sublayer? form an OSI Layer 2 PDU" (Choose two.)" "Nothing must be done. Changes to the "An administrator has just changed the configuration on an IOS device take IP address of an interface on an IOS effect as soon as the command is typed device. What else must be done in correctly and the Enter key has been order to apply those changes to the pressed." device?" "A network where voice, video, and data "What is a converged network?" move over the same infrastructure" "A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the HTTP, TCP, IP, correct order of the protocol stack that is used to prepare the request for transmission?" What are the parts of an IPv4 address? Host, Network (Choose two.) "Which procedure is used to access a "Use the console port to locally access Cisco 2960 switch when performing an the switch from a serial or USB initial configuration in a secure interface of the PC." environment?" "Which term describes the state of a network when the demand on the congestion network resources exceeds the available capacity?" Which address is a multicast MAC 01-00-5E-00-00-C8 address? "What is a group of web pages that Wiki groups of individuals can edit and view together called?" "The MTU is passed to the by the data "How does the use the MTU value?" link layer" ROM "During troubleshooting procedures, from which location will most Cisco routers load a limited IOS" Which field in an frame is used for error Frame Check Sequence detection? What type of communication will send a broadcast message to all devices on a local area network? Which standard specifies the MAC IEEE 802.3 sublayer functionality in a computer NIC? They define how messages are Which statement is correct about exchanged between the sources and network protocols? the destination "What three functions are defined by "data encoding, message size, delivery network to allow communication options" between known source and destination IP addresses? (Choose three.)" Which interface command must be entered in a Layer 3 switch before IPv4 no switchport address can be assigned to the interface? "Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your 128 service provider. With this prefix, how many bits are available for your organization to create subnetworks?" "UDP communication requires less "What is an advantage of UDP over overhead" TCP?" "the distance the selected medium can "What two criteria are used to help successfully carry a signal, the select a network medium from various environment where the selected network media? (Choose two.)" medium is to be installed" "Which type of IPv6 address is not "link-local address" routable and used for communication on a single subnet?" a router "Which device performs the function of determining the path that messages should take through internet works?" "Which TCP/IP model layer is Internet responsible for providing the best path through the network?" The TCP/IP effectively consists of which Application, presentation, session three OSI layers? What three functions are defined by network protocols to allow data encoding, message size, delivery communication between known source options and destination IP addresses? (Choose three.) "Which two connection options provide an always-on, high-bandwidth Internet DSL, cable connection to computers in a home office? (Choose two.)" Nothing must be done. Changes to the An administrator has just changed the configuration on an IOS device take IP address of an interface on an IOS effect as soon as the command is typed device. What else must be done in correctly and the Enter key has been order to apply those changes to the pressed. device? "What process is used to place one message inside another message for encapsulation transfer from the source to the destination?" "The branch sites are connected to a "What is a characteristic of a WAN hub- central site through point-point links" and-spoke topology?" Which application use UDP as the SMTP protocol? "Which PDU is processed when a host computer is de-encapsulating a message at the of the TCP/IP model?" "This is the default mode on an "Which two statements are true unconfigured router when first powered regarding the user EXEC mode? up., Only some aspects of the router (Choose two.)" configuration can be viewed" it can rapidly adapt to the failure of network devices and communication For which three reasons was a packet links, Data packets can travel through switched connectionless data the network using multiple different communications technology used when paths, Network devices dynamically developing the Internet (Choose three.) decide on the best available path to forward each packet. Which statement describes a feature of It does not allow spaces an IOS host name configuration? What is a characteristic of a contention- It is as nondeterministic method based access method? "Which devices would be considered "Printer, IP phone, Server, Tablet end devices on a network? (Choose computer" four.)" sublayer is responsible for mac communicating directly with the physical layer. "A network administrator needs to keep the user ID, password, and session contents private when establishing SSH remote CLI connectivity with a switch to manage it. Which access method should be chosen?" "Which of the following elements do both human and computer Source, Channel, Receiver communication systems have in common? (Choose three.)" "how connection between nodes "Which two factors influence the method appears to the data link layer, how that is used for media access control? nodes share the media" (Choose two.)" What is assigned by the to identify an Port application or service? "the original source port number that "When a client connects to an HTTP was randomly generated by the client" server by the use of a randomly generated source port number, what destination port number will the HTTP server use when building a response?" "A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?" "Which number or set of numbers 192.168.1.1:80 represents a socket?" "What type of delivery uses data link "local delivery" layer addresses?" "What organization is responsible for IAB the overall management and development of Internet standards?" What is an advantage that UDP has Low overhead over TCP? "Intermediary devices direct the path of Which two statements describe the data., Intermediary devices connect intermediary devices? (Choose two.) individual hosts to the network." network is able to expand to accept new Scalable devices and applications without affecting performance. "Which statement is true about an "A link-local IPv6 address is interface that is configured with the IPv6 automatically" address command?" A network administrator needs to keep the user ID, password, and session contents private when establishing SSH remote CLI connectivity with a switch to manage it. Which access method should be chosen? "Which statement describes a feature of "It does not allow spaces" an IOS host name configuration?" "What happens to frames that are too "They are dropped." long or too short for the channel used?" A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the HTTP, TCP, IP, Ethernet correct order of the protocol stack that is used to prepare the request for transmission? "What name is given to a group of "Protocol suite" interrelated necessary to perform a communication function?" "Which of the following are examples of "AppleTalk, Novell NetWare" proprietary ? (Choose two.)" Which two components are added to Trailer, frame header the PDU at the network access layer? (Choose two.) This is the default mode on an Which two statements are true unconfigured router when first powered regarding the user EXEC mode? up., Only some aspects of the router (Choose two.) configuration can be viewed Intermediary devices direct the path of Which two statements describe the data., Intermediary devices connect intermediary devices? (Choose two.) individual hosts to the network. What command will prevent all (config) # service password-encryption unencrypted passwords from displaying in plain text in a configuration file? a web page that groups of people can What is a wiki? edit and review The network provides predictable levels Which statement describes a network of service to different types of traffic that supports QoS? Why would a technician enter the to copy an existing configuration into command copy startup-config running RAM config? spyware During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer "A network administer has forgotten the argument of an IOS command. How "Type the command and then press would the administrator get help from the? key" the IOS CLI to complete the command correctly?" "When a client connects to an HTTP server by the use of a randomly "the original source port number that generated source port number, what was randomly generated by the client" destination port number will the HTTP server use when building a response?" What type of delivery uses data link local delivery layer addresses? "Which two Internet connection options , do not require that physical cables be run to the building? (Choose two.)" Which TCP header field specifies the number of bytes that can be accepted Window size before an acknowledgement is required? Which two Internet connection options cellular, satellite do not require that physical cables be run to the building? (Choose two.) how connection between nodes Which two factors influence the method appears to the data link layer, how that is used for media access control? nodes share the media (Choose two.) An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of latency time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain "What happens if part of an FTP "The part of the FTP message that was message is not delivered to the lost is re-sent" destination?" "Which two message timing "response timeout, flow control" mechanisms are used in data communication? (Choose two.)" "What is the primary defense against a VTY password unauthorized remote access to network devices?" Which PDU is processed when a host computer is de-encapsulating a segment message at the transport layer of the TCP/IP model? "What is the name given to a one-to- Multicast many message delivery option?" Which procedure is used to access a Use the console port to locally access Cisco 2960 switch when performing an the switch from a serial or USB initial configuration in a secure interface of the PC. environment? "Which destination address is used in FFFF.FFFF.FFFF an ARP request frame?" Which area of the network would a college IT staff most likely have to redesign as a direct result of many wireless LAN students bringing their own tablets and smartphones to school to access school resources? "Which command or key combination exit allows a user to return to the previous level in the command hierarchy?" an intranet "An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?" "During a routine inspection, a technician discovered that software that was installed on a computer was spyware secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer" A technician configures a switch with SVI these commands: "What type of connection to a Cisco IOS "Console port" switch is used to make the initial configuration?" "Which entities are involved in a applications temporary communication that is established by the ?" Which address is used as a destination FF-FF-FF-FF-FF-FF address on a broadcast frame? "Which of the following OSI model layers have the same functionality as "Physical, Data link" the network access layer in the TCP/IP model? (Choose two.)" What are the primary functions Frame delimiting, Addressing, Error associated with data encapsulation at detection the MAC sublayer? (Choose three.) an address that reaches a specific What type of address is 01-00-5E-0A- group of hosts 00-02? Which command or key combination exit allows a user to return to the previous level in the command hierarchy? "Directed broadcasts are intended for all "Which two statement describe hosts on a local or remote network, broadcast transmissions on a wired Limited broadcasts are only intended for network? (Choose two.)" the hosts on a local network" "What type of communication will send broadcast a message to all devices on a local area network?" when the end-user device will run an When is a wired connection preffered to application that requires a dedicated a wireless connection by an end-user connection to the network device? "Which of the following are business- class Internet connection technologies "Leased lines, Metro" normally supplied by a service provider? (Choose two.)" "What is the command netstat –r used "to display the host routing table" for?" An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to an intranet access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? "Which entities are involve in a applications temporary communication that is established by the ?" "When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 "Flow Label" header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?" "Which area of the network would a college IT staff most likely have to redesign as a direct result of many wireless LAN students bringing their own tablets and smartphones to school to access school resources?" "What is the purpose of the physical link "to establish the media link" control field in a data link layer header?" Which term describes the state of a network when the demand on the congestion network resources exceeds the available capacity? The branch sites are connected to a What is a characteristic of a WAN hub- central site through point-point links and-spoke topology? "Which action is performed by a client "The client sends a synchronization when establishing communication with a segment to begin the session" server via the use of UDP at the ?" "A technician configures a switch with SVI these commands:" "A user is unable to access the company server from a computer. On issuing the ipconfig command, the user experimental finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?" "it can rapidly adapt to the failure of network devices and communication "For which three reasons was a packet links, Data packets can travel through switched connectionless data the network using multiple different communications technology used when paths, Network devices dynamically developing the Internet (Choose three.)" decide on the best available path to forward each packet" "What command will display a list of "Switch# show?" keywords available for viewing the status of an IOS switch?" "Which OSI reference model layer is responsible for common representation Presentation of the data transferred between services?" Type the command and then press the? A network administer has forgotten the key argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly? What is the minimum and maximum 64 bytes – 1518 bytes frame size as defined by IEEE 802.3? "a farm in a rural area without wired "In which scenario would the use of a broadband access" WISP be recommended?" "What type of information would be "IP addressing scheme" found on a logical topology diagram?" address is defined as a reserved loopback address that routes packets back to the host "Which value, that is contained in an Time-to-Live IPv4 header field, is decremented by each router that receives a packet?" "a web page that groups of people can What is a wiki? edit and review" the distance the selected medium can What two criteria are used to help select successfully carry a signal, the a network medium from various network environment where the selected media? (Choose two.) medium is to be installed The kernel provisions hardware What is the function of the kernel of an resources to meet software operating software? requirements. A company is contemplating whether to use a client/server or a peer-to-peer easy to create, lacks centralized network. What are three characteristics administration, less cost to implement of a peer-to-peer network? (Choose three.) Which two connection options provide an always-on, high-bandwidth Internet DSL, cable connection to computers in a home office? (Choose two.) a farm in a rural area without wired In which scenario would the use of a broadband access WISP be recommended? The first 6 hexadecimal digits of a MAC address represent the OUI., The vendor is responsible for assigning the last 24 What is true about the MAC address? bits of the MAC address., The MAC (Choose three.) address is also known as a burned-in address. "During a routine inspection, a technician discovered that software that was installed on a computer was spyware secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?" To save time, IOS commands may be Tab partially entered and then completed by typing which key or key combination? "Which feature on a Cisco router "gateway of last resort" permits the forwarding of traffic for which there is no specific route?" What is the name given to the MAC Frame sublayer PDU? "This is the default mode on an "Which two statements are true unconfigured router when first powered regarding the user EXEC mode? up, Only some aspects of the router (Choose two.)" configuration can be viewed" Which two statements are true of the The throughput is predictable, Devices deterministic access method?(Choose take turns transmitting two.) "Which statement is correct about network ?" "What will a network administrator use IOS to modify a configuration on a Cisco router?" "a web page that groups of people can "What is a wiki?" edit and review" They originate the data that flows through the network., They are the What are two functions of end devices interface between humans and the on a network? (Choose two.) communication network. What range of ports can either be used by TCP or UDP to identify the requested 1024 to 49151 service on the destination device or as a client source port? "Which protocol allows users on one FTP network to reliably transfer files to and from a host on another network?" "Through the CLI using a terminal "How is the Cisco IOS generally emulator" accessed and navigated?" A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server virtualization without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation? "The default gateway address is used to "Within a production network, what is forward packets originating from the the purpose of a switch with a default switch to remote networks." gateway address?" "Which organization is responsible for IEEE the standard that defines Media Access Control for wired ?"
PAT Address Translation is also termed
NAT Overload what? 4&5 "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." What are the two main types of access 1 and 3 control lists (ACLs)? Addresses are allocated after a negotiation between the server and How does a DHCP server dynamically the host to determine the length of assign IP address to host? the agreement. Why would a floating static route be configured with an administrative distance To be used as a backup route that is highierthan the administrative distance of a dynamic routing protocol that is running on the same router? Which of the following is NOT a feature of a None of the choices Switched Network Which command is used to configure an IPv6 address on a router interface so that ipv6 address ipv6-address/prefix- the router will combine a manually specified length eui-64 network prefix with an automatically generated interface identifier? What are the 3 layers of the distribution Access, distribution and Core layer access? 2, 3, 2005 "OSPF routing uses the concept of areas. What are the characteristics of OSPF areas? 1. Each OSPF area requires a loopback interface to be configured. 2. Areas may be assigned any number from 0 to 65535. 3. Area 0 is called the backbone area. 4. Hierarchical OSPF networks do not require multiple areas. 5. Multiple OSPF areas must connect to area 0. 6. Single area OSPF networks must be configured in area 1." Which two statements describe a routed 2, 4 switch port on a multilayer switch? The network segments that share the same Collision domain bandwidth between devices. Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the following commands are 2&3 required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? The OSPF Hello protocol performs which of 1&3 the following tasks? Assign and renew IP address from Which task does the Dynamic Host the default pool. Configuration Protocol perform? Relays a DHCP request across The ip helper-address command does what? networks A measure of the trustworthiness of What does administrative distance refer to? a routing information source. A switch forwarding method that makes a forwarding decision on a frame after it has Store-and-forward switching received the entire frame and then checked the frame for errors. Which of the following is NOT a All of the choices characteristics of a network? Which of the following is the command to Ip domain-name mycompany.com configure the IP domain name of the network (mycompany.com) Which three statements describe the routing 1, 3, 2005 protocol OSPF? Which protocolis used to configure trunking 802.1q on a switch? What is the command to assign the port to a switchport access vlanvlan-id particular VLAN when the interface is in access mode? Which command is used to determine if an Show ip interface IP access list is enabled on a particular interface? Which of the following is NOT an element of None of the choices converged network? Which command will allow you to see real- debug ip nat time translations on your router? What is the command to set the IP address ip address 192.168.10.2 (192.168.10.2) and subnet mask 255.255.0.0 (255.255.0.0) for specific Fast Ethernet interface? "There are two advantages of static routing over dynamic routing among these choices. What are these? 1. Static routing is more secure because it does not advertise over the network. 2. Static routing scales well with 1&4 expanding networks. 3. Static routing requires very little knowledge of the network for correct implementation. 4. Static routing uses fewer router resources than dynamic routing 5. Static routing is relatively easy to configure for large networks." Refer to the exhibit. A junior network engineer in one of the biggest telecom company in the Philippines has prepared the 2&5 exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1? Configure a static default route In reference with the network diagram of from R1 to Edge, a default route RMS Defence Industries. What routing solution will allow both PC A and PC B to from Edge to the Internet, and a access the Internet with the minimum static route from Edge to R1. amount of router CPU and network bandwidth utilization? To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, show interfaces trunk what command to be used to check whether the local and peer native VLANs match? A network engineer for a semiconductor company wants to use the primary ISP connection for all external connectivity. "ip route 0.0.0.0 0.0.0.0 s0/0/0 ip Refer at the diagram below. The backup ISP route 0.0.0.0 0.0.0.0 s0/1/0 10" connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal? Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial no shutdown interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? If your routing table has a static, a RIP, and an IGRP route to the same network, which Static route route will be used to route packets by default? Which two commands are required to properly configure a router to run OSPF and 1&4 to add network 192.168.16.0/24 to OSPF area 0? Refer to the exhibit. The user at Workstation The gateway for Server A is not on B reports that Server A cannot be reached. the same subnet. What is preventing Workstation B from reaching Server A? physical topology This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables. Which three statements are generally 3, 4, 2005 considered to be best practices in the placement of ACLs? OSPF is configured using default classful addressing. With all routers and interfaces 4 operational, how many networks will be in the routing table of R1 that are indicated to be learned by OSPF? Which statement are generally considered to Place standard ACLs close to the be best practices in the placement of ACLs? destination IP address of the traffic. (Choose three.) Which commands are required to properly 1&4 configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? 23 Telnet protocol by default uses Port ______. Which parameter can be tuned to affect the Administrative distance selection of a static route as a backup when a dynamic protocol is also being used? Network infrastructure devices require IP addresses to enable remote management. None in the choices Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT ip route 209.165.200.228 What is the correct syntax of a floating static 255.255.255.248 10.0.0.1 120 route? Which command will show you all the show ipnat translations translations active on your router? VLANis a switching technology that reduces The correct answer is 'True'. the size of a broadcast domain. ip route 209.165.200.228 What is the correct syntax of a floating static 255.255.255.248 10.0.0.1 135 route? 110 What is the default administrative distance of the OSPF routing protocol? Which of the following would be a good Check your interfaces for the starting point for troubleshooting if your correct configuration. router is not translating? Why would a floating static route be configured with an administrative distance To be used as a backup route that is highier than the administrative distance of a dynamic routing protocol that is running on the same router? Refer to the exhibit. Which two statements 2&3 are true about the loopback address that is configured on RouterB? This is used between a network device and Trunks server or other device that is equipped with an appropriate 802.1Q-capable NIC. Which two characteristics are shared by 3&5 both standard and extended ACLs? This memory provides temporary storage for various applications and processes, RAM including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be DHCP Snooping used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices. 1&4 "What are two advantages of static routing over dynamic routing? 1. Static routing is more secure because it does not advertise over the network. 2. Static routing scales well with expanding networks. 3. Static routing requires very little knowledge of the network for correct implementation. 4. Static routing uses fewer router resources than dynamic routing 5. Static routing is relatively easy to configure for large networks." Inbound ACLs are processed Which statement describes a difference before the packets are routed while between the operation of inbound and outbound ACLs are processed after outbound ACLs? the routing is completed. "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance 4&5 can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." ISL & IEEE 802.1q Which are the 2 trunking protocols? Refering to the network diagram above of RMS University. All hosts and router RIPv2 is misconfigured on router interfaces are configured correctly. Pings to R2. the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem? If the port is assigned to the wrong VLAN, Switchport access vlan what command to be command to change the VLAN membership on a particular port? Which three statements about routed ports 2, 3, 2006 on a multilayer switch are true? Addresses are leased to host. A How does a DHCP server dynamically host will usually keep the same assign IP address to host? address by periodically contacting the DHCP sever to renew the lease. This is a point-to-point link between two Trunks network devices that carries more than one VLAN. Which command can you use to manually ipv6 address assign a static IPV6 address to a router 2001:db8:2222:7272::72/64 interface? What command sequence will configure a "router ospf 1 network 10.1.1.0 router to run OSPF and add network 0.0.0.255 area 0" 10.1.1.0 /24 to area 0? Refer to the exhibit below. Which two 1&5 statements about the configuration of the switch interface are correct? What is the default administrative distance of 110 OSPF? The following are VLAN best practices None of the choices EXCEPT? "The primary functions of a router are the following? 1. Packet switching 2. Flow 1&4 control 3. Domain name resolution 4. Path selection 5. Microsegmentation" Refer to the diagram below. The network administrator of RMS Overseas and Employment Agency that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is 3&5 accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? What is the command to configure the speed auto interface to automatically negotiate speed with the connected device? "To enable network access to a remote destination, what three pieces of information must be configured on a host? 1. default 1, 5, 2006 gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask" Load balancing allows a router to Which of the statements describe forward packets over multiple paths characteristic of load balancing? to the same destination network. "What are two functions of dynamic routing protocols? 1. to maintain routing tables 2. to assure low router overhead 3. to avoid 1&4 exposing network information 4. to discover the network 5. to choose the path that is specified by the administrator" Refer to the exhibit below. What routing Configure a static default route solution will allow both PC A and PC B to from R1 to Edge, a default route access the Internet with the minimum from Edge to the Internet, and a amount of router CPU and network static route from Edge to R1. bandwidth utilization? Which three elements must be used when 2, 4, 2005 you configure a router interface for VLAN trunking? All hosts in the networks have been The hosts will continue to operational for several hours when the communicate normally for a period DHCP server goes down. What happens to of time. the hosts that have obtained service from the DHCP server? Which router command allows you to view Show access-lists the entire contents of all access lists? Network 10.12.0.0 Refer to the sample configuration below. Which (config-router) command will allow the network represented on the interface to be advertised by RIP? Which command will allow you to see real- debug ipnat time translations on your router? Which of the following is the command to name employee specify a VLAN name? Name of VLAN is employee. It is a logical interface internal to What is a characteristic of an IPv4 loopback the router. interface on a Cisco IOS router? Which of the following is the command to Ip default-gateway 172.10.90.1 configure the switch default gateway with IP address of 172.10.90.1? Refer to the exhibit. Which two statements 1, 5 about the configuration of the switch interface are correct? Which version of NAT allows many hosts inside a private network to simultaneously PAT use a single inside global address for connecting to the Internet? "Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile 2&3 storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle." "Which two network parameters are used by EIGRP as metrics to select the best path to 2&5 reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" RIPv2 Which classless routing protocol supports VLSM and CIDR, supports manual route summarization, and uses the multicast address 224.0.0.9? "A network administrator in Stark Industries is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in The network wildcard mask is the routing tables of the other OSPF routers. configured improperly. Given the information in the partial configuration shown below, what configuration error is causing this problem? Router(config)# router ospf 1 Router(config- router)# network 10.0.0.0 255.0.0.0 area 0" This is a conduit for multiple VLANs between Trunks switches and routers. The following access list below was applied All traffic exiting E0 will be denied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: This layer provide fault isolation and high- Core layer speed backbone connectivity. What type of route allows a router to forward packets even though its routing table Default route contains no specific route to the destination network? A protocol that provides an encrypted SSH connection to a remote device. "Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 directly connected 10.1.3.3 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4" Routers compare metrics to Which statement is true regarding routing determine the best path. metrics? This is the path over which the data is transferred in a network. It describes how logical topology the network devices appear connected to network users. Refer to the exhibit. What will happen to Traffic will be dropped, because of HTTP traffic coming from the Internet that is the implicit deny all at the end of destined for 172.12.12.10 if the traffic is the ACL. processed by this ACL? Which two statements describe the process 3&4 identifier that is used in the command to configure OSPF on a router? Configurations are stored within a VLAN vlan.dat database file, called "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The 2&3 contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." 2&4 "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS" A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not been 255.255.255.0. However, when the activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? Process, Fast, Cisco Express Routers support three packet-forwarding Forwarding mechanisms. These are Which of the following 3 methods/types of 1, 3, 2005 NAT? There is an activity and the port is In the Switch port LED status, if the LED is sending or receiving data. blinking green what is the status of switch? What command sequence will configure a "router ospf 1 network 10.1.1.0 router to run OSPF and add network 0.0.0.255 area 0" 10.1.1.0 /24 to area 0? Which command would you place on ip nat outside interface connected to the Internet? When selecting the type of switch, rack units should always be Which of the following statement is considered. Rack units is the INCORRECT? number ports available in the network switch. What route would have the lowest A directly connected network administrative distance? "Which of the following are 2 primary functions of a router? 1. Packet switching 2. 2&4 Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" Telnet DoS attack In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. A switch populates the MAC Which of the following statement is address table based on destination INCORRECT? MAC addresses. Refer to the exhibit. Which two statements 4, 6 are true about interVLAN routing in the topology that is shown in the exhibit? A network administrator in XYZ Telecom is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the Router#showipeigrp neighbors router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information? Which factor directly affects the time to Size of the network convergence? OSPF routing uses the concept of areas. 2, 3, 2005 What are the three characteristics of OSPF areas? VLANs are based on logical connections, instead of physical Which of the following describes a VLAN? connections. This layer is considered as the network Core layer backbone. This is used to connect a PC to the console Console cable port of a switch for configuration. 2&4 "Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" VLAN is a switching technology that reduces The correct answer is 'True'. the size of a broadcast domain. Refer to the exhibit. The two connected ports on the switch are not turning orange or 2, 4, 2006 green. What would be the most effective steps to troubleshoot this physical layer problem? A collection of interconnected switches Broadcast domain forms a _______________________. 22 SSH protocol by default uses Port ______. Permit all packets matching the first The following configuration line was added three octets of the source address to router R1 to all destinations Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show There is an incorrect IP address running-config command output. PCs on configured on GigabitEthernet VLAN 45 that are using the 172.16.45.0 /24 0/0.30 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? If an address conflict is detected, the address is removed from the Which statement is correct regarding the pool and an administrator must operation of DHCP? resolve the conflict. The ________________ switches do not Fixed configuration support features or options beyond those that originally came with the switch. Stackable that are arranged one on top of Daisy Chain the other with cables linking the switches in a _____________ connection. 10 What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multiaccess network? Router On Stick is a method used for The correct answer is 'True'. communicating inter-vlan using a router. A type of VLAN that is configured to carry Data VLAN user-generated traffic. The following are VLAN best practices Join native VLAN to VLAN. EXCEPT? This is a protocol that is used to synchronize Network Time Protocol the clocks of computer systems over packet- switched, variable-latency data networks. What is the command used to determine the show ip interface brief status of both physical and virtual interfaces including IP address? The network administrator of ABC Supermarket configures the router with the S 172.16.1.0 [1/0] via 172.16.2.2 "ip route 172.16.1.0 255.255.255.0 172.16.2.2" command. How will this route appear in the routing table? Refer to the exhibit. The network engineer in RMSIndustries that is shown wants to use the primary ISP connection for all external "ip route 0.0.0.0 0.0.0.0 s0/0/0 ip connectivity. The backup ISP connection is route 0.0.0.0 0.0.0.0 s0/1/0 10" used only if the primary ISP connection fails. Which set of commands would accomplish this goal. What is the status of the Port speed LED if The port is operating at 100 Mbps. the LED light is green? If an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access Mode through a console connection. What button in the switch you need to press while reconnecting the power cord? ip address 192.168.10.2 What is the command to set the IP address 255.255.0.0 (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface? Dividing Layer 1,2 and 3 networks into multiple physical workgroups Which of the following is NOT a benefit of reduces unnecessary traffic on the VLAN? network and boosts performance. Dynamic Trunking Protocol is Which of the following describes Dynamic disable by default. Trunking Protocol? A switch forwarding method that begins the forwarding process after the destination Cut-through switch method MAC address of an incoming frame and the egress port has been determined. A network associate in Genesis Aerospace 2, 3, 2006 Industries has configured OSPF with the command: Which of the following would be good 1, 2 and 4 reasons to run NAT? What is the command to create a VLAN with Vlan 30 a valid VLAN ID number 30? What is an advantage of OSPF compared to Fast convergence RIP? Which command will create a dynamic pool ip nat pool Todd 171.16.10.65 named Todd that will provide you with 30 171.16.10.94 net 255.255.255.224 global addresses? If all OSPF routers in a single area are the highest IP address among its configured with the same priority value, what active interfaces value does a router use for the OSPF router ID in the absence of a loopback interface? They filter traffic based on source Which statement describes a characteristic IP addresses only. of standard IPv4 ACLs? There is activity and the port is In the Switch port LED status, if the LED is sending or receiving data. blinking green what is the status of switch? This layer provides intelligent switching, Distribution layer routing, and network access policy functions to access the rest of the network. A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward Native VLAN compatibility with untagged traffic common to legacy LAN scenarios. A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to An additional broadcast domain will segment existing departmental traffic. What be created. is the effect of adding switch ports to a new VLAN on the switch? Which IPv4 address range covers all IP 172.16.2.0 to 172.16.3.255 addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255? Refer to the exhibit. What information can be Network 10.10.1.0 is reachable. gathered from the output? Which command would you place on ip nat inside interface on a private network? between 1006 and 4094 The extended range of VLAN ID is Which command will show you the summary show ipnat statistics of the NAT configuration? A network administrator has examined the routing table of a router and noted that the The route source was learned entry for the destination network dynamically. 172.16.4.0/24 begins with the letter D. What does this letter signify? Which command would you place on ipnat outside interface connected to the Internet? The FastEthernet 0/0 interface on Refer to the exhibit. Which statement are Router1 must be configured with true about interVLAN routing in the topology subinterfaces. that is shown in the exhibit? What two functions describe uses of an 3&5 access control list? The default VLAN for Cisco switches is VLAN 1 ____________________. A(config)# ip route 192.168.4.0 Refer to the given network diagram. Which 255.255.255.0 192.168.3.2 command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C? Which 3 series of commands will configure router R1 for LAN-to-LAN communication 1, 4, 2006 with router R2? The enterprise network address is 192.1.1.0/24 and the routing protocol in use is RIP. 1&5 What are two benefits of using NAT? None of the choices Which of the following describes a VLAN? Which two link protocols are used to carry 2, 4 multiple VLANs over a single link? This is a proprietary protocol that all Cisco devices can be configured to use. This Cisco Discovery Protocol checks other Cisco devices that are directly connected, which allows the devices to auto- configure their connection. A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new The network wildcard mask is router do not appear in the routing tables of configured improperly. the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? Which IPv6 ACL command entry will permit Permit tcp any host traffic from any host to an SMTP server on 2001:DB8:10:10::100 eq 25 network 2001:DB8:10:10::/64? The _____ switches typically come with Modular configuration different sized chassis that allow for the installation of different numbers of line card. "ip route 0.0.0.0 0.0.0.0 s0/0/0 ip Refer to the exhibit below. The network route 0.0.0.0 0.0.0.0 s0/1/0 10" engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal? Which two parameters are used by EIGRP 2, 5 as metrics to select the best path to reach a network? "Which two statements are true for OSPF Hello packets? 1. They are used to negotiate correct parameters among neighboring interfaces. 2. They are used to 2&4 maintain neighbor relationships. 3. They are used to determine the complete network topology. 4. They are used for dynamic neighbor discovery. 5. They are used to flood link-state information to all neighbors." What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain DHCP spoofing attack Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. You can configure one access list, Which statement about access lists that are per direction, per layer 3 protocol applied to an interface is true? Sometimes switch ports must manually have their duplex mode manually configured. This Full duplex mode duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously. Which of the following describes Dynamic All of the choices Trunking Protocol? Administrative distance Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used? Which command would you place on ipnat inside interface on a private network? Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure configure terminal specific elements such as protocols. What is the command to enter global configuration mode? Which command will show you all the show ip nat translations translations active on your router? When a DHCP server is configured, which 3&6 two IP addresses should never be assignable to hosts? When a DHCP server is configured, which 4&6 two IP addresses should never be assignable to hosts? "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 2005 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured two as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? This memory stores router bootup ROM instructions and basic diagnostic software. The OSPF Hello protocol performs which of 1&3 the following 2 tasks? Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show There is an incorrect IP address running-config command output. PCs on configured on GigabitEthernet VLAN 45 that are using the 172.16.45.0 /24 0/0.30.* network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? "True of False. Ingress is used to describe The correct answer is 'False'. frames leaving the device through a particular port." Which command is used to display the show ip ospf database collection of OSPF link states? Which two statements about static NAT 1&2 translations are true? "The primary functions of a router are the following? 1. Packet switching 2. Flow 1&4 control 3. Domain name resolution 4. Path selection 5. Microsegmentation" "Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile 2&3 storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle." 4&5 "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one Double Tagging Attack level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Which command will show you the summary show ip nat statistics of the NAT configuration? As a network administrator of RMS Aerospace Industries, you have been instructed to prevent all traffic originating on ip access-group 101 in the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router? Which three features are of OSPF routing 1, 3, 2005 protocol? "Which two link protocols are used to carry 2&4 multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" DHCP starvation attack What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of- service (DoS) attackas new clients cannot obtain network access. What is the default number of equal-cost 4 paths that can be placed into the routing of a Cisco OSPF router? Which classless routing protocol supports VLSM and CIDR, bounded and triggered EIGRP updates, and uses the multicast address of 224.0.0.10? Routers support a variety of What is one feature that distinguishes interface types. Switches typically routers from Layer 2 switches? support Ethernet interfaces. Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is 3&5 accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? to provide an IP configuration What is the purpose of the DHCP server? information to hosts Which two link protocols are used to carry 802.1q & ISL multiple VLANs over a single link? Why would a floating static route be configured with an administrative distance To be used as a backup route that is higher than the administrative distance of a dynamic routing protocol that is running on the same router? 1, 4 There are two advantages of static routing over dynamic routing among these choices. What are these? Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external "ip route 0.0.0.0 0.0.0.0 s0/0/0 ip connectivity. The backup ISP connection is route 0.0.0.0 0.0.0.0 s0/1/0 10" used only if the primary ISP connection fails. Which set of commands would accomplish this goal. "Which two network parameters are used by EIGRP as metrics to select the best path to 2&5 reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" VLAN IDs 1002 through 1005 are reserved All of the Choices for In troubleshooting VLANs, what command show vlan should be used to check whether the port belongs to the expected VLAN? Which of the following are 3 disadvantages 1, 3, 2005 of using NAT? This is the practice of inserting a VLAN ID into a packet header in order to identify VLAN tagging which VLAN (Virtual Local Area Network) the packet belongs to. The following are switch port modes that Remote DTP offers EXCEPT If your routing table has a static, a RIP, and an OSPF route to the same network, which Static route route will be used to route packets by default? Which of the following is an element of All of the choices converged network? The route source was learned A network administrator of Stark Industries dynamically. has examined the routing table of a router and noted that the entry for the destination network 172.16.4.0/24 begins with the letter D. What does this letter signify? "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 2005 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" What happens to a static route entry in a The Static route is removed from routing table when the outgoing interface the routing table. associated with that route goes into a down state? Which command is used to display the show ipospf database collection of OSPF link states? The primary function of this layer is to Access layer provide network access to the user. A router has two FastEthernet interfaces and needs to connect to four vlans in the local Implement a router-on-a-stick network. How can you accomplish this task, configuration. using the fewest physical interfaces and without decreasing network performance? This attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of Brute force password attack common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list. RIPv2 is misconfigured on router Refer to the exhibit. All hosts and router R2. interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem? Which 2 commands are required to properly 1&4 configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? Which protocols are used to configure 802.1q trunking on a switch? Do not use the dynamic auto or What is the best practice relative to switch dynamic desirable. port modes? If a router has two interfaces and is routing 8 both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it? access-list 50 deny 192.168.1.1 Which item represents the standard IP ACL? 0.0.0.255 Native VLAN Which is the VLAN not tagged by 802.1q? Which parameter or parameters are used to Bandwidth calculate OSPF cost in Cisco routers? As a network administrator, you have been instructed to prevent all traffic originating on ip access-group 101 in the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router? Refer to the exhibit. If the router Cisco returns the given output and has not had its 2.2.2.2 router ID set manually, what value will OSPF use as its router ID? A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 1&2 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? What is the status of the Port speed LED if The port is operating at 1000 Mbps. the LED light is blinking green? Load balancing allows a router to Which statement describe a characteristicof forward packets over multiple paths load balancing? to the same destination network. a measure of the trustworthiness of What does administrative distance refer to? a routing information source . This layer provide fault isolation and high- Core layer speed backbone onnectivity. R1 is configured with the default configuration of OSPF. From the following 192.168.0.1 list of IP addresses configured on R1, which address will the OSPF process select as the router ID? Which 3 statements describe the routing 1, 3, 2005 protocol OSPF? If an address conflict is detected, the address is removed from the Which statement is correct regarding the pool and will not be reused until the operation of DHCP? server is rebooted. Refer to the exhibit. Which rule does the The address is removed from the DHCP server use when there is an IP pool until the conflict is resolved. address conflict?