Module 8 9
Module 8 9
2A new network administrator has been asked to enter a banner message on a Cisco
device. What is the fastest way a network administrator could test whether the banner
is properly configured?
Enter CTRL-Z at the privileged mode prompt.
Exit privileged EXEC mode and press Enter .
Reboot the device.
Exit global configuration mode.
Power cycle the device.
11What happens when the transport input ssh command is entered on the switch vty
lines?
The SSH client on the switch is enabled.
The switch requires remote connections via a proprietary client software.
The switch requires a username/password combination for remote access.
Communication between the switch and remote users is encrypted.
13What property of ARP forces all Ethernet NICs to process an ARP request?
ARP replies are broadcast on the network when a host receives an ARP request.
The source MAC address appears in the header of the Ethernet frame.
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
The type field 0x806 appears in the header of the Ethernet frame.
Navigation Bar
17Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host
computer?
ARP cache
MAC address table
routing table
neighbor table
18Which destination address is used in an ARP request frame?
AAAA.AAAA.AAAA
FFFF.FFFF.FFFF
0.0.0.0
255.255.255.255
the physical address of the destination host
19What is the aim of an ARP spoofing attack?
to associate IP addresses to the wrong MAC address
to fill switch MAC address tables with bogus addresses
to overwhelm network hosts with ARP requests
to flood the network with ARP reply broadcasts
20Which two types of IPv6 messages are used in place of ARP for address resolution?
neighbor solicitation
echo request
anycast
broadcast
neighbor advertisement
echo reply
21What are two potential network problems that can result from ARP operation?
(Choose two.)
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
Multiple ARP replies result in the switch MAC address table containing entries that match the MAC
addresses of hosts that are connected to the relevant switch port.
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent
the host from communicating on the network.
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the
intent of intercepting network traffic.
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.
24What will happen if the default gateway address is incorrectly configured on a
host?
The host will have to use ARP to determine the correct address of the default gateway.
The switch will not forward packets initiated by the host.
A ping from the host to 127.0.0.1 would not be successful.
The host cannot communicate with other hosts in the local network.
The host cannot communicate with hosts in other networks.
25How do hosts ensure that their packets are directed to the correct network
destination?
They have to keep their own local routing table that contains a route to the loopback interface, a local
network route, and a remote default route.
They send a query packet to the default gateway asking for the best route.
They search in their own local routing table for a route to the network destination address and pass this
information to the default gateway.
They always direct their packets to the default gateway, which will be responsible for the packet delivery.
26A computer can access devices on the same network but cannot access devices on
other networks. What is the probable cause of this problem?
The computer has an incorrect subnet mask.
The computer has an invalid IP address.
The computer has an invalid default gateway address.
The cable is not connected properly to the NIC.
27What is one advantage that the IPv6 simplified header offers over IPv4?
efficient packet handling
little requirement for processing checksums
smaller-sized source and destination IP addresses
smaller-sized header
28What information does the loopback test provide?
The TCP/IP stack on the device is working correctly.
The device has the correct IP address on the network.
The device has end-to-end connectivity.
The Ethernet cable is working correctly.
DHCP is working correctly.
29Which field in the IPv4 header is used to prevent a packet from traversing a
network endlessly?
Time-to-Live
Acknowledgment Number
Sequence Number
Differentiated Services
30What routing table entry has a next hop address associated with a destination
network?
directly-connected routes
C and L source routes
remote routes
local routes
31What are two services provided by the OSI network layer? (Choose two.)
encapsulating PDUs from the transport layer
routing packets toward the destination
performing error detection
placement of frames on the media
collision detection
The problems that are induced by NAT applications are solved because the IPv6 header improves packet
handling by intermediate routers.
Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is
extremely large.
The end-to-end connectivity problems that are caused by NAT are solved because the number of routes
increases with the number of nodes that are connected to the Internet.
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.
Navigation Bar