0% found this document useful (0 votes)
23 views5 pages

Module 8 9

Uploaded by

ohong.181278
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views5 pages

Module 8 9

Uploaded by

ohong.181278
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1Which term describes a field in the IPv4 packet header that contains a unicast,

multicast, or broadcast address?


 header checksum
 destination IPv4 address
 protocol
 TTL

2A new network administrator has been asked to enter a banner message on a Cisco
device. What is the fastest way a network administrator could test whether the banner
is properly configured?
 Enter CTRL-Z at the privileged mode prompt.
 Exit privileged EXEC mode and press Enter .
 Reboot the device.
 Exit global configuration mode.
 Power cycle the device.

7Which two functions are primary functions of a router? (Choose two.)


 packet forwarding
 flow control
 path selection
 domain name resolution
 microsegmentation

8The global configuration command ip default-gateway 172.16.100.1 is applied to a


switch. What is the effect of this command?
 The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
 The switch will have a management interface with the address 172.16.100.1.
 The switch can communicate with other hosts on the 172.16.100.0 network.
 The switch can be remotely managed from a host on another network.

10What are two functions of NVRAM? (Choose two.)


 to retain contents when power is removed
 to store the ARP table
 to store the routing table
 to contain the running configuration file
 to store the startup configuration file

11What happens when the transport input ssh command is entered on the switch vty
lines?
 The SSH client on the switch is enabled.
 The switch requires remote connections via a proprietary client software.
 The switch requires a username/password combination for remote access.
 Communication between the switch and remote users is encrypted.
13What property of ARP forces all Ethernet NICs to process an ARP request?

 ARP replies are broadcast on the network when a host receives an ARP request.
 The source MAC address appears in the header of the Ethernet frame.
 The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
 The type field 0x806 appears in the header of the Ethernet frame.
 Navigation Bar

15What statement describes the function of the Address Resolution Protocol?


 ARP is used to discover the IP address of any host on a different network.
 ARP is used to discover the MAC address of any host on a different network.
 ARP is used to discover the MAC address of any host on the local network.
 ARP is used to discover the IP address of any host on the local network.

16What important informa on is examined in the Ethernet frame header by a Layer


2 device in order to forward the data onward?
 Ethernet type
 source MAC address
 destination IP address
 destination MAC address
 source IP address
 Navigation Bar

17Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host
computer?
 ARP cache
 MAC address table
 routing table
 neighbor table
18Which destination address is used in an ARP request frame?
 AAAA.AAAA.AAAA
 FFFF.FFFF.FFFF
 0.0.0.0
 255.255.255.255
 the physical address of the destination host
19What is the aim of an ARP spoofing attack?
 to associate IP addresses to the wrong MAC address
 to fill switch MAC address tables with bogus addresses
 to overwhelm network hosts with ARP requests
 to flood the network with ARP reply broadcasts
20Which two types of IPv6 messages are used in place of ARP for address resolution?
 neighbor solicitation
 echo request
 anycast
 broadcast
 neighbor advertisement
 echo reply
21What are two potential network problems that can result from ARP operation?
(Choose two.)
 On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
 Multiple ARP replies result in the switch MAC address table containing entries that match the MAC
addresses of hosts that are connected to the relevant switch port.
 Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent
the host from communicating on the network.
 Network attackers could manipulate MAC address and IP address mappings in ARP messages with the
intent of intercepting network traffic.
 Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.
24What will happen if the default gateway address is incorrectly configured on a
host?
 The host will have to use ARP to determine the correct address of the default gateway.
 The switch will not forward packets initiated by the host.
 A ping from the host to 127.0.0.1 would not be successful.
 The host cannot communicate with other hosts in the local network.
 The host cannot communicate with hosts in other networks.

25How do hosts ensure that their packets are directed to the correct network
destination?
 They have to keep their own local routing table that contains a route to the loopback interface, a local
network route, and a remote default route.
 They send a query packet to the default gateway asking for the best route.
 They search in their own local routing table for a route to the network destination address and pass this
information to the default gateway.
 They always direct their packets to the default gateway, which will be responsible for the packet delivery.

26A computer can access devices on the same network but cannot access devices on
other networks. What is the probable cause of this problem?
 The computer has an incorrect subnet mask.
 The computer has an invalid IP address.
 The computer has an invalid default gateway address.
 The cable is not connected properly to the NIC.

27What is one advantage that the IPv6 simplified header offers over IPv4?
 efficient packet handling
 little requirement for processing checksums
 smaller-sized source and destination IP addresses
 smaller-sized header
28What information does the loopback test provide?
 The TCP/IP stack on the device is working correctly.
 The device has the correct IP address on the network.
 The device has end-to-end connectivity.
 The Ethernet cable is working correctly.
 DHCP is working correctly.
29Which field in the IPv4 header is used to prevent a packet from traversing a
network endlessly?
 Time-to-Live
 Acknowledgment Number
 Sequence Number
 Differentiated Services
30What routing table entry has a next hop address associated with a destination
network?
 directly-connected routes
 C and L source routes
 remote routes
 local routes
31What are two services provided by the OSI network layer? (Choose two.)
 encapsulating PDUs from the transport layer
 routing packets toward the destination
 performing error detection
 placement of frames on the media
 collision detection

33Why is NAT not needed in IPv6?

 The problems that are induced by NAT applications are solved because the IPv6 header improves packet
handling by intermediate routers.
 Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is
extremely large.
 The end-to-end connectivity problems that are caused by NAT are solved because the number of routes
increases with the number of nodes that are connected to the Internet.
 Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.
 Navigation Bar

You might also like