Data Communications and Networking 1 and 2 - All Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

What command will prevent all unencrypted

(config) # service password-encryption passwords from displaying in plain text in a


configuration file?
Which type of network design combines voice,
a converged network video, and data on the same communication
channel?
a farm in a rural area without wired In which scenario would the use of a WISP be
broadband access recommended?
a web page that groups of people can
What is a wiki?
edit and review
an address that reaches a
What type of address is 01-00-5E-0A-00-02?
specific group of hosts
An employee at a branch office is creating a quote
for a customer. In order to do this, the employee
an intranet needs to access confidential pricing information
from internal servers at the Head Office. What type
of network would the employee access?
What type of communication will send a message
broadcast
to all devices on a local area network?
Which message delivery option is used when all
broadcast devices need to receive the same message
simultaneously?
Which two Internet connection options do not
cellular, Satellite require that physical cables be run to the building?
(Choose two.)
Which term describes the state of a network when
congestion the demand on the network resources exceeds the
available capacity?
What three functions are defined by
data encoding, message size, delivery network protocols to allow communication between
options known source and destination IP addresses?
(Choose three.)
Which logical address is used for delivery of data to
destination IP address
a remote network?
Which two connection options provide an always-
DSL, cable on, high-bandwidth Internet connection to
computers in a home office? (Choose two.)
A company is contemplating whether to use a
easy to create, lacks centralized client/server or a peer-to-peer network. What are
administration, less cost to implement three characteristics of a peer-to-peer network?
(Choose three.)
What process is used to place one message inside
encapsulation another message for transfer from the source to the
destination?
Which command or key combination allows a user
exit to return to the previous level in the command
hierarchy?
What method can be used by two computers to
flow control ensure that packets are not dropped because too
much data is being sent too quickly?
how connection between nodes
Which two factors influence the method that is used
appears to the data link layer, how
for media access control? (Choose two.)
nodes share the media
A web client is sending a request for a webpage to
a web server. From the perspective of the client,
HTTP, TCP, IP, Ethernet
what is the correct order of the protocol stack that is
used to prepare the request for transmission?
Which organization develops the 802 family of
IEEE
standard for wired and wireless LANs and MANs?
Intermediary devices direct the path of
the data., Intermediary devices Which two statements describe intermediary
connect individual hosts to the devices? (Choose two.)
network.
Which two engineering organizations define open
International Telecommunication
standards and protocols that apply to the data link
Union (ITU)
layer?
is a private connection of LANs and WANs that
belongs to an organization, and is designed to be
Intranet
accessible only by the members and employees of
the organization, or others with authorization.
What will a network administrator use to modify a
IOS
configuration on a Cisco router?
it can rapidly adapt to the failure of
network devices and communication
links, Data packets can travel through For which three reasons was a packet switched
the network using multiple different connectionless data communications technology
paths, Network devices dynamically used when developing the Internet (Choose three.)
decide on the best available path to
forward each packet.
Which statement describes a feature of an IOS host
It does not allow spaces
name configuration?
What is a characteristic of a contention-based
It is as nondeterministic method
access method?
An administrator measured the transfer of usable
data across a 100 Mb/s physical channel over a
latency
given period of time and obtained 60 Mb/s. Which
kind of measurement did the administrator obtain
In fiber optic meda, the signals are represented as
light
patterns of
What type of delivery uses data link layer
local delivery
addresses?
Which device acts as gateway to allow hosts to
local router
send traffic to remote IP networks?
address is defined as a reserved address that
loopback
routes packets back to the host
sublayer is responsible for communicating directly
mac
with the physical layer.
Which interface command must be entered in a
no switchport Layer 3 switch before IPv4 address can be
assigned to the interface?
Nothing must be done. Changes to
An administrator has just changed the IP address
the configuration on an IOS device
of an interface on an IOS device. What else must
take effect as soon as the command is
be done in order to apply those changes to the
typed correctly and the Enter key has
device?
been pressed.
Products from different manufacturers What is an advantage of using standards to
can interoperate successfully develop and implement protocols?
providing a richer e-learning
What are two benefits of collaboration and video-
environment, providing better social
on-demand applications? (Choose two.)
media opportunities
providing the rules required for a
What is the purpose of protocols in data
specific type of communication to
communications?
occur
Which two message timing mechanisms are used
response timeout, flow control
in data communication? (Choose two.)
Which device performs the function of determining
router the path that messages should take through
internet works?
network is able to expand to accept new devices
Scalable
and applications without affecting performance.
Which PDU is processed when a host computer is
segment de-encapsulating a message at the transport
layer of the TCP/IP model?
The farther you are from the central office when
slower
utilizing a DSL connection, the
During a routine inspection, a technician discovered
that software that was installed on a computer was
spyware secretly collecting data about websites that were
visited by users of the computer. Which type of
threat is affecting this computer
A network administrator needs to keep the user ID,
SSH password, and session contents private when
establishing remote CLI connectivity with a switch
to manage it. Which access method should be
chosen?
A technician configures a switch with these
SVI
commands:
To save time, IOS commands may be partially
Tab entered and then completed by typing which key or
key combination?
The branch sites are connected to a What is a characteristic of a WAN hub-and-spoke
central site through point-point links topology?
the distance the selected medium can
What two criteria are used to help select a network
successfully carry a signal, the
medium from various network media? (Choose
environment where the selected
two.)
medium is to be installed
The host portion of the IP addresses What happens when two devices on the same
will be different subnet are communicating?
The kernel provisions hardware
What is the function of the kernel of an operating
resources to meet software
software?
requirements.
The network provides predictable
Which statement describes a network that supports
levels of service to different types of
QoS?
traffic
the privileged executive mode What is encrypted with the enable secret
password command?
The throughput is predictable, Devices Which two statements are true of the deterministic
take turns transmitting access method?(Choose two.)
They define how messages are
Which statement is correct about
exchanged between the source and
network protocols?
the destination.
They define how messages are
Which statement is correct about
exchanged between the sources and
network protocols?
the destination
They originate the data that flows
through the network., They are the What are two functions of end devices on a
interface between humans and the network? (Choose two.)
communication network.
Which statement describes a characteristic of the
They vary depending on protocols
frame header fields of the data link layer?
This is the default mode on an
unconfigured router when first Which two statements are true regarding the user
powered up., Only some aspects of EXEC mode? (Choose two.)
the router configuration can be viewed
to add a password to a Cisco network Why would a network administrator use the CLI of
device the Cisco IOS?
to copy an existing configuration into Why would a technician enter the command copy
RAM startup-config running config?
What is the purpose of the physical link control field
to establish the media link
in a data link layer header?
to identify which network Which is a function of the Logical Link Control
layer protocol is being used (LLC) sublayer?
Which two components are added to the PDU at
Trailer, frame header
the network access layer? (Choose two.)
A network administer has forgotten the argument of
Type the command and then press an IOS command. How would the administrator get
the? key help from the IOS CLI to complete the command
correctly?
Use the console port to locally access Which procedure is used to access a Cisco 2960
the switch from a serial or USB switch when performing an initial configuration in a
interface of the PC. secure environment?
A router has a valid operating system and a
configuration file stored in NVRAM. The
user EXEC mode configuration file contains an enable secret
password but no console password. When the
router boots up, which mode will display?
A data center has recently updated a physical
server to host multiple operating systems on a
single CPU. The data center can now provide each
virtualization customer with a separate web server without
having to allocate an actual discrete server for each
customer. What is the network trend that is being
implemented by the data center in this situation?
when the end-user device will run an
When is a wired connection preffered to a wireless
application that requires a dedicated
connection by an end-user device?
connection to the network
Which area of the network would a college IT staff
most likely have to redesign as a direct result of
wireless LAN many students bringing their own tablets and
smartphones to school to access school
resources?
This is used between a network device and server
Trunks or other device that is equipped with an appropriate
802.1Q-capable NIC.
A switch forwarding method that makes a
forwarding decision on a frame after it has received
Store-and-forward switching
the entire frame and then checked the frame for
errors.
A protocol that provides an encrypted connection to
SSH
a remote device.
This layer provides intelligent switching, routing,
Distribution layer and network access policy functions to access the
rest of the network.
22 SSH protocol by default uses Port ______.
Access, distribution and Core layer What are the 3 layers of the distribution access?
The _____ switches typically come with different
Modular configuration sized chassis that allow for the installation of
different numbers of line card.
If the port is assigned to the wrong VLAN, what
Switchport access vlan command to be command to change the VLAN
membership on a particular port?
This is a point-to-point link between two network
Trunks
devices that carries more than one VLAN.
This attack tries to crack a password on another
device. The first phase of this attack starts with the
Brute force password attack attacker using a list of common passwords and a
program designed to try to establish a Telnet
session using each word on the dictionary list.
What is the status of the Port speed LED if the LED
The port is operating at 1000 Mbps.
light is blinking green?
Core layer This layer is considered as the network backbone.
A type of VLAN that is configured to carry user-
Data VLAN
generated traffic.
What is the status of the Port speed LED if the LED
The port is operating at 100 Mbps.
light is green?
To troubleshoot issues when a trunk is not forming
or when VLAN leaking is occurring, what command
show interfaces trunk
to be used to check whether the local and peer
native VLANs match?
A collection of interconnected switches forms a
Broadcast domain
_______________________.
This type of attack takes advantage of the way that
hardware on most switches operates. Most
Double Tagging Attack switches perform only one level of 802.1Q de-
encapsulation, which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
23 Telnet protocol by default uses Port ______.
Which of the following is the command to configure
Ip domain-name mycompany.com the IP domain name of the network
(mycompany.com)
Dividing Layer 1,2 and 3 networks into
multiple physical workgroups reduces
Which of the following is NOT a benefit of VLAN?
unnecessary traffic on the network
and boosts performance.
Which of the following is NOT a feature of a
None of the choices
Switched Network
In this attack, the attacker exploits a flaw in the
Telnet server software running on the switch that
renders the Telnet service unavailable. This sort of
attack prevents an administrator from remotely
Telnet DoS attack accessing switch management functions. This can
be combined with other direct attacks on the
network as part of a coordinated attempt to prevent
the network administrator from accessing core
devices during the breach.
Global configuration mode is used to configure
system globally, or to enter specific configuration
configure terminal modes to configure specific elements such as
protocols. What is the command to enter global
configuration mode?
between 1006 and 4094 The extended range of VLAN ID is
Which of the following is NOT an element of
None of the choices
converged network?
A switch forwarding method that begins the
forwarding process after the destination MAC
Cut-through switch method
address of an incoming frame and the egress port
has been determined.
The default VLAN for Cisco switches is
VLAN 1
____________________.
The ________________ switches do not support
Fixed configuration features or options beyond those that originally
came with the switch.
This is a conduit for multiple VLANs between
Trunks
switches and routers.
In troubleshooting VLANs, what command should
show vlan be used to check whether the port belongs to the
expected VLAN?
This is a protocol that is used to synchronize the
Network Time Protocol clocks of computer systems over packet-switched,
variable-latency data networks.
The primary function of this layer is to provide
Access layer
network access to the user.
The network segments that share the same
Collision domain
bandwidth between devices.
This is a proprietary protocol that all Cisco devices
can be configured to use. This checks other Cisco
Cisco Discovery Protocol
devices that are directly connected, which allows
the devices to auto-configure their connection.
Do not use the dynamic auto or What is the best practice relative to switch port
dynamic desirable. modes?
This is a security technology that determines which
devices attached to switch ports can respond to
DHCP requests. This can be used to prevent
DHCP Snooping
unauthorized DHCP messages that contain
information such as IP address related data being
provided to legitimate network devices.
All of the Choices VLAN IDs 1002 through 1005 are reserved for
What is the command to assign the port to a
switchport access vlanvlan-id particular VLAN when the interface is in access
mode?
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to
issue DHCP addresses to clients. The normal
reason for this attack is to force the clients to use
DHCP spoofing attack false Domain Name System (DNS) or Windows
Internet Naming Service (WINS) servers and to
make the clients use the attacker, or a machine
under the control of the attacker, as their default
gateway.
Which of the following is the command to configure
Ip default-gateway 172.10.90.1 the switch default gateway with IP address of
172.10.90.1?
Sometimes switch ports must manually have their
duplex mode manually configured. This duplex
Full duplex mode mode increases effective bandwidth by allowing
both ends of a connection to transmit and receive
data simultaneously.
What is the command to create a VLAN with a valid
Vlan 30
VLAN ID number 30?
This layer provide fault isolation and high-speed
Core layer
backbone connectivity.
A type of VLAN that is defined in the IEEE 802.1Q
specification to maintain backward compatibility
Native VLAN
with untagged traffic common to legacy LAN
scenarios.
The following are switch port modes that DTP
Remote
offers EXCEPT
This is the practice of inserting a VLAN ID into a
VLAN tagging packet header in order to identify which VLAN
(Virtual Local Area Network) the packet belongs to.
Stackable that are arranged one on top of the other
Daisy Chain with cables linking the switches in a
_____________ connection.
Dynamic Trunking Protocol is disable Which of the following describes Dynamic Trunking
by default. Protocol?
What type of DHCP attack where in an attacker
floods the DHCP server with DHCP requests to use
all the available IP addresses that the DHCP server
DHCP starvation attack can issue. After these IP addresses are issued, the
server cannot issue any more addresses, and this
situation produces a denial-of-service (DoS)
attackas new clients cannot obtain network access.
What is the command to configure the interface to
speed auto automatically negotiate speed with the connected
device?
If an error occurs while loading the operating
system because of missing or damaged system
Mode files, the load loader can be access through a
console connection. What button in the switch you
need to press while reconnecting the power cord?
Join native VLAN to VLAN. The following are VLAN best practices EXCEPT?
Configurations are stored within a VLAN database
vlan.dat
file, called
What is the command to set the IP address
ip address 192.168.10.2 255.255.0.0 (192.168.10.2) and subnet mask (255.255.0.0) for
specific Fast Ethernet interface?
There is activity and the port is In the Switch port LED status, if the LED is blinking
sending or receiving data. green what is the status of switch?
This is used to connect a PC to the console port of
Console cable
a switch for configuration.
Which of the following is the command to specify a
name employee
VLAN name? Name of VLAN is employee.
VLANs are based on logical
connections, instead of physical Which of the following describes a VLAN?
connections.
What is the command used to determine the status
show ip interface brief of both physical and virtual interfaces including IP
address?
A switch populates the MAC address
table based on destination MAC Which of the following statement is INCORRECT?
addresses.
Native VLAN Which is the VLAN not tagged by 802.1q?
A router has two FastEthernet interfaces and needs
to connect to four vlans in the local network. How
Implement a router-on-a-stick
can you accomplish this task, using the fewest
configuration.
physical interfaces and without decreasing network
performance?
Which command is used to configure an IPv6
ipv6 address ipv6-address/prefix- address on a router interface so that the router will
length eui-64 combine a manually specified network prefix with
an automatically generated interface identifier?
This is the path over which the data is transferred in
logical topology a network. It describes how the network devices
appear connected to network users.
None of the choices The following are VLAN best practices EXCEPT?
This layer provide fault isolation and high-speed
Core layer
backbone onnectivity.
This is the arrangement of the cables, network
devices, and end systems. It describes how the
physical topology
network devices are actually interconnected with
wires and cables.
"Which two network parameters are used by
EIGRP as metrics to select the best path to reach a
2&5
network? 1. Jitter 2. bandwidth 3. resiliency 4. hop
count 5. delay 6. confidentiality"
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30,
and 45, according to the show running-config
There is an incorrect IP address command output. PCs on VLAN 45 that are using
configured on GigabitEthernet 0/0.30.* the 172.16.45.0 /24 network are having trouble
connecting to PCs on VLAN 30 in the 172.16.30.0
/24 network. Which error is most likely causing this
problem?
Routers compare metrics to determine
Which statement is true regarding routing metrics?
the best path.
This memory provides temporary storage for
various applications and processes, including the
RAM
running IOS, the running configuration file, IP
routing table, Ethernet ARP table.
"Which of the following are 2 primary functions of a
router? 1. Packet switching 2. Microsegmentation
2&4
3. Domain name resolution 4. Path selection 5.
Flow control"
Refer to the exhibit below. Which two statements
1&5 about the configuration of the switch interface are
correct?
If your routing table has a static, a RIP, and an
Static route OSPF route to the same network, which route will
be used to route packets by default?
Routers support a variety of interface
What is one feature that distinguishes routers from
types. Switches typically support
Layer 2 switches?
Ethernet interfaces.
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator
checks the status of the serial interface, the
no shutdown
interface is shown as being administratively down.
What additional command must be entered on the
serial interface of R1 to bring the interface up?
"To enable network access to a remote destination,
what three pieces of information must be
1, 5, 6 configured on a host? 1. default gateway 2.
hostname 3. DNS server address 4. DHCP server
address 5. IP address 6. subnet mask"
Which two link protocols are used to carry multiple
802.1q & ISL
VLANs over a single link?
None of the choices Which of the following describes a VLAN?
"Which two features are characteristics of flash
memory? 1. The contents of flash may be lost
during a power cycle. 2. Flash provides nonvolatile
storage. 3. The contents of flash may be
2&3
overwritten. 4. Flash is a component in Cisco
switches but not in Cisco routers. 5. Flash receives
a copy of the IOS from RAM when a device is
powered on."
What route would have the lowest administrative
A directly connected network
distance?
It is a logical interface internal to the What is a characteristic of an IPv4 loopback
router. interface on a Cisco IOS router?
Which protocolis used to configure trunking on a
802.1q
switch?
Which protocols are used to configure trunking on a
802.1q
switch?
"Which two link protocols are used to carry multiple
2&4 VLANs over a single link? 1. VTP 2. 802.1q 3. IGP
4. ISL 5. 802.3u"
"Which two statements correctly describe the
concepts of administrative distance and metric?
(Choose two.) 1. The metric varies depending
which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher
administrative distances. 3. The value of the
4&5
administrative distance can not be altered by the
network administrator. 4. Routes with the smallest
metric to a destination indicate the best path. 5.
Administrative distance refers to the trustworthiness
of a particular route. 6. The metric is always
determined based on hop count."
Network infrastructure devices require IP
addresses to enable remote management. Using
None in the choices the device IP address, the network administrator
can remotely connect to the device using any of the
following EXCEPT
Which of the following is NOT a characteristics of a
All of the choices
network?
Process, Fast, Cisco Express Routers support three packet-forwarding
Forwarding mechanisms. These are
"Which three elements must be used when you
configure a router interface for VLAN trunking? 1.
one physical interface for each subinterface 2. one
IP network or subnetwork for each subinterface 3. a
2, 4, 5
management domain for each subinterface 4.
subinterface encapsulation identifiers that match
VLAN tags 5. one subinterface per VLAN 6.
subinterface numbering that matches VLAN tags"
If your routing table has a static, a RIP, and an
Static route IGRP route to the same network, which route will
be used to route packets by default?
The FastEthernet 0/0 interface on Refer to the exhibit. Which statement are true about
Router1 must be configured with interVLAN routing in the topology that is shown in
subinterfaces. the exhibit?
"The primary functions of a router are the
following? 1. Packet switching 2. Flow control 3.
1&4
Domain name resolution 4. Path selection 5.
Microsegmentation"
Refer to the exhibit. The two connected ports on
the switch are not turning orange or green. What
2, 4, 6
would be the most effective steps to troubleshoot
this physical layer problem?
"Which two features are characteristics of flash
memory? 1. Flash receives a copy of the IOS from
RAM when a device is powered on. 2. Flash
2&3 provides nonvolatile storage. 3. The contents of
flash may be overwritten. 4. Flash is a component
in Cisco switches but not in Cisco routers. 5. The
contents of flash may be lost during a power cycle."
A network administrator configures the interface
fa0/0 on the router R1 with the command ip
address 172.16.1.254 255.255.255.0. However,
The interface fa0/0 has not been
when the administrator issues the command show
activated.
ip route, the routing table does not show the directly
connected network. What is the possible cause of
the problem?
This memory stores router bootup instructions and
ROM
basic diagnostic software.
The AJ company has a small network. The network
consists of one switch and one router. The switch
has been configured with two VLANs. The router
has been configured as a router-on- a-stick to allow
two
inter-VLAN routing. A trunk is configured to connect
the switch to the router. Whatis the minimum
number of router subinterfaces that are required for
all the VLANs to communicate?
Which of the following is an element of converged
All of the choices
network?
Refer to the exhibit. The user at Workstation B
The gateway for Server A is not on the
reports that Server A cannot be reached. What is
same subnet.
preventing Workstation B from reaching Server A?
ISL & IEEE 802.1q Which are the 2 trunking protocols?
There is an activity and the port is In the Switch port LED status, if the LED is blinking
sending or receiving data. green what is the status of switch?
Load balancing allows a router to
Which statement describe a characteristicof load
forward packets over multiple paths to
balancing?
the same destination network.
Load balancing allows a router to
Which of the statements describe characteristic of
forward packets over multiple paths to
load balancing?
the same destination network.
"Refer to the exhibit. According to the routing table,
where will the router send a packet destined for
10.1.5.65? Network Interface Next-hop 10.1.1.0/24
e0 directly connected 10.1.2.0/24 e1 directly
10.1.3.3
connected 10.1.3.0/25 s0 directly connected
10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0
10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0
10.1.3.3 10.1.5.64/27 s1 10.1.4.4"
Which of the following describes Dynamic Trunking
All of the choices
Protocol?
"True of False. Ingress is used to describe frames
The correct answer is 'False'.
leaving the device through a particular port."
"Which two statements correctly describe the
concepts of administrative distance and metric? 1.
The metric varies depending which Layer 3 protocol
is being routed, such as IP. 2. A router first installs
4&5 routes with higher administrative distances. 3. The
value of the administrative distance can not be
altered by the network administrator. 4. Routes with
the smallest metric to a destination indicate the
best path. 5. Administrative distance refers to the
trustworthiness of a particular route. 6. The metric
is always determined based on hop count."
A switch is configured with all ports assigned to
An additional broadcast domain will be vlan 2 with full duplex FastEthernet to segment
created. existing departmental traffic. What is the effect of
adding switch ports to a new VLAN on the switch?
VLAN is a switching technology that reduces the
The correct answer is 'True'.
size of a broadcast domain.
"Which two statements correctly describe the
components of a router? 1. RAM permanently
stores the configuration file used during the boot
sequence. 2. ROM contains diagnostics executed
on hardware modules. 3. NVRAM stores a backup
2&4 copy of the IOS used during the boot sequence. 4.
Flash memory does not lose its contents during a
reboot. 5. ROM contains the most current and most
complete version of the IOS. 6. Flash contains boot
system commands to identify the location of the
IOS"
Router On Stick is a method used for
The correct answer is 'True'.
communicating inter-vlan using a router.
VLANis a switching technology that reduces the
The correct answer is 'True'.
size of a broadcast domain.
Which of the following would be good reasons to
1, 2 and 4
run NAT?
NAT Overload PAT Address Translation is also termed what?
Inbound ACLs are processed before
the packets are routed while outbound Which statement describes a difference between
ACLs are processed after the routing the operation of inbound and outbound ACLs?
is completed.
Addresses are allocated after a
negotiation between the server and How does a DHCP server dynamically assign IP
the host to determine the length of the address to host?
agreement.
1&5 What are two benefits of using NAT?
Which 3 statements describe the routing protocol
1, 3, 5
OSPF?
If all OSPF routers in a single area are configured
the highest IP address among its with the same priority value, what value does a
active interfaces router use for the OSPF router ID in the absence of
a loopback interface?
Which version of NAT allows many hosts inside a
private network to simultaneously use a single
PAT
inside global address for connecting to the
Internet?
Which command would you place on interface
ip nat outside
connected to the Internet?
As a network administrator of RMS Aerospace
Industries, you have been instructed to prevent all
traffic originating on the LAN from entering the R2
ip access-group 101 in
router. Which the following command would
implement the access list on the interface of the R2
router?
Which command will show you all the translations
show ip nat translations
active on your router?
A network administrator needs to configure a
standard ACL so that only the workstation of the
administrator with the IP address 192.168.15.23
1&2
can access the virtual terminal of the main router.
Which two configuration commands can achieve
the task?
Which command will allow you to see real-time
debug ipnat
translations on your router?
The following access list below was applied
All traffic exiting E0 will be denied outbound on the E0 interface connected to the
192.169.1.8/29 LAN:
Refer to the exhibit. If the router Cisco returns the
given output and has not had its router ID set
2.2.2.2
manually, what value will OSPF use as its router
ID?
The address is removed from the pool Refer to the exhibit. Which rule does the DHCP
until the conflict is resolved. server use when there is an IP address conflict?
Refer to the diagram below. The network
administrator of RMS Overseas and Employment
Agency that has the IP address of 10.0.70.23/25
needs to have access to the corporate FTP server
(10.0.54.5/28). The FTP server is also a web server
3&5
that is accessible to all internal employees on
networks within the 10.x.x.x address. No other
traffic should be allowed to this server. Which
extended ACL would be used to filter this traffic,
and how would this ACL be applied?
Which IPv4 address range covers all IP addresses
172.16.2.0 to 172.16.3.255 that match the ACL filter specified by 172.16.2.0
with wildcard mask 0.0.1.255?
Assign and renew IP address from the Which task does the Dynamic Host Configuration
default pool. Protocol perform?
The OSPF Hello protocol performs which of the
1&3
following tasks?
If an address conflict is detected, the
address is removed from the pool and Which statement is correct regarding the operation
will not be reused until the server is of DHCP?
rebooted.
Which IPv6 ACL command entry will permit traffic
Permit tcp any host
from any host to an SMTP server on network
2001:DB8:10:10::100 eq 25
2001:DB8:10:10::/64?
Which command will allow you to see real-time
debug ip nat
translations on your router?
"router ospf 1 network 10.1.1.0 What command sequence will configure a router to
0.0.0.255 area 0" run OSPF and add network 10.1.1.0 /24 to area 0?
When a DHCP server is configured, which two IP
3&6
addresses should never be assignable to hosts?
Which two statements describe the process
3&4 identifier that is used in the command to configure
OSPF on a router?
Permit all packets matching the first
The following configuration line was added to router
three octets of the source address to
R1
all destinations
They filter traffic based on source IP Which statement describes a characteristic of
addresses only. standard IPv4 ACLs?
Which 2 commands are required to properly
1&4 configure a router to run OSPF and to add network
192.168.16.0/24 to OSPF area 0?
Which parameter or parameters are used to
Bandwidth
calculate OSPF cost in Cisco routers?
What is the OSPF default frequency, in seconds, at
10 which a Cisco router sends hello packets on a
multiaccess network?
Which two characteristics are shared by both
3&5
standard and extended ACLs?
What is the default number of equal-cost paths that
4 can be placed into the routing of a Cisco OSPF
router?
Which two commands are required to properly
1&4 configure a router to run OSPF and to add network
192.168.16.0/24 to OSPF area 0?
to provide an IP configuration
What is the purpose of the DHCP server?
information to hosts
Relays a DHCP request across
The ip helper-address command does what?
networks
Which command will show you the summary of the
show ip nat statistics
NAT configuration?
Which of the following would be a good starting
Check your interfaces for the correct
point for troubleshooting if your router is not
configuration.
translating?
Refer to the exhibit. The network administrator that
has the IP address of 10.0.70.23/25 needs to have
access to the corporate FTP server (10.0.54.5/28).
The FTP server is also a web server that is
3&5 accessible to all internal employees on networks
within the 10.x.x.x address. No other traffic should
be allowed to this server. Which extended ACL
would be used to filter this traffic, and how would
this ACL be applied?
A network administrator is trying to add a new
router into an established OSPF network. The
networks attached to the new router do not appear
The network wildcard mask is
in the routing tables of the other OSPF routers.
configured improperly.
Given the information in the partial configuration
shown below, what configuration error is causing
this problem?
What are the two main types of access control lists
1 and 3
(ACLs)?
All hosts in the networks have been operational for
The hosts will continue to
several hours when the DHCP server goes down.
communicate normally for a period of
What happens to the hosts that have obtained
time.
service from the DHCP server?
OSPF routing uses the concept of areas. What are
2, 3, 5
the three characteristics of OSPF areas?
Which command is used to display the collection of
show ip ospf database
OSPF link states?
You can configure one access list, per Which statement about access lists that are applied
direction, per layer 3 protocol to an interface is true?
access-list 50 deny 192.168.1.1
Which item represents the standard IP ACL?
0.0.0.255
If an address conflict is detected, the
address is removed from the pool and Which statement is correct regarding the operation
an administrator must resolve the of DHCP?
conflict.
Which parameter would you tune to affect the
Administrative distance selection of a static route as a backup, when a
dynamic protocol is also being used?
As a network administrator, you have been
instructed to prevent all traffic originating on the
ip access-group 101 in LAN from entering the R2 router. Which the
following command would implement the access list
on the interface of the R2 router?
Refer to the graphic. It has been decided that PC1
should be denied access to Server. Which 2 of the
2&3 following commands are required to prevent only
PC1 from accessing Server1 while allowing all
other traffic to flow normally?
Which three statements describe the routing
1, 3, 5
protocol OSPF?
Which command will show you all the translations
show ipnat translations
active on your router?
If a router has two interfaces and is routing both
8 IPv4 and IPv6 traffic, how many ACLs could be
created and applied to it?
What two functions describe uses of an access
3&5
control list?
Which command would you place on interface
ipnat outside
connected to the Internet?
Refer to the exhibit. A junior network engineer in
one of the biggest telecom company in the
2&5 Philippines has prepared the exhibited
configuration file. What two statements are true of
the planned configuration for interface fa0/1?
When a DHCP server is configured, which two IP
4&6
addresses should never be assignable to hosts?
The OSPF Hello protocol performs which of the
1&3
following 2 tasks?
Which command would you place on interface on a
ip nat inside
private network?
Addresses are leased to host. A host
will usually keep the same address by How does a DHCP server dynamically assign IP
periodically contacting the DHCP address to host?
sever to renew the lease.
A network associate in Genesis Aerospace
2, 3, 6
Industries has configured OSPF with the command:
Which command will create a dynamic pool named
ip nat pool Todd 171.16.10.65
Todd that will provide you with 30 global
171.16.10.94 net 255.255.255.224
addresses?
Which command is used to determine if an IP
Show ip interface
access list is enabled on a particular interface?
What is the default administrative distance of
110
OSPF?
Which of the following are 3 disadvantages of using
1, 3, 5
NAT?
Which statement are generally considered to be
Place standard ACLs close to the
best practices in the placement of ACLs? (Choose
destination IP address of the traffic.
three.)
Refer to the exhibit. What will happen to HTTP
Traffic will be dropped, because of the
traffic coming from the Internet that is destined for
implicit deny all at the end of the ACL.
172.12.12.10 if the traffic is processed by this ACL?
1, 3, 5 Which of the following 3 methods/types of NAT?
Which two statements about static NAT translations
1&2
are true?
What is the default number of equal-cost paths that
4 can be placed into the routing of a Cisco OSPF
router?
Which router command allows you to view the
Show access-lists
entire contents of all access lists?
Refer to the exhibit. Which two statements are true
2&3 about the loopback address that is configured on
RouterB?
Which commands are required to properly
1&4 configure a router to run OSPF and to add network
192.168.16.0/24 to OSPF area 0?
1, 3, 5 Which three features are of OSPF routing protocol?
"router ospf 1 network 10.1.1.0 What command sequence will configure a router to
0.0.0.255 area 0" run OSPF and add network 10.1.1.0 /24 to area 0?
Which command will show you the summary of the
show ipnat statistics
NAT configuration?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy