The document provides information about networking concepts and technologies. It contains questions and answers related to networking protocols, devices, network types, and configurations.
The document provides information about networking concepts and technologies. It contains questions and answers related to networking protocols, devices, network types, and configurations.
Original Description:
Attempt Review
Original Title
Data Communications and Networking 1 and 2_All Answers
The document provides information about networking concepts and technologies. It contains questions and answers related to networking protocols, devices, network types, and configurations.
The document provides information about networking concepts and technologies. It contains questions and answers related to networking protocols, devices, network types, and configurations.
(config) # service password-encryption passwords from displaying in plain text in a
configuration file? Which type of network design combines voice, a converged network video, and data on the same communication channel? a farm in a rural area without wired In which scenario would the use of a WISP be broadband access recommended? a web page that groups of people can What is a wiki? edit and review an address that reaches a What type of address is 01-00-5E-0A-00-02? specific group of hosts An employee at a branch office is creating a quote for a customer. In order to do this, the employee an intranet needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? What type of communication will send a message broadcast to all devices on a local area network? Which message delivery option is used when all broadcast devices need to receive the same message simultaneously? Which two Internet connection options do not cellular, Satellite require that physical cables be run to the building? (Choose two.) Which term describes the state of a network when congestion the demand on the network resources exceeds the available capacity? What three functions are defined by data encoding, message size, delivery network protocols to allow communication between options known source and destination IP addresses? (Choose three.) Which logical address is used for delivery of data to destination IP address a remote network? Which two connection options provide an always- DSL, cable on, high-bandwidth Internet connection to computers in a home office? (Choose two.) A company is contemplating whether to use a easy to create, lacks centralized client/server or a peer-to-peer network. What are administration, less cost to implement three characteristics of a peer-to-peer network? (Choose three.) What process is used to place one message inside encapsulation another message for transfer from the source to the destination? Which command or key combination allows a user exit to return to the previous level in the command hierarchy? What method can be used by two computers to flow control ensure that packets are not dropped because too much data is being sent too quickly? how connection between nodes Which two factors influence the method that is used appears to the data link layer, how for media access control? (Choose two.) nodes share the media A web client is sending a request for a webpage to a web server. From the perspective of the client, HTTP, TCP, IP, Ethernet what is the correct order of the protocol stack that is used to prepare the request for transmission? Which organization develops the 802 family of IEEE standard for wired and wireless LANs and MANs? Intermediary devices direct the path of the data., Intermediary devices Which two statements describe intermediary connect individual hosts to the devices? (Choose two.) network. Which two engineering organizations define open International Telecommunication standards and protocols that apply to the data link Union (ITU) layer? is a private connection of LANs and WANs that belongs to an organization, and is designed to be Intranet accessible only by the members and employees of the organization, or others with authorization. What will a network administrator use to modify a IOS configuration on a Cisco router? it can rapidly adapt to the failure of network devices and communication links, Data packets can travel through For which three reasons was a packet switched the network using multiple different connectionless data communications technology paths, Network devices dynamically used when developing the Internet (Choose three.) decide on the best available path to forward each packet. Which statement describes a feature of an IOS host It does not allow spaces name configuration? What is a characteristic of a contention-based It is as nondeterministic method access method? An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a latency given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain In fiber optic meda, the signals are represented as light patterns of What type of delivery uses data link layer local delivery addresses? Which device acts as gateway to allow hosts to local router send traffic to remote IP networks? address is defined as a reserved address that loopback routes packets back to the host sublayer is responsible for communicating directly mac with the physical layer. Which interface command must be entered in a no switchport Layer 3 switch before IPv4 address can be assigned to the interface? Nothing must be done. Changes to An administrator has just changed the IP address the configuration on an IOS device of an interface on an IOS device. What else must take effect as soon as the command is be done in order to apply those changes to the typed correctly and the Enter key has device? been pressed. Products from different manufacturers What is an advantage of using standards to can interoperate successfully develop and implement protocols? providing a richer e-learning What are two benefits of collaboration and video- environment, providing better social on-demand applications? (Choose two.) media opportunities providing the rules required for a What is the purpose of protocols in data specific type of communication to communications? occur Which two message timing mechanisms are used response timeout, flow control in data communication? (Choose two.) Which device performs the function of determining router the path that messages should take through internet works? network is able to expand to accept new devices Scalable and applications without affecting performance. Which PDU is processed when a host computer is segment de-encapsulating a message at the transport layer of the TCP/IP model? The farther you are from the central office when slower utilizing a DSL connection, the During a routine inspection, a technician discovered that software that was installed on a computer was spyware secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer A network administrator needs to keep the user ID, SSH password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? A technician configures a switch with these SVI commands: To save time, IOS commands may be partially Tab entered and then completed by typing which key or key combination? The branch sites are connected to a What is a characteristic of a WAN hub-and-spoke central site through point-point links topology? the distance the selected medium can What two criteria are used to help select a network successfully carry a signal, the medium from various network media? (Choose environment where the selected two.) medium is to be installed The host portion of the IP addresses What happens when two devices on the same will be different subnet are communicating? The kernel provisions hardware What is the function of the kernel of an operating resources to meet software software? requirements. The network provides predictable Which statement describes a network that supports levels of service to different types of QoS? traffic the privileged executive mode What is encrypted with the enable secret password command? The throughput is predictable, Devices Which two statements are true of the deterministic take turns transmitting access method?(Choose two.) They define how messages are Which statement is correct about exchanged between the source and network protocols? the destination. They define how messages are Which statement is correct about exchanged between the sources and network protocols? the destination They originate the data that flows through the network., They are the What are two functions of end devices on a interface between humans and the network? (Choose two.) communication network. Which statement describes a characteristic of the They vary depending on protocols frame header fields of the data link layer? This is the default mode on an unconfigured router when first Which two statements are true regarding the user powered up., Only some aspects of EXEC mode? (Choose two.) the router configuration can be viewed to add a password to a Cisco network Why would a network administrator use the CLI of device the Cisco IOS? to copy an existing configuration into Why would a technician enter the command copy RAM startup-config running config? What is the purpose of the physical link control field to establish the media link in a data link layer header? to identify which network Which is a function of the Logical Link Control layer protocol is being used (LLC) sublayer? Which two components are added to the PDU at Trailer, frame header the network access layer? (Choose two.) A network administer has forgotten the argument of Type the command and then press an IOS command. How would the administrator get the? key help from the IOS CLI to complete the command correctly? Use the console port to locally access Which procedure is used to access a Cisco 2960 the switch from a serial or USB switch when performing an initial configuration in a interface of the PC. secure environment? A router has a valid operating system and a configuration file stored in NVRAM. The user EXEC mode configuration file contains an enable secret password but no console password. When the router boots up, which mode will display? A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each virtualization customer with a separate web server without having to allocate an actual discrete server for each customer. What is the network trend that is being implemented by the data center in this situation? when the end-user device will run an When is a wired connection preffered to a wireless application that requires a dedicated connection by an end-user device? connection to the network Which area of the network would a college IT staff most likely have to redesign as a direct result of wireless LAN many students bringing their own tablets and smartphones to school to access school resources? This is used between a network device and server Trunks or other device that is equipped with an appropriate 802.1Q-capable NIC. A switch forwarding method that makes a forwarding decision on a frame after it has received Store-and-forward switching the entire frame and then checked the frame for errors. A protocol that provides an encrypted connection to SSH a remote device. This layer provides intelligent switching, routing, Distribution layer and network access policy functions to access the rest of the network. 22 SSH protocol by default uses Port ______. Access, distribution and Core layer What are the 3 layers of the distribution access? The _____ switches typically come with different Modular configuration sized chassis that allow for the installation of different numbers of line card. If the port is assigned to the wrong VLAN, what Switchport access vlan command to be command to change the VLAN membership on a particular port? This is a point-to-point link between two network Trunks devices that carries more than one VLAN. This attack tries to crack a password on another device. The first phase of this attack starts with the Brute force password attack attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list. What is the status of the Port speed LED if the LED The port is operating at 1000 Mbps. light is blinking green? Core layer This layer is considered as the network backbone. A type of VLAN that is configured to carry user- Data VLAN generated traffic. What is the status of the Port speed LED if the LED The port is operating at 100 Mbps. light is green? To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command show interfaces trunk to be used to check whether the local and peer native VLANs match? A collection of interconnected switches forms a Broadcast domain _______________________. This type of attack takes advantage of the way that hardware on most switches operates. Most Double Tagging Attack switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. 23 Telnet protocol by default uses Port ______. Which of the following is the command to configure Ip domain-name mycompany.com the IP domain name of the network (mycompany.com) Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces Which of the following is NOT a benefit of VLAN? unnecessary traffic on the network and boosts performance. Which of the following is NOT a feature of a None of the choices Switched Network In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely Telnet DoS attack accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. Global configuration mode is used to configure system globally, or to enter specific configuration configure terminal modes to configure specific elements such as protocols. What is the command to enter global configuration mode? between 1006 and 4094 The extended range of VLAN ID is Which of the following is NOT an element of None of the choices converged network? A switch forwarding method that begins the forwarding process after the destination MAC Cut-through switch method address of an incoming frame and the egress port has been determined. The default VLAN for Cisco switches is VLAN 1 ____________________. The ________________ switches do not support Fixed configuration features or options beyond those that originally came with the switch. This is a conduit for multiple VLANs between Trunks switches and routers. In troubleshooting VLANs, what command should show vlan be used to check whether the port belongs to the expected VLAN? This is a protocol that is used to synchronize the Network Time Protocol clocks of computer systems over packet-switched, variable-latency data networks. The primary function of this layer is to provide Access layer network access to the user. The network segments that share the same Collision domain bandwidth between devices. This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco Cisco Discovery Protocol devices that are directly connected, which allows the devices to auto-configure their connection. Do not use the dynamic auto or What is the best practice relative to switch port dynamic desirable. modes? This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent DHCP Snooping unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices. All of the Choices VLAN IDs 1002 through 1005 are reserved for What is the command to assign the port to a switchport access vlanvlan-id particular VLAN when the interface is in access mode? What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use DHCP spoofing attack false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. Which of the following is the command to configure Ip default-gateway 172.10.90.1 the switch default gateway with IP address of 172.10.90.1? Sometimes switch ports must manually have their duplex mode manually configured. This duplex Full duplex mode mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously. What is the command to create a VLAN with a valid Vlan 30 VLAN ID number 30? This layer provide fault isolation and high-speed Core layer backbone connectivity. A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward compatibility Native VLAN with untagged traffic common to legacy LAN scenarios. The following are switch port modes that DTP Remote offers EXCEPT This is the practice of inserting a VLAN ID into a VLAN tagging packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to. Stackable that are arranged one on top of the other Daisy Chain with cables linking the switches in a _____________ connection. Dynamic Trunking Protocol is disable Which of the following describes Dynamic Trunking by default. Protocol? What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server DHCP starvation attack can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access. What is the command to configure the interface to speed auto automatically negotiate speed with the connected device? If an error occurs while loading the operating system because of missing or damaged system Mode files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord? Join native VLAN to VLAN. The following are VLAN best practices EXCEPT? Configurations are stored within a VLAN database vlan.dat file, called What is the command to set the IP address ip address 192.168.10.2 255.255.0.0 (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface? There is activity and the port is In the Switch port LED status, if the LED is blinking sending or receiving data. green what is the status of switch? This is used to connect a PC to the console port of Console cable a switch for configuration. Which of the following is the command to specify a name employee VLAN name? Name of VLAN is employee. VLANs are based on logical connections, instead of physical Which of the following describes a VLAN? connections. What is the command used to determine the status show ip interface brief of both physical and virtual interfaces including IP address? A switch populates the MAC address table based on destination MAC Which of the following statement is INCORRECT? addresses. Native VLAN Which is the VLAN not tagged by 802.1q? A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How Implement a router-on-a-stick can you accomplish this task, using the fewest configuration. physical interfaces and without decreasing network performance? Which command is used to configure an IPv6 ipv6 address ipv6-address/prefix- address on a router interface so that the router will length eui-64 combine a manually specified network prefix with an automatically generated interface identifier? This is the path over which the data is transferred in logical topology a network. It describes how the network devices appear connected to network users. None of the choices The following are VLAN best practices EXCEPT? This layer provide fault isolation and high-speed Core layer backbone onnectivity. This is the arrangement of the cables, network devices, and end systems. It describes how the physical topology network devices are actually interconnected with wires and cables. "Which two network parameters are used by EIGRP as metrics to select the best path to reach a 2&5 network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config There is an incorrect IP address command output. PCs on VLAN 45 that are using configured on GigabitEthernet 0/0.30.* the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? Routers compare metrics to determine Which statement is true regarding routing metrics? the best path. This memory provides temporary storage for various applications and processes, including the RAM running IOS, the running configuration file, IP routing table, Ethernet ARP table. "Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 2&4 3. Domain name resolution 4. Path selection 5. Flow control" Refer to the exhibit below. Which two statements 1&5 about the configuration of the switch interface are correct? If your routing table has a static, a RIP, and an Static route OSPF route to the same network, which route will be used to route packets by default? Routers support a variety of interface What is one feature that distinguishes routers from types. Switches typically support Layer 2 switches? Ethernet interfaces. Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? "To enable network access to a remote destination, what three pieces of information must be 1, 5, 6 configured on a host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask" Which two link protocols are used to carry multiple 802.1q & ISL VLANs over a single link? None of the choices Which of the following describes a VLAN? "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be 2&3 overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." What route would have the lowest administrative A directly connected network distance? It is a logical interface internal to the What is a characteristic of an IPv4 loopback router. interface on a Cisco IOS router? Which protocolis used to configure trunking on a 802.1q switch? Which protocols are used to configure trunking on a 802.1q switch? "Which two link protocols are used to carry multiple 2&4 VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the 4&5 administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." Network infrastructure devices require IP addresses to enable remote management. Using None in the choices the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT Which of the following is NOT a characteristics of a All of the choices network? Process, Fast, Cisco Express Routers support three packet-forwarding Forwarding mechanisms. These are "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 5 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" If your routing table has a static, a RIP, and an Static route IGRP route to the same network, which route will be used to route packets by default? The FastEthernet 0/0 interface on Refer to the exhibit. Which statement are true about Router1 must be configured with interVLAN routing in the topology that is shown in subinterfaces. the exhibit? "The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. 1&4 Domain name resolution 4. Path selection 5. Microsegmentation" Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What 2, 4, 6 would be the most effective steps to troubleshoot this physical layer problem? "Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash 2&3 provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle." A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, The interface fa0/0 has not been when the administrator issues the command show activated. ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? This memory stores router bootup instructions and ROM basic diagnostic software. The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow two inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? Which of the following is an element of converged All of the choices network? Refer to the exhibit. The user at Workstation B The gateway for Server A is not on the reports that Server A cannot be reached. What is same subnet. preventing Workstation B from reaching Server A? ISL & IEEE 802.1q Which are the 2 trunking protocols? There is an activity and the port is In the Switch port LED status, if the LED is blinking sending or receiving data. green what is the status of switch? Load balancing allows a router to Which statement describe a characteristicof load forward packets over multiple paths to balancing? the same destination network. Load balancing allows a router to Which of the statements describe characteristic of forward packets over multiple paths to load balancing? the same destination network. "Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 directly 10.1.3.3 connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4" Which of the following describes Dynamic Trunking All of the choices Protocol? "True of False. Ingress is used to describe frames The correct answer is 'False'. leaving the device through a particular port." "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs 4&5 routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." A switch is configured with all ports assigned to An additional broadcast domain will be vlan 2 with full duplex FastEthernet to segment created. existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? VLAN is a switching technology that reduces the The correct answer is 'True'. size of a broadcast domain. "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup 2&4 copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS" Router On Stick is a method used for The correct answer is 'True'. communicating inter-vlan using a router. VLANis a switching technology that reduces the The correct answer is 'True'. size of a broadcast domain. Which of the following would be good reasons to 1, 2 and 4 run NAT? NAT Overload PAT Address Translation is also termed what? Inbound ACLs are processed before the packets are routed while outbound Which statement describes a difference between ACLs are processed after the routing the operation of inbound and outbound ACLs? is completed. Addresses are allocated after a negotiation between the server and How does a DHCP server dynamically assign IP the host to determine the length of the address to host? agreement. 1&5 What are two benefits of using NAT? Which 3 statements describe the routing protocol 1, 3, 5 OSPF? If all OSPF routers in a single area are configured the highest IP address among its with the same priority value, what value does a active interfaces router use for the OSPF router ID in the absence of a loopback interface? Which version of NAT allows many hosts inside a private network to simultaneously use a single PAT inside global address for connecting to the Internet? Which command would you place on interface ip nat outside connected to the Internet? As a network administrator of RMS Aerospace Industries, you have been instructed to prevent all traffic originating on the LAN from entering the R2 ip access-group 101 in router. Which the following command would implement the access list on the interface of the R2 router? Which command will show you all the translations show ip nat translations active on your router? A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 1&2 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? Which command will allow you to see real-time debug ipnat translations on your router? The following access list below was applied All traffic exiting E0 will be denied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: Refer to the exhibit. If the router Cisco returns the given output and has not had its router ID set 2.2.2.2 manually, what value will OSPF use as its router ID? The address is removed from the pool Refer to the exhibit. Which rule does the DHCP until the conflict is resolved. server use when there is an IP address conflict? Refer to the diagram below. The network administrator of RMS Overseas and Employment Agency that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server 3&5 that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? Which IPv4 address range covers all IP addresses 172.16.2.0 to 172.16.3.255 that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255? Assign and renew IP address from the Which task does the Dynamic Host Configuration default pool. Protocol perform? The OSPF Hello protocol performs which of the 1&3 following tasks? If an address conflict is detected, the address is removed from the pool and Which statement is correct regarding the operation will not be reused until the server is of DHCP? rebooted. Which IPv6 ACL command entry will permit traffic Permit tcp any host from any host to an SMTP server on network 2001:DB8:10:10::100 eq 25 2001:DB8:10:10::/64? Which command will allow you to see real-time debug ip nat translations on your router? "router ospf 1 network 10.1.1.0 What command sequence will configure a router to 0.0.0.255 area 0" run OSPF and add network 10.1.1.0 /24 to area 0? When a DHCP server is configured, which two IP 3&6 addresses should never be assignable to hosts? Which two statements describe the process 3&4 identifier that is used in the command to configure OSPF on a router? Permit all packets matching the first The following configuration line was added to router three octets of the source address to R1 all destinations They filter traffic based on source IP Which statement describes a characteristic of addresses only. standard IPv4 ACLs? Which 2 commands are required to properly 1&4 configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? Which parameter or parameters are used to Bandwidth calculate OSPF cost in Cisco routers? What is the OSPF default frequency, in seconds, at 10 which a Cisco router sends hello packets on a multiaccess network? Which two characteristics are shared by both 3&5 standard and extended ACLs? What is the default number of equal-cost paths that 4 can be placed into the routing of a Cisco OSPF router? Which two commands are required to properly 1&4 configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? to provide an IP configuration What is the purpose of the DHCP server? information to hosts Relays a DHCP request across The ip helper-address command does what? networks Which command will show you the summary of the show ip nat statistics NAT configuration? Which of the following would be a good starting Check your interfaces for the correct point for troubleshooting if your router is not configuration. translating? Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is 3&5 accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear The network wildcard mask is in the routing tables of the other OSPF routers. configured improperly. Given the information in the partial configuration shown below, what configuration error is causing this problem? What are the two main types of access control lists 1 and 3 (ACLs)? All hosts in the networks have been operational for The hosts will continue to several hours when the DHCP server goes down. communicate normally for a period of What happens to the hosts that have obtained time. service from the DHCP server? OSPF routing uses the concept of areas. What are 2, 3, 5 the three characteristics of OSPF areas? Which command is used to display the collection of show ip ospf database OSPF link states? You can configure one access list, per Which statement about access lists that are applied direction, per layer 3 protocol to an interface is true? access-list 50 deny 192.168.1.1 Which item represents the standard IP ACL? 0.0.0.255 If an address conflict is detected, the address is removed from the pool and Which statement is correct regarding the operation an administrator must resolve the of DHCP? conflict. Which parameter would you tune to affect the Administrative distance selection of a static route as a backup, when a dynamic protocol is also being used? As a network administrator, you have been instructed to prevent all traffic originating on the ip access-group 101 in LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router? Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the 2&3 following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? Which three statements describe the routing 1, 3, 5 protocol OSPF? Which command will show you all the translations show ipnat translations active on your router? If a router has two interfaces and is routing both 8 IPv4 and IPv6 traffic, how many ACLs could be created and applied to it? What two functions describe uses of an access 3&5 control list? Which command would you place on interface ipnat outside connected to the Internet? Refer to the exhibit. A junior network engineer in one of the biggest telecom company in the 2&5 Philippines has prepared the exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1? When a DHCP server is configured, which two IP 4&6 addresses should never be assignable to hosts? The OSPF Hello protocol performs which of the 1&3 following 2 tasks? Which command would you place on interface on a ip nat inside private network? Addresses are leased to host. A host will usually keep the same address by How does a DHCP server dynamically assign IP periodically contacting the DHCP address to host? sever to renew the lease. A network associate in Genesis Aerospace 2, 3, 6 Industries has configured OSPF with the command: Which command will create a dynamic pool named ip nat pool Todd 171.16.10.65 Todd that will provide you with 30 global 171.16.10.94 net 255.255.255.224 addresses? Which command is used to determine if an IP Show ip interface access list is enabled on a particular interface? What is the default administrative distance of 110 OSPF? Which of the following are 3 disadvantages of using 1, 3, 5 NAT? Which statement are generally considered to be Place standard ACLs close to the best practices in the placement of ACLs? (Choose destination IP address of the traffic. three.) Refer to the exhibit. What will happen to HTTP Traffic will be dropped, because of the traffic coming from the Internet that is destined for implicit deny all at the end of the ACL. 172.12.12.10 if the traffic is processed by this ACL? 1, 3, 5 Which of the following 3 methods/types of NAT? Which two statements about static NAT translations 1&2 are true? What is the default number of equal-cost paths that 4 can be placed into the routing of a Cisco OSPF router? Which router command allows you to view the Show access-lists entire contents of all access lists? Refer to the exhibit. Which two statements are true 2&3 about the loopback address that is configured on RouterB? Which commands are required to properly 1&4 configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? 1, 3, 5 Which three features are of OSPF routing protocol? "router ospf 1 network 10.1.1.0 What command sequence will configure a router to 0.0.0.255 area 0" run OSPF and add network 10.1.1.0 /24 to area 0? Which command will show you the summary of the show ipnat statistics NAT configuration?