Data Communications and Networking 2

UGRD-IT6223 Data Communications and Networking 2

 (Cisco 2) is all about network routing and switching essentials. In this course you will have a clear understanding in what are routers, and switches are all about and its purpose. Also in this course we’ve prepared for you well suited laboratory exercises for you to gain knowledge and skills in configuring these devices in different scenarios and in different networking environments. In between you will have some tips or pointers for you to make things easier. This course will not just help you to understand topics easier but prepare you in the real life networking environment and help you in passing some Cisco certification exams. For this course, it is essential at least you have a basic background in networking and you need to download Cisco Packet Tracer Student software as your simulation tool for the labs.


Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

Store-and-forward switching

A switch forwarding method that makes a forwarding decision on a frame after it has received the entire frame and then checked the frame for errors.

SSH

A protocol that provides an encrypted connection to a remote device.

Distribution layer

This layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.

22

SSH protocol by default uses Port ______.

Access, distribution and Core layer

What are the 3 layers of the distribution access?

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

Switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

Brute force password attack

This attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list.

The port is operating at 1000 Mbps.

What is the status of the Port speed LED if the LED light is blinking green?

Core layer

This layer is considered as the network backbone.

Data VLAN

A type of VLAN that is configured to carry user-generated traffic.

The port is operating at 100 Mbps.

What is the status of the Port speed LED if the LED light is green?

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

Broadcast domain

A collection of interconnected switches forms a _______________________.

Double Tagging Attack

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.

23

Telnet protocol by default uses Port ______.

Ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces unnecessary traffic on the network and boosts performance.

Which of the following is NOT a benefit of VLAN?

None of the choices

Which of the following is NOT a feature of a Switched Network

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

configure terminal

Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?

between 1006 and 4094

The extended range of VLAN ID is

None of the choices

Which of the following is NOT an element of converged network?

Cut-through switch method

A switch forwarding method that begins the forwarding process after the destination MAC address of an incoming frame and the egress port has been determined.

VLAN 1

The default VLAN for Cisco switches is ____________________.

Fixed configuration

The ________________ switches do not support features or options beyond those that originally came with the switch.

Trunks

This is a conduit for multiple VLANs between switches and routers.

show vlan

In troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN?

Network Time Protocol

This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.

Access layer

The primary function of this layer is to provide network access to the user.

Collision domain

The network segments that share the same bandwidth between devices.

Cisco Discovery Protocol

This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection.

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

DHCP Snooping

This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices.

All of the Choices

VLAN IDs 1002 through 1005 are reserved for

switchport access vlanvlan-id

What is the command to assign the port to a particular VLAN when the interface is in access mode?

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

Ip default-gateway 172.10.90.1

Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?

Full duplex mode

Sometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.

Vlan 30

What is the command to create a VLAN with a valid VLAN ID number 30?

Core layer

This layer provide fault isolation and high-speed backbone connectivity.

Native VLAN

A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward compatibility with untagged traffic common to legacy LAN scenarios.

Remote

The following are switch port modes that DTP offers EXCEPT

VLAN tagging

This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

Dynamic Trunking Protocol is disable by default.

Which of the following describes Dynamic Trunking Protocol?

DHCP starvation attack

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.

speed auto

What is the command to configure the interface to automatically negotiate speed with the connected device?

Mode

If an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?

Join native VLAN to VLAN.

The following are VLAN best practices EXCEPT?

vlan.dat

Configurations are stored within a VLAN database file, called

ip address 192.168.10.2 255.255.0.0

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?

There is activity and the port is sending or receiving data.

In the Switch port LED status, if the LED is blinking green what is the status of switch?

Console cable

This is used to connect a PC to the console port of a switch for configuration.

name employee

Which of the following is the command to specify a VLAN name? Name of VLAN is employee.

VLANs are based on logical connections, instead of physical connections.

Which of the following describes a VLAN?

show ip interface brief

What is the command used to determine the status of both physical and virtual interfaces including IP address?

A switch populates the MAC address table based on destination MAC addresses.

Which of the following statement is INCORRECT?

Native VLAN

Which is the VLAN not tagged by 802.1q?

Implement a router-on-a-stick configuration.

A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

logical topology

This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

None of the choices

The following are VLAN best practices EXCEPT?

Core layer

This layer provide fault isolation and high-speed backbone onnectivity.

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

2 & 5

"Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality"

Trunks

This is a conduit for multiple VLANs between switches and routers.

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

Double Tagging Attack

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

Routers compare metrics to determine the best path.

Which statement is true regarding routing metrics?

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

Access layer

The primary function of this layer is to provide network access to the user.

ip default-gateway 172.10.90.1

Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?

SSH

A protocol that provides an encrypted connection to a remote device.

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

1 & 5

Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct?

Static route

If your routing table has a static, a RIP, and an OSPF route to the same network, which route will be used to route packets by default?

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

Collision domain

The network segments that share the same bandwidth between devices.

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

Data VLAN

A type of VLAN that is configured to carry user-generated traffic.

1, 5, 6

"To enable network access to a remote destination, what three pieces of information must be configured on a host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask"

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

VLAN tagging

This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.

DHCP starvation attack

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.

Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

None of the choices

Which of the following describes a VLAN?

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

A directly connected network

What route would have the lowest administrative distance?

Fixed configuration

The ________________ switches do not support features or options beyond those that originally came with the switch.

Cisco Discovery Protocol

This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection.

It is a logical interface internal to the router.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?

802.1q

Which protocolis used to configure trunking on a switch?

802.1q

Which protocols are used to configure trunking on a switch?

2 & 4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

Trunks

This is a conduit for multiple VLANs between switches and routers.

It is a logical interface internal to the router.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?

1 & 5

Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct?

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

Native VLAN

Which is the VLAN not tagged by 802.1q?

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

A directly connected network

What route would have the lowest administrative distance?

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

None of the choices

The following are VLAN best practices EXCEPT?

switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

None in the choices

Network infrastructure devices require IP addresses to enable remote management. Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT

All of the choices

Which of the following is NOT a characteristics of a network?

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

Network Time Protocol

This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.

2, 4, 5

"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

Static route

If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?

The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

Refer to the exhibit. Which statement are true about interVLAN routing in the topology that is shown in the exhibit?

1 & 4

"The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation"

2, 4, 6

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

logical topology

This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

2 & 3

"Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle."

802.1q

Which protocols are used to configure trunking on a switch?

Implement a router-on-a-stick configuration.

A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

2 & 4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

ROM

This memory stores router bootup instructions and basic diagnostic software.

two

The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?

Fixed configuration

The ________________ switches do not support features or options beyond those that originally came with the switch.

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

vlan 30

What is the command to create a VLAN with a valid VLAN ID number 30?

Core layer

This layer provide fault isolation and high-speed backbone onnectivity.

2 & 4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

All of the choices

Which of the following is an element of converged network?

The gateway for Server A is not on the same subnet.

Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?

23

Telnet protocol by default uses Port ______.

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

name employee

Which of the following is the command to specify a VLAN name? Name of VLAN is employee.

show vlan

In troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN?

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

ROM

This memory stores router bootup instructions and basic diagnostic software.

1, 5, 6

"To enable network access to a remote destination, what three pieces of information must be configured on a host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask"

SSH

A protocol that provides an encrypted connection to a remote device.

There is an activity and the port is sending or receiving data.

In the Switch port LED status, if the LED is blinking green what is the status of switch?

Load balancing allows a router to forward packets over multiple paths to the same destination network.

Which statement describe a characteristicof load balancing?

vlan.dat

Configurations are stored within a VLAN database file, called

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

Load balancing allows a router to forward packets over multiple paths to the same destination network.

Which of the statements describe characteristic of load balancing?

Network Time Protocol

This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.

The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

Refer to the exhibit. Which statement are true about interVLAN routing in the topology that is shown in the exhibit?

Routers compare metrics to determine the best path.

Which statement is true regarding routing metrics?

VLAN 1

The default VLAN for Cisco switches is ____________________.

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

Native VLAN

Which is the VLAN not tagged by 802.1q?

All of the choices

Which of the following is NOT a characteristics of a network?

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

10.1.3.3

"Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4"

802.1q

Which protocolis used to configure trunking on a switch?

2, 4, 5

"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"

ip default-gateway 172.10.90.1

Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

All of the choices

Which of the following describes Dynamic Trunking Protocol?

A directly connected network

What route would have the lowest administrative distance?

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

show vlan

In troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN?

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

The correct answer is 'False'.

"True of False. Ingress is used to describe frames leaving the device through a particular port."

2, 4, 5

"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"

1 & 4

"The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation"

vlan 30

What is the command to create a VLAN with a valid VLAN ID number 30?

None of the choices

Which of the following describes a VLAN?

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

An additional broadcast domain will be created.

A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

The correct answer is 'True'.

VLAN is a switching technology that reduces the size of a broadcast domain.

2, 4, 6

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?

Data VLAN

A type of VLAN that is configured to carry user-generated traffic.

Collision domain

The network segments that share the same bandwidth between devices.

2 & 4

"Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS"

Distribution layer

This layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.

802.1q

Which protocolis used to configure trunking on a switch?

no shutdown

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

None of the choices

The following are VLAN best practices EXCEPT?

The correct answer is 'True'.

Router On Stick is a method used for communicating inter-vlan using a router.

2 & 4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

vlan.dat

Configurations are stored within a VLAN database file, called

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

The port is operating at 1000 Mbps.

What is the status of the Port speed LED if the LED light is blinking green?

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

Access layer

The primary function of this layer is to provide network access to the user.

10.1.3.3

"Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4"

The correct answer is 'True'.

VLANis a switching technology that reduces the size of a broadcast domain.

Static route

If your routing table has a static, a RIP, and an OSPF route to the same network, which route will be used to route packets by default?

ip default-gateway 172.10.90.1

Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?

Load balancing allows a router to forward packets over multiple paths to the same destination network.

Which of the statements describe characteristic of load balancing?

All of the choices

Which of the following is NOT a characteristics of a network?

All of the choices

Which of the following is an element of converged network?

logical topology

This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

Double Tagging Attack

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

ip address 192.168.10.2 255.255.0.0

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?

two

The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?

SSH

A protocol that provides an encrypted connection to a remote device.

VLAN tagging

This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.

2 & 4

"Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS"

The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

Refer to the exhibit. Which statement are true about interVLAN routing in the topology that is shown in the exhibit?

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

Static route

If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

logical topology

This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

Double Tagging Attack

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.

VLAN 1

The default VLAN for Cisco switches is ____________________.

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

2 & 5

"Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality"

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

802.1q

Which protocols are used to configure trunking on a switch?

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

There is an activity and the port is sending or receiving data.

In the Switch port LED status, if the LED is blinking green what is the status of switch?

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

All of the choices

Which of the following is an element of converged network?

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

Trunks

This is a conduit for multiple VLANs between switches and routers.

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

Implement a router-on-a-stick configuration.

A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

Routers compare metrics to determine the best path.

Which statement is true regarding routing metrics?

ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

Access layer

The primary function of this layer is to provide network access to the user.

All of the choices

Which of the following is NOT a characteristics of a network?

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

The port is operating at 1000 Mbps.

What is the status of the Port speed LED if the LED light is blinking green?

2, 4, 5

"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"

Distribution layer

This layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.

Fixed configuration

The ________________ switches do not support features or options beyond those that originally came with the switch.

802.1q

Which protocols are used to configure trunking on a switch?

ROM

This memory stores router bootup instructions and basic diagnostic software.

An additional broadcast domain will be created.

A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

1 & 5

Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct?

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

name employee

Which of the following is the command to specify a VLAN name? Name of VLAN is employee.

two

The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?

2, 4, 6

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?

Static route

If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?

Network Time Protocol

This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

ip default-gateway 172.10.90.1

Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

802.1q & ISL

Which two link protocols are used to carry multiple VLANs over a single link?

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

2 & 5

"Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality"

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

Implement a router-on-a-stick configuration.

A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

None of the choices

Which of the following describes a VLAN?

Core layer

This layer provide fault isolation and high-speed backbone onnectivity.

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

There is an activity and the port is sending or receiving data.

In the Switch port LED status, if the LED is blinking green what is the status of switch?

ip address 192.168.10.2 255.255.0.0

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?

Native VLAN

Which is the VLAN not tagged by 802.1q?

switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

A directly connected network

What route would have the lowest administrative distance?

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

logical topology

This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.

Static route

If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

2 & 5

"Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality"

ip domain-name mycompany.com

Which of the following is the command to configure the IP domain name of the network (mycompany.com)

VLAN tagging

This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.

2, 4, 6

Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?

switchport access vlan

If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

None in the choices

Network infrastructure devices require IP addresses to enable remote management. Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT

Access layer

The primary function of this layer is to provide network access to the user.

Native VLAN

Which is the VLAN not tagged by 802.1q?

1, 5, 6

"To enable network access to a remote destination, what three pieces of information must be configured on a host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask"

Trunks

This is a conduit for multiple VLANs between switches and routers.

The interface fa0/0 has not been activated.

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

The gateway for Server A is not on the same subnet.

Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.

Refer to the exhibit. Which statement are true about interVLAN routing in the topology that is shown in the exhibit?

vlan.dat

Configurations are stored within a VLAN database file, called

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

All of the choices

Which of the following is an element of converged network?

Core layer

This layer provide fault isolation and high-speed backbone onnectivity.

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

physical topology

This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

ipv6 address ipv6-address/prefix-length eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

Core layer

This layer provide fault isolation and high-speed backbone onnectivity.

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

Do not use the dynamic auto or dynamic desirable.

What is the best practice relative to switch port modes?

None of the choices

The following are VLAN best practices EXCEPT?

2 & 4

"Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS"

ISL & IEEE 802.1q

Which are the 2 trunking protocols?

two

The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?

The gateway for Server A is not on the same subnet.

Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?

Trunks

This is a point-to-point link between two network devices that carries more than one VLAN.

Network Time Protocol

This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.

Process, Fast, Cisco Express Forwarding

Routers support three packet-forwarding mechanisms. These are

There is an activity and the port is sending or receiving data.

In the Switch port LED status, if the LED is blinking green what is the status of switch?

Double Tagging Attack

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

2 & 4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

2 & 3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

Daisy Chain

Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.

show interfaces trunk

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?

DHCP spoofing attack

What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.

4 & 5

"Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

None in the choices

Network infrastructure devices require IP addresses to enable remote management. Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT

vlan.dat

Configurations are stored within a VLAN database file, called

2 & 4

"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"

All of the choices

Which of the following is an element of converged network?

1 & 4

"The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation"

 

The address is removed from the pool until the conflict is resolved.Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?
2 & 4"Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS"
2, 3, 2005OSPF routing uses the concept of areas. What are the three characteristics of OSPF areas?
ip address 192.168.10.2 255.255.0.0What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?
Administrative distanceWhich parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?
1, 3, 2005Which of the following 3 methods/types of NAT?
110What is the default administrative distance of OSPF?
1, 3, 2005Which three statements describe the routing protocol OSPF?
Implement a router-on-a-stick configuration.A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?
None of the choicesWhich of the following is NOT an element of converged network?
The port is operating at 1000 Mbps.What is the status of the Port speed LED if the LED light is blinking green?
2, 3, 2006A network associate in Genesis Aerospace Industries has configured OSPF with the command:
3 & 5What two functions describe uses of an access control list?
2 & 3Which two features are characteristics of flash memory?
1. Flash receives a copy of the IOS from RAM when a device is powered on.
2. Flash provides nonvolatile storage.
3. The contents of flash may be overwritten.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. The contents of flash may be lost during a power cycle.
Process, Fast, Cisco Express ForwardingRouters support three packet-forwarding mechanisms. These are
1, 3, 2005Which 3 statements describe the routing protocol OSPF?
1 & 3The OSPF Hello protocol performs which of the following tasks?
Assign and renew IP address from the default pool.Which task does the Dynamic Host Configuration Protocol perform?
Native VLANA type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward compatibility with untagged traffic common to legacy LAN scenarios.
Core layerThis layer is considered as the network backbone.
2.2.2.2Refer to the exhibit. If the router Cisco returns the given output and has not had its router ID set manually, what value will OSPF use as its router ID?
Access, distribution and Core layerWhat are the 3 layers of the distribution access?
Cisco Discovery ProtocolThis is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection.
1 & 4Which 2 commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?
Native VLANWhich is the VLAN not tagged by 802.1q?
vlan.datConfigurations are stored within a VLAN database file, called
Broadcast domainA collection of interconnected switches forms a _______________________.
802.1qWhich protocols are used to configure trunking on a switch?
Collision domainThe network segments that share the same bandwidth between devices.
ip address 192.168.10.2 255.255.0.0What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?
Cut-through switch methodA switch forwarding method that begins the forwarding process after the destination MAC address of an incoming frame and the egress port has been determined.
2 & 3"Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle."
ipv6 address ipv6-address/prefix-length eui-64Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?
Place standard ACLs close to the destination IP address of the traffic.Which statement are generally considered to be best practices in the placement of ACLs? (Choose three.)
1 & 5Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct?
All of the ChoicesVLAN IDs 1002 through 1005 are reserved for
between 1006 and 4094The extended range of VLAN ID is
The correct answer is 'True'.VLANis a switching technology that reduces the size of a broadcast domain.
4 & 6When a DHCP server is configured, which two IP addresses should never be assignable to hosts?
Static routeIf your routing table has a static, a RIP, and an OSPF route to the same network, which route will be used to route packets by default?
23Telnet protocol by default uses Port ______.
VLANs are based on logical connections, instead of physical connections.Which of the following describes a VLAN?
RemoteThe following are switch port modes that DTP offers EXCEPT
Access layerThe primary function of this layer is to provide network access to the user.
The hosts will continue to communicate normally for a period of time.All hosts in the networks have been operational for several hours when the DHCP server goes down. What happens to the hosts that have obtained service from the DHCP server?
The correct answer is 'True'.VLAN is a switching technology that reduces the size of a broadcast domain.
1, 3, 2005Which three features are of OSPF routing protocol?
debug ipnatWhich command will allow you to see real-time translations on your router?
VLAN taggingThis is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.
3 & 5Refer to the diagram below. The network administrator of RMS Overseas and Employment Agency that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied?
Modular configurationThe _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.
Load balancing allows a router to forward packets over multiple paths to the same destination network.Which statement describe a characteristicof load balancing?
Telnet DoS attackIn this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.Which statement describes a difference between the operation of inbound and outbound ACLs?
1, 3, 2005Which of the following are 3 disadvantages of using NAT?
to provide an IP configuration information to hostsWhat is the purpose of the DHCP server?
2 & 3Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally?
Double Tagging AttackThis type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.
Traffic will be dropped, because of the implicit deny all at the end of the ACL.Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.12.12.10 if the traffic is processed by this ACL?
NAT OverloadPAT Address Translation is also termed what?
802.1q & ISLWhich two link protocols are used to carry multiple VLANs over a single link?
Data VLANA type of VLAN that is configured to carry user-generated traffic.
BandwidthWhich parameter or parameters are used to calculate OSPF cost in Cisco routers?
Full duplex modeSometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.
A switch populates the MAC address table based on destination MAC addresses.Which of the following statement is INCORRECT?
None in the choicesNetwork infrastructure devices require IP addresses to enable remote management. Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT
Distribution layerThis layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.
DHCP SnoopingThis is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices.
2, 4, 2005"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"
10What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multiaccess network?
Switchport access vlanIf the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?
2 & 4"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
2 & 3"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."
TrunksThis is a conduit for multiple VLANs between switches and routers.
1 & 2A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task?
VLAN 1The default VLAN for Cisco switches is ____________________.
22SSH protocol by default uses Port ______.
ip access-group 101 inAs a network administrator of RMS Aerospace Industries, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?
3 & 6When a DHCP server is configured, which two IP addresses should never be assignable to hosts?
TrunksThis is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.
None of the choicesThe following are VLAN best practices EXCEPT?
Vlan 30What is the command to create a VLAN with a valid VLAN ID number 30?
1 & 2Which two statements about static NAT translations are true?
They filter traffic based on source IP addresses only.Which statement describes a characteristic of standard IPv4 ACLs?
The gateway for Server A is not on the same subnet.Refer to the exhibit. The user at Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A?
show vlanIn troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN?
ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?
Dynamic Trunking Protocol is disable by default.Which of the following describes Dynamic Trunking Protocol?
RAMThis memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.
Permit all packets matching the first three octets of the source address to all destinationsThe following configuration line was added to router R1
None of the choicesWhich of the following is NOT a feature of a Switched Network
4What is the default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router?
There is an incorrect IP address configured on GigabitEthernet 0/0.30.*Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?
All of the choicesWhich of the following is an element of converged network?
2 & 4"Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control"
4 & 5"Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."
4 & 5Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)
1. The metric varies depending which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher administrative distances.
3. The value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count.
The correct answer is 'False'."True of False. Ingress is used to describe frames leaving the device through a particular port."
SSHA protocol that provides an encrypted connection to a remote device.
ModeIf an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?
It is a logical interface internal to the router.What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?
Check your interfaces for the correct configuration.Which of the following would be a good starting point for troubleshooting if your router is not translating?
Permit tcp any host 2001:DB8:10:10::100 eq 25Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?
ip nat outsideWhich command would you place on interface connected to the Internet?
show ip nat statisticsWhich command will show you the summary of the NAT configuration?
ip access-group 101 inAs a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?
Routers support a variety of interface types. Switches typically support Ethernet interfaces.What is one feature that distinguishes routers from Layer 2 switches?
When selecting the type of switch, rack units should always be considered. Rack units is the number ports available in the network switch.Which of the following statement is INCORRECT?
ip nat insideWhich command would you place on interface on a private network?
802.1qWhich protocolis used to configure trunking on a switch?
Show access-listsWhich router command allows you to view the entire contents of all access lists?
All traffic exiting E0 will be deniedThe following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:
The correct answer is 'True'.Router On Stick is a method used for communicating inter-vlan using a router.
None of the choicesWhich of the following describes a VLAN?
Static routeIf your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
configure terminalGlobal configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?
1 and 3What are the two main types of access control lists (ACLs)?
Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces unnecessary traffic on the network and boosts performance.Which of the following is NOT a benefit of VLAN?
172.16.2.0 to 172.16.3.255Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255?
Load balancing allows a router to forward packets over multiple paths to the same destination network.Which of the statements describe characteristic of load balancing?
Routers compare metrics to determine the best path.Which statement is true regarding routing metrics?
The port is operating at 100 Mbps.What is the status of the Port speed LED if the LED light is green?
1 & 4"The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation"
1 & 3The OSPF Hello protocol performs which of the following 2 tasks?
2 & 5Refer to the exhibit. A junior network engineer in one of the biggest telecom company in the Philippines has prepared the exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1?
twoThe AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?
An additional broadcast domain will be created.A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?
3 & 4Which two statements describe the process identifier that is used in the command to configure OSPF on a router?
1, 2 and 4Which of the following would be good reasons to run NAT?
3 & 5Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied?
DHCP spoofing attackWhat type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway.
10.1.3.3"Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4"
1 & 5What are two benefits of using NAT?
Join native VLAN to VLAN.The following are VLAN best practices EXCEPT?
switchport access vlanvlan-idWhat is the command to assign the port to a particular VLAN when the interface is in access mode?
There is activity and the port is sending or receiving data.In the Switch port LED status, if the LED is blinking green what is the status of switch?
If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.Which statement is correct regarding the operation of DHCP?
Console cableThis is used to connect a PC to the console port of a switch for configuration.
Daisy ChainStackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.
name employeeWhich of the following is the command to specify a VLAN name? Name of VLAN is employee.
logical topologyThis is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.
A directly connected networkWhat route would have the lowest administrative distance?
1, 5, 2006"To enable network access to a remote destination, what three pieces of information must be configured on a host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask"
Addresses are leased to host. A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.How does a DHCP server dynamically assign IP address to host?
2 & 3Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB?
8If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
show ip nat translationsWhich command will show you all the translations active on your router?
The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.Refer to the exhibit. Which statement are true about interVLAN routing in the topology that is shown in the exhibit?
2 & 5Which two network parameters are used by EIGRP as metrics to select the best path to reach a network?
1. Jitter
2. bandwidth
3. resiliency
4. hop count
5. delay
6. confidentiality
Do not use the dynamic auto or dynamic desirable.What is the best practice relative to switch port modes?
There is an activity and the port is sending or receiving data.In the Switch port LED status, if the LED is blinking green what is the status of switch?
Ip default-gateway 172.10.90.1Which of the following is the command to configure the switch default gateway with IP address of 172.10.90.1?
Fixed configurationThe ________________ switches do not support features or options beyond those that originally came with the switch.
Show ip interfaceWhich command is used to determine if an IP access list is enabled on a particular interface?
physical topologyThis is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.
Relays a DHCP request across networksThe ip helper-address command does what?
ipnat outsideWhich command would you place on interface connected to the Internet?
Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.How does a DHCP server dynamically assign IP address to host?
Core layerThis layer provide fault isolation and high-speed backbone onnectivity.
Store-and-forward switchingA switch forwarding method that makes a forwarding decision on a frame after it has received the entire frame and then checked the frame for errors.
The network wildcard mask is configured improperly.A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem?
1 & 4The primary functions of a router are the following?
1. Packet switching
2. Flow control
3. Domain name resolution
4. Path selection
5. Microsegmentation
PATWhich version of NAT allows many hosts inside a private network to simultaneously use a single inside global address for connecting to the Internet?
Core layerThis layer provide fault isolation and high-speed backbone connectivity.
no shutdownRefer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?
Network Time ProtocolThis is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.
debug ip natWhich command will allow you to see real-time translations on your router?
1 & 4Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?
show ip interface briefWhat is the command used to determine the status of both physical and virtual interfaces including IP address?
All of the choicesWhich of the following is NOT a characteristics of a network?
1 & 4Which two commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?
3 & 5Which two characteristics are shared by both standard and extended ACLs?
ISL & IEEE 802.1qWhich are the 2 trunking protocols?
show ipnat statisticsWhich command will show you the summary of the NAT configuration?
TrunksThis is a point-to-point link between two network devices that carries more than one VLAN.
DHCP starvation attackWhat type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access.
"router ospf 1 network 10.1.1.0 0.0.0.255 area 0"What command sequence will configure a router to run OSPF and add network 10.1.1.0 /24 to area 0?
2 & 5"Which two network parameters are used by EIGRP as metrics to select the best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality"
the highest IP address among its active interfacesIf all OSPF routers in a single area are configured with the same priority value, what value does a router use for the OSPF router ID in the absence of a loopback interface?
You can configure one access list, per direction, per layer 3 protocolWhich statement about access lists that are applied to an interface is true?
show ipnat translationsWhich command will show you all the translations active on your router?
4 & 5"Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."
show interfaces trunkTo troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?
2, 4, 2006Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem?
Ip domain-name mycompany.comWhich of the following is the command to configure the IP domain name of the network (mycompany.com)
The interface fa0/0 has not been activated.A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?
All of the choicesWhich of the following describes Dynamic Trunking Protocol?
Brute force password attackThis attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list.
show ip ospf databaseWhich command is used to display the collection of OSPF link states?
access-list 50 deny 192.168.1.1 0.0.0.255Which item represents the standard IP ACL?
speed autoWhat is the command to configure the interface to automatically negotiate speed with the connected device?
ROMThis memory stores router bootup instructions and basic diagnostic software.
If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted.Which statement is correct regarding the operation of DHCP?