UGRD-IT6223 Data Communications and Networking 2
(Cisco 2) is all about network routing and switching essentials. In this course you will have a clear understanding in what are routers, and switches are all about and its purpose. Also in this course we’ve prepared for you well suited laboratory exercises for you to gain knowledge and skills in configuring these devices in different scenarios and in different networking environments. In between you will have some tips or pointers for you to make things easier. This course will not just help you to understand topics easier but prepare you in the real life networking environment and help you in passing some Cisco certification exams. For this course, it is essential at least you have a basic background in networking and you need to download Cisco Packet Tracer Student software as your simulation tool for the labs.
Trunks |
This is used between a network device and server
or other device that is equipped with an appropriate 802.1Q-capable NIC. |
Store-and-forward switching |
A switch forwarding method that makes a
forwarding decision on a frame after it has received the entire frame and
then checked the frame for errors. |
SSH |
A protocol that provides an encrypted connection
to a remote device. |
Distribution layer |
This layer provides intelligent switching,
routing, and network access policy functions to access the rest of the
network. |
22 |
SSH protocol by default uses Port ______. |
Access, distribution and Core layer |
What are the 3 layers of the distribution access? |
Modular configuration |
The _____ switches typically come with different
sized chassis that allow for the installation of different numbers of line
card. |
Switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
Brute force password attack |
This attack tries to crack a password on another
device. The first phase of this attack starts with the attacker using a list
of common passwords and a program designed to try to establish a Telnet
session using each word on the dictionary list. |
The port is operating at 1000 Mbps. |
What is the status of the Port speed LED if the
LED light is blinking green? |
Core layer |
This layer is considered as the network backbone. |
Data VLAN |
A type of VLAN that is configured to carry
user-generated traffic. |
The port is operating at 100 Mbps. |
What is the status of the Port speed LED if the
LED light is green? |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
Broadcast domain |
A collection of interconnected switches forms a
_______________________. |
Double Tagging Attack |
This type of attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level
of 802.1Q de- encapsulation, which allows an attacker to embed a hidden
802.1Q tag inside the frame. |
23 |
Telnet protocol by default uses Port ______. |
Ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
Dividing Layer 1,2 and 3 networks into multiple
physical workgroups reduces unnecessary traffic on the network and boosts
performance. |
Which of the following is NOT a benefit of VLAN? |
None of the choices |
Which of the following is NOT a feature of a
Switched Network |
Telnet DoS attack |
In this attack, the attacker exploits a flaw in
the Telnet server software running on the switch that renders the Telnet
service unavailable. This sort of attack prevents an administrator from
remotely accessing switch management functions. This can be combined with
other direct attacks on the network as part of a coordinated attempt to prevent
the network administrator from accessing core devices during the breach. |
configure terminal |
Global configuration mode is used to configure
system globally, or to enter specific configuration modes to configure
specific elements such as protocols. What is the command to enter global
configuration mode? |
between 1006 and 4094 |
The extended range of VLAN ID is |
None of the choices |
Which of the following is NOT an element of
converged network? |
Cut-through switch method |
A switch forwarding method that begins the
forwarding process after the destination MAC address of an incoming frame and
the egress port has been determined. |
VLAN 1 |
The default VLAN for Cisco switches is
____________________. |
Fixed configuration |
The ________________ switches do not support
features or options beyond those that originally came with the switch. |
Trunks |
This is a conduit for multiple VLANs between
switches and routers. |
show vlan |
In troubleshooting VLANs, what command should be
used to check whether the port belongs to the expected VLAN? |
Network Time Protocol |
This is a protocol that is used to synchronize
the clocks of computer systems over packet-switched, variable-latency data
networks. |
Access layer |
The primary function of this layer is to provide
network access to the user. |
Collision domain |
The network segments that share the same
bandwidth between devices. |
Cisco Discovery Protocol |
This is a proprietary protocol that all Cisco
devices can be configured to use. This checks other Cisco devices that are
directly connected, which allows the devices to auto-configure their
connection. |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
DHCP Snooping |
This is a security technology that determines which
devices attached to switch ports can respond to DHCP requests. This can be
used to prevent unauthorized DHCP messages that contain information such as
IP address related data being provided to legitimate network devices. |
All of the Choices |
VLAN IDs 1002 through 1005 are reserved for |
switchport access vlanvlan-id |
What is the command to assign the port to a
particular VLAN when the interface is in access mode? |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
Ip default-gateway 172.10.90.1 |
Which of the following is the command to
configure the switch default gateway with IP address of 172.10.90.1? |
Full duplex mode |
Sometimes switch ports must manually have their
duplex mode manually configured. This duplex mode increases effective
bandwidth by allowing both ends of a connection to transmit and receive data
simultaneously. |
Vlan 30 |
What is the command to create a VLAN with a valid
VLAN ID number 30? |
Core layer |
This layer provide fault isolation and high-speed
backbone connectivity. |
Native VLAN |
A type of VLAN that is defined in the IEEE 802.1Q
specification to maintain backward compatibility with untagged traffic common
to legacy LAN scenarios. |
Remote |
The following are switch port modes that DTP
offers EXCEPT |
VLAN tagging |
This is the practice of inserting a VLAN ID into
a packet header in order to identify which VLAN (Virtual Local Area Network)
the packet belongs to. |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
Dynamic Trunking Protocol is disable by default. |
Which of the following describes Dynamic Trunking
Protocol? |
DHCP starvation attack |
What type of DHCP attack where in an attacker
floods the DHCP server with DHCP requests to use all the available IP
addresses that the DHCP server can issue. After these IP addresses are
issued, the server cannot issue any more addresses, and this situation produces
a denial-of-service (DoS) attackas new clients cannot obtain network access. |
speed auto |
What is the command to configure the interface to
automatically negotiate speed with the connected device? |
Mode |
If an error occurs while loading the operating
system because of missing or damaged system files, the load loader can be
access through a console connection. What button in the switch you need to
press while reconnecting the power cord? |
Join native VLAN to VLAN. |
The following are VLAN best practices EXCEPT? |
vlan.dat |
Configurations are stored within a VLAN database
file, called |
ip address 192.168.10.2 255.255.0.0 |
What is the command to set the IP address
(192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet
interface? |
There is activity and the port is sending or
receiving data. |
In the Switch port LED status, if the LED is
blinking green what is the status of switch? |
Console cable |
This is used to connect a PC to the console port
of a switch for configuration. |
name employee |
Which of the following is the command to specify
a VLAN name? Name of VLAN is employee. |
VLANs are based on logical connections, instead
of physical connections. |
Which of the following describes a VLAN? |
show ip interface brief |
What is the command used to determine the status
of both physical and virtual interfaces including IP address? |
A switch populates the MAC address table based on
destination MAC addresses. |
Which of the following statement is INCORRECT? |
Native VLAN |
Which is the VLAN not tagged by 802.1q? |
Implement a router-on-a-stick configuration. |
A router has two FastEthernet interfaces and
needs to connect to four vlans in the local network. How can you accomplish
this task, using the fewest physical interfaces and without decreasing
network performance? |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
logical topology |
This is the path over which the data is
transferred in a network. It describes how the network devices appear
connected to network users. |
None of the choices |
The following are VLAN best practices EXCEPT? |
Core layer |
This layer provide fault isolation and high-speed
backbone onnectivity. |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
2 & 5 |
"Which two network parameters are used by
EIGRP as metrics to select the best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" |
Trunks |
This is a conduit for multiple VLANs between
switches and routers. |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
Double Tagging Attack |
This type of attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level
of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q
tag inside the frame. |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
Routers compare metrics to determine the best
path. |
Which statement is true regarding routing
metrics? |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
Access layer |
The primary function of this layer is to provide
network access to the user. |
ip default-gateway 172.10.90.1 |
Which of the following is the command to
configure the switch default gateway with IP address of 172.10.90.1? |
SSH |
A protocol that provides an encrypted connection
to a remote device. |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
1 & 5 |
Refer to the exhibit below. Which two statements
about the configuration of the switch interface are correct? |
Static route |
If your routing table has a static, a RIP, and an
OSPF route to the same network, which route will be used to route packets by
default? |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
Collision domain |
The network segments that share the same
bandwidth between devices. |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
Data VLAN |
A type of VLAN that is configured to carry
user-generated traffic. |
1, 5, 6 |
"To enable network access to a remote
destination, what three pieces of information must be configured on a host?
1. default gateway 2. hostname 3. DNS server address 4. DHCP server address
5. IP address 6. subnet mask" |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
VLAN tagging |
This is the practice of inserting a VLAN ID into
a packet header in order to identify which VLAN (Virtual Local Area Network)
the packet belongs to. |
DHCP starvation attack |
What type of DHCP attack where in an attacker
floods the DHCP server with DHCP requests to use all the available IP
addresses that the DHCP server can issue. After these IP addresses are
issued, the server cannot issue any more addresses, and this situation
produces a denial-of-service (DoS) attackas new clients cannot obtain network
access. |
Trunks |
This is used between a network device and server
or other device that is equipped with an appropriate 802.1Q-capable NIC. |
ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
None of the choices |
Which of the following describes a VLAN? |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
A directly connected network |
What route would have the lowest administrative
distance? |
Fixed configuration |
The ________________ switches do not support
features or options beyond those that originally came with the switch. |
Cisco Discovery Protocol |
This is a proprietary protocol that all Cisco
devices can be configured to use. This checks other Cisco devices that are
directly connected, which allows the devices to auto-configure their
connection. |
It is a logical interface internal to the router. |
What is a characteristic of an IPv4 loopback
interface on a Cisco IOS router? |
802.1q |
Which protocolis used to configure trunking on a
switch? |
802.1q |
Which protocols are used to configure trunking on
a switch? |
2 & 4 |
"Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5.
802.3u" |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? (Choose two.) 1. The metric
varies depending which Layer 3 protocol is being routed, such as IP. 2. A
router first installs routes with higher administrative distances. 3. The
value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular
route. 6. The metric is always determined based on hop count." |
Trunks |
This is a conduit for multiple VLANs between
switches and routers. |
It is a logical interface internal to the router. |
What is a characteristic of an IPv4 loopback
interface on a Cisco IOS router? |
1 & 5 |
Refer to the exhibit below. Which two statements
about the configuration of the switch interface are correct? |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
Native VLAN |
Which is the VLAN not tagged by 802.1q? |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
A directly connected network |
What route would have the lowest administrative
distance? |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
None of the choices |
The following are VLAN best practices EXCEPT? |
switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
None in the choices |
Network infrastructure devices require IP
addresses to enable remote management. Using the device IP address, the network
administrator can remotely connect to the device using any of the following
EXCEPT |
All of the choices |
Which of the following is NOT a characteristics
of a network? |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding mechanisms.
These are |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
Trunks |
This is used between a network device and server
or other device that is equipped with an appropriate 802.1Q-capable NIC. |
Network Time Protocol |
This is a protocol that is used to synchronize
the clocks of computer systems over packet-switched, variable-latency data
networks. |
2, 4, 5 |
"Which three elements must be used when you
configure a router interface for VLAN trunking? 1. one physical interface for
each subinterface 2. one IP network or subnetwork for each subinterface 3. a
management domain for each subinterface 4. subinterface encapsulation
identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface
numbering that matches VLAN tags" |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
Static route |
If your routing table has a static, a RIP, and an
IGRP route to the same network, which route will be used to route packets by
default? |
The FastEthernet 0/0 interface on Router1 must be
configured with subinterfaces. |
Refer to the exhibit. Which statement are true
about interVLAN routing in the topology that is shown in the exhibit? |
1 & 4 |
"The primary functions of a router are the
following? 1. Packet switching 2. Flow control 3. Domain name resolution 4.
Path selection 5. Microsegmentation" |
2, 4, 6 |
Refer to the exhibit. The two connected ports on
the switch are not turning orange or green. What would be the most effective
steps to troubleshoot this physical layer problem? |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
logical topology |
This is the path over which the data is
transferred in a network. It describes how the network devices appear
connected to network users. |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. Flash receives a copy of the IOS from RAM when a device is
powered on. 2. Flash provides nonvolatile storage. 3. The contents of flash
may be overwritten. 4. Flash is a component in Cisco switches but not in
Cisco routers. 5. The contents of flash may be lost during a power
cycle." |
802.1q |
Which protocols are used to configure trunking on
a switch? |
Implement a router-on-a-stick configuration. |
A router has two FastEthernet interfaces and
needs to connect to four vlans in the local network. How can you accomplish
this task, using the fewest physical interfaces and without decreasing
network performance? |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254
255.255.255.0. However, when the administrator issues the command show ip
route, the routing table does not show the directly connected network. What
is the possible cause of the problem? |
2 & 4 |
"Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5.
802.3u" |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
ROM |
This memory stores router bootup instructions and
basic diagnostic software. |
two |
The AJ company has a small network. The network
consists of one switch and one router. The switch has been configured with
two VLANs. The router has been configured as a router-on- a-stick to allow
inter-VLAN routing. A trunk is configured to connect the switch to the
router. Whatis the minimum number of router subinterfaces that are required
for all the VLANs to communicate? |
Fixed configuration |
The ________________ switches do not support
features or options beyond those that originally came with the switch. |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
vlan 30 |
What is the command to create a VLAN with a valid
VLAN ID number 30? |
Core layer |
This layer provide fault isolation and high-speed
backbone onnectivity. |
2 & 4 |
"Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5.
802.3u" |
All of the choices |
Which of the following is an element of converged
network? |
The gateway for Server A is not on the same
subnet. |
Refer to the exhibit. The user at Workstation B
reports that Server A cannot be reached. What is preventing Workstation B
from reaching Server A? |
23 |
Telnet protocol by default uses Port ______. |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
name employee |
Which of the following is the command to specify
a VLAN name? Name of VLAN is employee. |
show vlan |
In troubleshooting VLANs, what command should be
used to check whether the port belongs to the expected VLAN? |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
ROM |
This memory stores router bootup instructions and
basic diagnostic software. |
1, 5, 6 |
"To enable network access to a remote
destination, what three pieces of information must be configured on a host?
1. default gateway 2. hostname 3. DNS server address 4. DHCP server address
5. IP address 6. subnet mask" |
SSH |
A protocol that provides an encrypted connection
to a remote device. |
There is an activity and the port is sending or
receiving data. |
In the Switch port LED status, if the LED is
blinking green what is the status of switch? |
Load balancing allows a router to forward packets
over multiple paths to the same destination network. |
Which statement describe a characteristicof load
balancing? |
vlan.dat |
Configurations are stored within a VLAN database
file, called |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
Load balancing allows a router to forward packets
over multiple paths to the same destination network. |
Which of the statements describe characteristic
of load balancing? |
Network Time Protocol |
This is a protocol that is used to synchronize
the clocks of computer systems over packet-switched, variable-latency data
networks. |
The FastEthernet 0/0 interface on Router1 must be
configured with subinterfaces. |
Refer to the exhibit. Which statement are true
about interVLAN routing in the topology that is shown in the exhibit? |
Routers compare metrics to determine the best
path. |
Which statement is true regarding routing
metrics? |
VLAN 1 |
The default VLAN for Cisco switches is
____________________. |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
Native VLAN |
Which is the VLAN not tagged by 802.1q? |
All of the choices |
Which of the following is NOT a characteristics
of a network? |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
10.1.3.3 |
"Refer to the exhibit. According to the
routing table, where will the router send a packet destined for 10.1.5.65?
Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1
directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly
connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0
10.1.3.3 10.1.5.64/27 s1 10.1.4.4" |
802.1q |
Which protocolis used to configure trunking on a
switch? |
2, 4, 5 |
"Which three elements must be used when you
configure a router interface for VLAN trunking? 1. one physical interface for
each subinterface 2. one IP network or subnetwork for each subinterface 3. a
management domain for each subinterface 4. subinterface encapsulation
identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface
numbering that matches VLAN tags" |
ip default-gateway 172.10.90.1 |
Which of the following is the command to
configure the switch default gateway with IP address of 172.10.90.1? |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0.
However, when the administrator issues the command show ip route, the routing
table does not show the directly connected network. What is the possible
cause of the problem? |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
All of the choices |
Which of the following describes Dynamic Trunking
Protocol? |
A directly connected network |
What route would have the lowest administrative
distance? |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254
255.255.255.0. However, when the administrator issues the command show ip
route, the routing table does not show the directly connected network. What
is the possible cause of the problem? |
Telnet DoS attack |
In this attack, the attacker exploits a flaw in
the Telnet server software running on the switch that renders the Telnet
service unavailable. This sort of attack prevents an administrator from
remotely accessing switch management functions. This can be combined with
other direct attacks on the network as part of a coordinated attempt to
prevent the network administrator from accessing core devices during the
breach. |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
show vlan |
In troubleshooting VLANs, what command should be
used to check whether the port belongs to the expected VLAN? |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
The correct answer is 'False'. |
"True of False. Ingress is used to describe
frames leaving the device through a particular port." |
2, 4, 5 |
"Which three elements must be used when you
configure a router interface for VLAN trunking? 1. one physical interface for
each subinterface 2. one IP network or subnetwork for each subinterface 3. a
management domain for each subinterface 4. subinterface encapsulation
identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface
numbering that matches VLAN tags" |
1 & 4 |
"The primary functions of a router are the
following? 1. Packet switching 2. Flow control 3. Domain name resolution 4.
Path selection 5. Microsegmentation" |
vlan 30 |
What is the command to create a VLAN with a valid
VLAN ID number 30? |
None of the choices |
Which of the following describes a VLAN? |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? 1. The metric varies
depending which Layer 3 protocol is being routed, such as IP. 2. A router
first installs routes with higher administrative distances. 3. The value of the
administrative distance can not be altered by the network administrator. 4.
Routes with the smallest metric to a destination indicate the best path. 5.
Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count." |
An additional broadcast domain will be created. |
A switch is configured with all ports assigned to
vlan 2 with full duplex FastEthernet to segment existing departmental
traffic. What is the effect of adding switch ports to a new VLAN on the
switch? |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
The correct answer is 'True'. |
VLAN is a switching technology that reduces the
size of a broadcast domain. |
2, 4, 6 |
Refer to the exhibit. The two connected ports on
the switch are not turning orange or green. What would be the most effective
steps to troubleshoot this physical layer problem? |
Data VLAN |
A type of VLAN that is configured to carry
user-generated traffic. |
Collision domain |
The network segments that share the same
bandwidth between devices. |
2 & 4 |
"Which two statements correctly describe the
components of a router? 1. RAM permanently stores the configuration file used
during the boot sequence. 2. ROM contains diagnostics executed on hardware
modules. 3. NVRAM stores a backup copy of the IOS used during the boot
sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM
contains the most current and most complete version of the IOS. 6. Flash
contains boot system commands to identify the location of the IOS" |
Distribution layer |
This layer provides intelligent switching,
routing, and network access policy functions to access the rest of the
network. |
802.1q |
Which protocolis used to configure trunking on a
switch? |
no shutdown |
Refer to the exhibit. A network administrator has
configured R1 as shown. When the administrator checks the status of the
serial interface, the interface is shown as being administratively down. What
additional command must be entered on the serial interface of R1 to bring the
interface up? |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
None of the choices |
The following are VLAN best practices EXCEPT? |
The correct answer is 'True'. |
Router On Stick is a method used for
communicating inter-vlan using a router. |
2 & 4 |
"Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5.
802.3u" |
Trunks |
This is used between a network device and server
or other device that is equipped with an appropriate 802.1Q-capable NIC. |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? (Choose two.) 1. The metric
varies depending which Layer 3 protocol is being routed, such as IP. 2. A
router first installs routes with higher administrative distances. 3. The
value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular
route. 6. The metric is always determined based on hop count." |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
vlan.dat |
Configurations are stored within a VLAN database
file, called |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
The port is operating at 1000 Mbps. |
What is the status of the Port speed LED if the
LED light is blinking green? |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding
mechanisms. These are |
Access layer |
The primary function of this layer is to provide
network access to the user. |
10.1.3.3 |
"Refer to the exhibit. According to the
routing table, where will the router send a packet destined for 10.1.5.65?
Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1
directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly
connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0
10.1.3.3 10.1.5.64/27 s1 10.1.4.4" |
The correct answer is 'True'. |
VLANis a switching technology that reduces the
size of a broadcast domain. |
Static route |
If your routing table has a static, a RIP, and an
OSPF route to the same network, which route will be used to route packets by
default? |
ip default-gateway 172.10.90.1 |
Which of the following is the command to
configure the switch default gateway with IP address of 172.10.90.1? |
Load balancing allows a router to forward packets
over multiple paths to the same destination network. |
Which of the statements describe characteristic
of load balancing? |
All of the choices |
Which of the following is NOT a characteristics
of a network? |
All of the choices |
Which of the following is an element of converged
network? |
logical topology |
This is the path over which the data is
transferred in a network. It describes how the network devices appear
connected to network users. |
Double Tagging Attack |
This type of attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level
of 802.1Q de- encapsulation, which allows an attacker to embed a hidden
802.1Q tag inside the frame. |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
ip address 192.168.10.2 255.255.0.0 |
What is the command to set the IP address
(192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet
interface? |
two |
The AJ company has a small network. The network
consists of one switch and one router. The switch has been configured with
two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN
routing. A trunk is configured to connect the switch to the router. Whatis
the minimum number of router subinterfaces that are required for all the
VLANs to communicate? |
SSH |
A protocol that provides an encrypted connection
to a remote device. |
VLAN tagging |
This is the practice of inserting a VLAN ID into
a packet header in order to identify which VLAN (Virtual Local Area Network)
the packet belongs to. |
2 & 4 |
"Which two statements correctly describe the
components of a router? 1. RAM permanently stores the configuration file used
during the boot sequence. 2. ROM contains diagnostics executed on hardware
modules. 3. NVRAM stores a backup copy of the IOS used during the boot
sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM
contains the most current and most complete version of the IOS. 6. Flash
contains boot system commands to identify the location of the IOS" |
The FastEthernet 0/0 interface on Router1 must be
configured with subinterfaces. |
Refer to the exhibit. Which statement are true
about interVLAN routing in the topology that is shown in the exhibit? |
Telnet DoS attack |
In this attack, the attacker exploits a flaw in
the Telnet server software running on the switch that renders the Telnet
service unavailable. This sort of attack prevents an administrator from
remotely accessing switch management functions. This can be combined with
other direct attacks on the network as part of a coordinated attempt to
prevent the network administrator from accessing core devices during the
breach. |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
Static route |
If your routing table has a static, a RIP, and an
IGRP route to the same network, which route will be used to route packets by
default? |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? (Choose two.) 1. The metric
varies depending which Layer 3 protocol is being routed, such as IP. 2. A
router first installs routes with higher administrative distances. 3. The
value of the administrative distance can not be altered by the network
administrator. 4. Routes with the smallest metric to a destination indicate
the best path. 5. Administrative distance refers to the trustworthiness of a
particular route. 6. The metric is always determined based on hop
count." |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
logical topology |
This is the path over which the data is transferred
in a network. It describes how the network devices appear connected to
network users. |
Trunks |
This is used between a network device and server
or other device that is equipped with an appropriate 802.1Q-capable NIC. |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
Double Tagging Attack |
This type of attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level
of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q
tag inside the frame. |
VLAN 1 |
The default VLAN for Cisco switches is
____________________. |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
2 & 5 |
"Which two network parameters are used by
EIGRP as metrics to select the best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254
255.255.255.0. However, when the administrator issues the command show ip
route, the routing table does not show the directly connected network. What
is the possible cause of the problem? |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
802.1q |
Which protocols are used to configure trunking on
a switch? |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
There is an activity and the port is sending or
receiving data. |
In the Switch port LED status, if the LED is
blinking green what is the status of switch? |
Modular configuration |
The _____ switches typically come with different
sized chassis that allow for the installation of different numbers of line
card. |
All of the choices |
Which of the following is an element of converged
network? |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding
mechanisms. These are |
switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
Trunks |
This is a conduit for multiple VLANs between
switches and routers. |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
Implement a router-on-a-stick configuration. |
A router has two FastEthernet interfaces and
needs to connect to four vlans in the local network. How can you accomplish
this task, using the fewest physical interfaces and without decreasing
network performance? |
Routers compare metrics to determine the best
path. |
Which statement is true regarding routing
metrics? |
ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
Access layer |
The primary function of this layer is to provide
network access to the user. |
All of the choices |
Which of the following is NOT a characteristics
of a network? |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding
mechanisms. These are |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
The port is operating at 1000 Mbps. |
What is the status of the Port speed LED if the
LED light is blinking green? |
2, 4, 5 |
"Which three elements must be used when you
configure a router interface for VLAN trunking? 1. one physical interface for
each subinterface 2. one IP network or subnetwork for each subinterface 3. a
management domain for each subinterface 4. subinterface encapsulation
identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface
numbering that matches VLAN tags" |
Distribution layer |
This layer provides intelligent switching,
routing, and network access policy functions to access the rest of the
network. |
Fixed configuration |
The ________________ switches do not support
features or options beyond those that originally came with the switch. |
802.1q |
Which protocols are used to configure trunking on
a switch? |
ROM |
This memory stores router bootup instructions and
basic diagnostic software. |
An additional broadcast domain will be created. |
A switch is configured with all ports assigned to
vlan 2 with full duplex FastEthernet to segment existing departmental
traffic. What is the effect of adding switch ports to a new VLAN on the
switch? |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
1 & 5 |
Refer to the exhibit below. Which two statements
about the configuration of the switch interface are correct? |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254
255.255.255.0. However, when the administrator issues the command show ip
route, the routing table does not show the directly connected network. What
is the possible cause of the problem? |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? 1. The metric varies
depending which Layer 3 protocol is being routed, such as IP. 2. A router
first installs routes with higher administrative distances. 3. The value of
the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular
route. 6. The metric is always determined based on hop count." |
name employee |
Which of the following is the command to specify
a VLAN name? Name of VLAN is employee. |
two |
The AJ company has a small network. The network
consists of one switch and one router. The switch has been configured with
two VLANs. The router has been configured as a router-on- a-stick to allow
inter-VLAN routing. A trunk is configured to connect the switch to the
router. Whatis the minimum number of router subinterfaces that are required
for all the VLANs to communicate? |
2, 4, 6 |
Refer to the exhibit. The two connected ports on
the switch are not turning orange or green. What would be the most effective
steps to troubleshoot this physical layer problem? |
Static route |
If your routing table has a static, a RIP, and an
IGRP route to the same network, which route will be used to route packets by
default? |
Network Time Protocol |
This is a protocol that is used to synchronize
the clocks of computer systems over packet-switched, variable-latency data
networks. |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
ip default-gateway 172.10.90.1 |
Which of the following is the command to
configure the switch default gateway with IP address of 172.10.90.1? |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
Telnet DoS attack |
In this attack, the attacker exploits a flaw in
the Telnet server software running on the switch that renders the Telnet
service unavailable. This sort of attack prevents an administrator from
remotely accessing switch management functions. This can be combined with
other direct attacks on the network as part of a coordinated attempt to
prevent the network administrator from accessing core devices during the
breach. |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding
mechanisms. These are |
802.1q & ISL |
Which two link protocols are used to carry
multiple VLANs over a single link? |
Modular configuration |
The _____ switches typically come with different
sized chassis that allow for the installation of different numbers of line
card. |
2 & 5 |
"Which two network parameters are used by
EIGRP as metrics to select the best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
Implement a router-on-a-stick configuration. |
A router has two FastEthernet interfaces and
needs to connect to four vlans in the local network. How can you accomplish
this task, using the fewest physical interfaces and without decreasing
network performance? |
None of the choices |
Which of the following describes a VLAN? |
Core layer |
This layer provide fault isolation and high-speed
backbone onnectivity. |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
There is an activity and the port is sending or
receiving data. |
In the Switch port LED status, if the LED is
blinking green what is the status of switch? |
ip address 192.168.10.2 255.255.0.0 |
What is the command to set the IP address
(192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet
interface? |
Native VLAN |
Which is the VLAN not tagged by 802.1q? |
switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
A directly connected network |
What route would have the lowest administrative
distance? |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? 1. The metric varies
depending which Layer 3 protocol is being routed, such as IP. 2. A router
first installs routes with higher administrative distances. 3. The value of
the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular
route. 6. The metric is always determined based on hop count." |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the control
of the attacker, as their default gateway. |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
logical topology |
This is the path over which the data is
transferred in a network. It describes how the network devices appear
connected to network users. |
Static route |
If your routing table has a static, a RIP, and an
IGRP route to the same network, which route will be used to route packets by
default? |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
2 & 5 |
"Which two network parameters are used by
EIGRP as metrics to select the best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" |
ip domain-name mycompany.com |
Which of the following is the command to
configure the IP domain name of the network (mycompany.com) |
VLAN tagging |
This is the practice of inserting a VLAN ID into
a packet header in order to identify which VLAN (Virtual Local Area Network)
the packet belongs to. |
2, 4, 6 |
Refer to the exhibit. The two connected ports on
the switch are not turning orange or green. What would be the most effective
steps to troubleshoot this physical layer problem? |
switchport access vlan |
If the port is assigned to the wrong VLAN, what
command to be command to change the VLAN membership on a particular port? |
None in the choices |
Network infrastructure devices require IP
addresses to enable remote management. Using the device IP address, the
network administrator can remotely connect to the device using any of the
following EXCEPT |
Access layer |
The primary function of this layer is to provide
network access to the user. |
Native VLAN |
Which is the VLAN not tagged by 802.1q? |
1, 5, 6 |
"To enable network access to a remote
destination, what three pieces of information must be configured on a host?
1. default gateway 2. hostname 3. DNS server address 4. DHCP server address
5. IP address 6. subnet mask" |
Trunks |
This is a conduit for multiple VLANs between
switches and routers. |
The interface fa0/0 has not been activated. |
A network administrator configures the interface
fa0/0 on the router R1 with the command ip address 172.16.1.254
255.255.255.0. However, when the administrator issues the command show ip
route, the routing table does not show the directly connected network. What
is the possible cause of the problem? |
The gateway for Server A is not on the same
subnet. |
Refer to the exhibit. The user at Workstation B
reports that Server A cannot be reached. What is preventing Workstation B
from reaching Server A? |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
The FastEthernet 0/0 interface on Router1 must be
configured with subinterfaces. |
Refer to the exhibit. Which statement are true
about interVLAN routing in the topology that is shown in the exhibit? |
vlan.dat |
Configurations are stored within a VLAN database
file, called |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? 1. The metric varies depending
which Layer 3 protocol is being routed, such as IP. 2. A router first
installs routes with higher administrative distances. 3. The value of the
administrative distance can not be altered by the network administrator. 4.
Routes with the smallest metric to a destination indicate the best path. 5.
Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count." |
All of the choices |
Which of the following is an element of converged
network? |
Core layer |
This layer provide fault isolation and high-speed
backbone onnectivity. |
Modular configuration |
The _____ switches typically come with different
sized chassis that allow for the installation of different numbers of line
card. |
Modular configuration |
The _____ switches typically come with different
sized chassis that allow for the installation of different numbers of line
card. |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? 1. The metric varies
depending which Layer 3 protocol is being routed, such as IP. 2. A router
first installs routes with higher administrative distances. 3. The value of
the administrative distance can not be altered by the network administrator. 4.
Routes with the smallest metric to a destination indicate the best path. 5.
Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count." |
physical topology |
This is the arrangement of the cables, network
devices, and end systems. It describes how the network devices are actually
interconnected with wires and cables. |
RAM |
This memory provides temporary storage for
various applications and processes, including the running IOS, the running
configuration file, IP routing table, Ethernet ARP table. |
ipv6 address ipv6-address/prefix-length eui-64 |
Which command is used to configure an IPv6
address on a router interface so that the router will combine a manually
specified network prefix with an automatically generated interface
identifier? |
Core layer |
This layer provide fault isolation and high-speed
backbone onnectivity. |
There is an incorrect IP address configured on
GigabitEthernet 0/0.30.* |
Refer to the exhibit. A router-on-a-stick
configuration was implemented for VLANs 15, 30, and 45, according to the show
running-config command output. PCs on VLAN 45 that are using the 172.16.45.0
/24 network are having trouble connecting to PCs on VLAN 30 in the
172.16.30.0 /24 network. Which error is most likely causing this problem? |
Do not use the dynamic auto or dynamic desirable. |
What is the best practice relative to switch port
modes? |
None of the choices |
The following are VLAN best practices EXCEPT? |
2 & 4 |
"Which two statements correctly describe the
components of a router? 1. RAM permanently stores the configuration file used
during the boot sequence. 2. ROM contains diagnostics executed on hardware
modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence.
4. Flash memory does not lose its contents during a reboot. 5. ROM contains
the most current and most complete version of the IOS. 6. Flash contains boot
system commands to identify the location of the IOS" |
ISL & IEEE 802.1q |
Which are the 2 trunking protocols? |
two |
The AJ company has a small network. The network
consists of one switch and one router. The switch has been configured with
two VLANs. The router has been configured as a router-on- a-stick to allow
inter-VLAN routing. A trunk is configured to connect the switch to the
router. Whatis the minimum number of router subinterfaces that are required
for all the VLANs to communicate? |
The gateway for Server A is not on the same
subnet. |
Refer to the exhibit. The user at Workstation B
reports that Server A cannot be reached. What is preventing Workstation B
from reaching Server A? |
Trunks |
This is a point-to-point link between two network
devices that carries more than one VLAN. |
Network Time Protocol |
This is a protocol that is used to synchronize
the clocks of computer systems over packet-switched, variable-latency data
networks. |
Process, Fast, Cisco Express Forwarding |
Routers support three packet-forwarding
mechanisms. These are |
There is an activity and the port is sending or receiving
data. |
In the Switch port LED status, if the LED is
blinking green what is the status of switch? |
Double Tagging Attack |
This type of attack takes advantage of the way
that hardware on most switches operates. Most switches perform only one level
of 802.1Q de- encapsulation, which allows an attacker to embed a hidden
802.1Q tag inside the frame. |
Telnet DoS attack |
In this attack, the attacker exploits a flaw in
the Telnet server software running on the switch that renders the Telnet
service unavailable. This sort of attack prevents an administrator from
remotely accessing switch management functions. This can be combined with
other direct attacks on the network as part of a coordinated attempt to
prevent the network administrator from accessing core devices during the
breach. |
2 & 4 |
"Which two link protocols are used to carry
multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5.
802.3u" |
Routers support a variety of interface types.
Switches typically support Ethernet interfaces. |
What is one feature that distinguishes routers
from Layer 2 switches? |
2 & 3 |
"Which two features are characteristics of
flash memory? 1. The contents of flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3. The contents of flash may be
overwritten. 4. Flash is a component in Cisco switches but not in Cisco
routers. 5. Flash receives a copy of the IOS from RAM when a device is
powered on." |
Daisy Chain |
Stackable that are arranged one on top of the
other with cables linking the switches in a _____________ connection. |
show interfaces trunk |
To troubleshoot issues when a trunk is not
forming or when VLAN leaking is occurring, what command to be used to check
whether the local and peer native VLANs match? |
DHCP spoofing attack |
What type of DHCP attack where in an attacker
configures a fake DHCP server on the network to issue DHCP addresses to
clients. The normal reason for this attack is to force the clients to use
false Domain Name System (DNS) or Windows Internet Naming Service (WINS)
servers and to make the clients use the attacker, or a machine under the
control of the attacker, as their default gateway. |
4 & 5 |
"Which two statements correctly describe the
concepts of administrative distance and metric? (Choose two.) 1. The metric
varies depending which Layer 3 protocol is being routed, such as IP. 2. A
router first installs routes with higher administrative distances. 3. The
value of the administrative distance can not be altered by the network
administrator. 4. Routes with the smallest metric to a destination indicate
the best path. 5. Administrative distance refers to the trustworthiness of a
particular route. 6. The metric is always determined based on hop
count." |
None in the choices |
Network infrastructure devices require IP
addresses to enable remote management. Using the device IP address, the
network administrator can remotely connect to the device using any of the
following EXCEPT |
vlan.dat |
Configurations are stored within a VLAN database
file, called |
2 & 4 |
"Which of the following are 2 primary
functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain
name resolution 4. Path selection 5. Flow control" |
All of the choices |
Which of the following is an element of converged
network? |
1 & 4 |
"The primary functions of a router are the
following? 1. Packet switching 2. Flow control 3. Domain name resolution 4.
Path selection 5. Microsegmentation" |