advance networking

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is not a disadvantage of proxy servers? a. Not all network services can be filtered. b. The proxy server can run slowly. c. Adding services can be difficult. d. There can be a potential problem with network failure if the proxy server fails or is corrupted.

a

Which of the following is not a reason to use VLANs? a. Creates a flat network design b. Allows LANs to span routers c. Creates broadcast domains d. Allows grouping of devices if they are not on the same physical segment

a

Which of the following is not an advantage of OSPF? a. Proprietary b. Rapid convergence c. Uses VLSM d. Uses areas to partition the network

a

Which of the following is not part of an EIGRP entry in the routing table? a. Directly connected b. D c. 90 d. via

a

Which of the following is true about static routes? a. Usually the default gateway in PCs b. Specify where data is not allowed to go c. Automatically configured d. Can't be seen in the routing table

a

Which of the following parameters are included in OSPF "Hello" packets? a. Hello Interval b. Router Alive Interval c. Wildcard mask d. All of the above are parameters

a

You have the following output. What command was used to get this? RouterA# ??? Pro Inside global Inside local Outside local Outside global tcp 12.0.0.2:57425 10.10.70.5:57425 74.125.227.20:80 74.125.227.20:80 a. show ip nat translation b. ip nat inside source static tcp c. show nat translation d. None of the above

a

Which of the following describes the Layer 3 address(es) used by Layer 3 devices? (Select all that apply) a. Network address b. Logical address c. IP address d. MAC address e. All the above

a b c

Which of the following are features of dynamic routing protocols? a. What information is exchanged between routers b. When updated routing information is exchanged c. Steps for reacting to changes in the network d. Criteria for establishing the best route selection

a b c d

Which of the following commands are used to configure IS-IS? a. clns routing b. ip router isis c. ip isis d. net

a b d

What information can you get using the sh ip protocol command? a. Routing protocol b. Minimum path c. Interfaces participating in the routing process d. All the above

a c

What questions need to be asked when developing a network plan that implements all three layers? (Choose all that apply.) a. What layer will the network servers be on? b. Which routers can be connected on the distribution layer? c. Which layer will the hosts be on? d. How far apart are the buildings?

a c

Which of the following are advantages of RIP? a. Simple to configure b. Good for large networks c. Suited for fast convergence d. Suited for contiguous networks

a d

A _____ is two or more classful contiguous networks grouped together. a. Subnet b. Supernet c. Network d. Superwork

b

A metric is ___. a. When a router obtains a clear view of the routes in a network. b. A numeric measure assigned to routes for ranking the routes best to worst; the smaller the number, the better. c. A procedure in the protocol that enables routers to use any of the multiple data paths available from multiple routers to reach the destination. d. A procedure in the protocol that determines the best route.

b

Care must be taken to overlap network boundaries when creating a network design. a. True b. False

b

The DHCP Offer packet does not contain which of the following information? a. Domain name b. Relay router name c. Default gateway d. Leased time

b

The local address defines any IP address that is on the outside of or external to the network. True or False? a. True b. False

b

The router with the highest priority is the ___. a. Neighbor ID b. Designated Router (DR) c. Backup Designated Router (BDR) d. State of FULL e. DR Election

b

What is the address on OSPF "Hello" packets? a. 224.0.0.9 b. 224.0.0.5 c. 224.0.0.1 d. 224.0.0.7

b

What type of VLAN configuration connects host computers to a VLAN that spans switches? a. Port-based b. Tag-based c. Protocol-based d. None of the above

b

Which code in the routing table means the route was discovered using RIP? a. C b. R c. S d. M

b

Which component of EIGRP is used to track all routes advertised by its neighbors? a. Neighbor Discovery Recovery b. DUAL Finite State Machine c. Protocol Dependent Modules d. Reliable Transport Protocol

b

Which of the following commands redistribute EIGRP routes into RIP? a. redistribute rip metric <bandwidth> <delay> <reliability> <load> <MTU> b. redistribute eigrp <AS_number> metric <0-16> c. redistribute eigrp metric <bandwidth> <delay> <reliability> <load> <MTU> d. redistribute rip <AS_number> metric <0-16>

b

Which of the following is not a type of access list? a. Standard b. Protocol c. Extended d. Named

b

Which of the following is not needed to configure a user computer's network settings? a. IP address. b. Wildcard mask. c. Default gateway. d. All the above are needed settings.

b

Which of the following is not true about IS-IS? a. Originally designed as part of the OSI network layer service called CLNS. b. It requires the IP protocol for it to function. c. Every router uses the NET to define its process. d. All the above are true.

b

Which of the following is not true of EIGRP AS numbers? a. Must be used with the router eigrp command. b. Your AS number must match the interface number. c. Only routers with the same AS number will share routing updates. d. All the above are true.

b

Which of the following is true about the core layer? a. Data congestion in the core doesn't need to be avoided. b. It's the backbone of the network. c. Only minor portions of data travel in the core. d. Route policies are often enforced at this layer.

b

Which of the following is true of the trunk port? a. Only uses ISL. b. Carries data for multiple VLANs. c. Ports are in trunk mode by default. d. 802.1Q is proprietary to Cisco switches.

b

You use a classless network address with the network command when configuring RIP. True or False? a. True b. False

b

Which of the following elements are used to determine the best path to a network? a. Balancing b. Administrative distance c. Metric d. All the above

b c

Which of the following commands show you the routing table? a. netstat -t b. route print c. show route d. netstat -r

b d

127.0.0.1 is a ___. a. Static route b. Route print c. Loopback d. null0 interface

c

As a network engineer, you need to come up with a final IP subnet design. Which of the following is a factor to consider? a. Your IP address b. The physical placement of the gateway c. The number of subnetworks needed d. All the above

c

Inbound and outbound data packets are compared to determine if a connection should be allowed when using this method. a. Packet filtering b. Proxy server c. Stateful firewall d. Access lists

c

NAT is a technique used to do which of the following? a. Translate external private address to a public address. b. Associate a single public IP address with many internal addresses. c. Hide the internal IP infrastructure. d. Use TCP/UDP ports.

c

What information must you have available when trying to save a configuration from the router to a TFTP server? a. Privileged EXEC mode password b. Name of the configuration file c. Address of the TFTP server d. Both a and c

c

What is the correct order of DHCP packets when obtaining an IP address? a. DHCP Discover, DHCP Offer, DHCP ACK, DHCP Request b. DHCP Offer, DHCP Discover, DHCP Request, DHCP ACK c. DHCP Discover, DHCP Offer, DHCP Request, DHCP ACK d. DHCP Discover, DHCP Request, DHCP Offer, DHCP ACK

c

What type of VLAN is connected to specific ports based on the type of protocol used? a. Port-based b. Tag-based c. Protocol-based d. None of the above

c

Which of the following commands is used to configure RIPv2 and not RIP? a. router rip b. router ripv2 c. version 2 d. no version 1

c

Which of the following is a reason that routing redistribution is necessary? a. Two or more static protocols are used. b. Redistribute dynamic routes. c. Certain protocols not supported by devices. d. All the above are reasons.

c

Which of the following is not a feature of OSPF? a. Dynamic routing protocol b. Link state protocol c. Proprietary d. Supported by many vendors

c

Which of the following is not a step in the process to create a router on a stick? a. Assign IP addresses b. Define encapsulation c. Link using switch access port d. Create subinterfaces

c

Which of the following is not one of the key issues of link state protocols? a. Finds neighbors/adjacencies b. Uses route advertisements to build routing table c. Sends "Hello" packets for routing tables d. Sends updates when routing changes

c

Routing protocols provide a standardized format for route management including which of the following? a. Route selection b. Sharing route status with neighbor routers c. Calculating alternative routes if the best path route is down d. All the above e. None of the above

d

The /19 CIDR block creates ___ IP addresses. a. 1024 b. 254 c. 4096 d. 8192

d

What piece of information cannot be found in the routing table? a. Forwarding port. b. Network addressees. c. Gateway address. d. All the above can be found in the routing table.

d

Which of the following are not reasons to use TFTP? a. Upgrading or archiving the configuration files. b. Save and reload the configuration files to and from a remote server. c. Updating and saving the Internetwork Operating System (IOS) files. d. All the above are reasons.

d

Which of the following characteristics is not shared by IS-IS and OSPF? a. Use the Dijkstra algorithm. b. Classless protocols. c. Use Hello packets. d. The backbone can be segmented.

d

Which of the following commands redistribute the static routes on a router? a. redistribute all b. redistribute <protocol> c. redistribute connected d. redistribute static

d

Which of the following is not a Layer 2 technology? a. Ethernet b. DSL c. T1 d. AMT

d

Which of the following is not a disadvantage of RIP? a. Large routing tables b. Consumes bandwidth c. Slow convergence d. Dynamic routing protocol

d

Which of the following is not a firewall technology? a. Packet filtering. b. Proxy server. c. Stateful packet filtering. d. All the above are firewall technologies.

d

Which of the following is not a type of NAT? a. Static NAT. b. Dynamic NAT. c. NAT overload. d. All the above are types of NAT.

d

Which of the following is not true about EIGRP? a. Cisco proprietary. b. Allows the use of VLSM. c. Considered a hybrid protocol. d. All the above are true.

d

Which of the following is not true about campus networks? a. Have multiple LANs connected b. Interconnected with routers c. Interconnected with switches d. Multiple buildings that are far apart

d

Which of the following is not true about the distribution layer? a. Point where the individual LANs connect to the network. b. Routing and filtering is done here. c. The speed is slower than the core layer. d. All the above are true.

d

Which of the following is the correct syntax to create a static route? a. ip route <next-hop-ip-address><subnet-mask> <network-address> b. route <network-address> <subnet-mask> <next-hop-ip-address> c. ip route <exit interface><network-address> <subnet-mask> <next-hop-ip-address> d. ip route <network-address> <subnet-mask> <next-hop-ip-address>

d

Which of the following layers is not in the Cisco Layer 3 network structure? a. Core b.Distribution c. Access d. Network

d

Which of the following is one of the steps to apply access lists on a router? a. Isolate the servers. b. Identify the problem. c. Decide where to place the access list. d. Both a and b. e. Both b and c.

e

Convergence is ___. a. When a router obtains a clear view of the routes in a network. b. A numeric measure assigned to routes for ranking the routes best to worst; the smaller the number, the better. c. A procedure in the protocol that enables routers to use any of the multiple data paths available from multiple routers to reach the destination. d. A procedure in the protocol that determines the best route.

a

EIGRP is capable of load balancing over equal cost paths. True or False? a. True b. False

a

Hop count is ___. a. The number of routers the data packet must pass through to reach the destination network b. A measure of the reliability of the link, typically in terms of the amount of errors c. The time it takes for a data packet to travel from source to destination d. The measured delay time in terms of clock ticks, where each tick is approximately 55 milliseconds (1⁄18 second)

a

In the interface FastEthernet 0/2 notation, 0/2 indicates the [interface-card-slot/port]. a. True b. False

a

The clns commands are used when dealing with the IS-IS protocol at the Layer 2 level. True or false? a. True b. False

a

The no auto-summary command is used with RIPv2 to force the router to advertise actual networks. True or False? a. True b. False

a

Which of the following is a private network address? a. 172.16.38.57 b. 10.15.256.200 c. 192.178.224.0 d. 172.32.84.5

a

Which of the following is a valid APIPA address? a. 169.254.50.3 255.255.0.0 b. 169.254.169.44 255.255.255.0 c. 254.169.90.64 255.255.0.0 d. 169.255.85.91 255.255.0.0

a

Which of the following is not a correct redistribute command? a. redistribute all b. redistribute <protocol> c. redistribute connected d. redistribute static

a


Conjuntos de estudio relacionados

Chapter 5: Market your Business *Chapter Overview pg.141 - 142 (1 - 25) *a.l.o

View Set

Mental Health Nursing - Chapter 17 - Somatic symptom disorders

View Set

QB25__WORD_FORMATION_SENTENCES_201_TO_300

View Set

Principals of Entrepreneurship - Final Exam

View Set

Solving Equations Containing Fractions

View Set

Ch. 20 The Newborn At Risk: Gestational & Acquired Disorders

View Set

OB/GYN Penny Chapter 17 Key Terms

View Set

1.5 Compare and contrast the characteristics of network topologies, types and technologies.

View Set