Cisco 1 Module 10
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply) - 10.5.4.1 - 10.5.0.1 - 10.5.4.99 - 10.0.0.98 - 10.5.100.4
- 10.5.4.1 - 10.5.4.99
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply) - 172.16.4.99 - 172.16.0.1 - 172.17.4.99 - 172.17.4.1 - 172.18.4.1
- 172.16.4.99 - 172.16.0.1
Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply) - 192.168.0.1 - 192.168.0.100 - 192.168.1.1 - 192.168.1.100 - 192.168.2.1
- 192.168.1.1 - 192.168.1.100
What two protocols are used to determine the MAC address of a known destination device IP address (IPv4 and IPv6)? - DHCP - ARP - DNS - ND
- ARP - ND
What is an attack using ARP? - ARP broadcasts - ARP hopping attacks - ARP poisoning - ARP starvation
- ARP poisoning
What are the two methods a device can use to generate its own IPv6 interface ID? - SLAAC - stateless DHCPv6 - stateful DHCPv6 - EUI-64 - randomly generated
- EUI-64 - randomly generated
What two functions are provided by ARP? (Choose two.) - Maintains a table of IPv4 address to domain names - Maintains a table of IPv4 to MAC address mappings - Maintains a table of IPv6 to MAC address mappings - Resolves IPv4 addresses to domain names - Resolves IPv4 addresses to MAC addresses - Resolves IPv6 addresses to MAC addresses
- Maintains a table of IPv4 to MAC address mappings - Resolves IPv4 addresses to MAC addresses
Which two statements are correct about private IPv4 addresses? (Choose two.) - Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). - Internet routers will typically forward any packet with a destination address that is a private IPv4 address. - 172.99.1.1 is a private IPv4 address. - Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
- Private IPv4 addresses are assigned to devices within an organization's intranet (internal network). - Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
Which two statements are correct about public IPv4 addresses? (Choose two.) - Public IPv4 addresses are allowed to be assigned to devices within an organization's intranet (internal network). - To access a device over the internet, the destination IPv4 address must be a public address. - 192.168.1.10 is a public IPv4 address. - Public IPv4 address exhaustion is a reason why there are private IPv4 addresses and why organizations are transitioning to IPv6.
- To access a device over the internet, the destination IPv4 address must be a public address. - Public IPv4 address exhaustion is a reason why there are private IPv4 addresses and why organizations are transitioning to IPv6.
Which two parts are components of an IPv4 address? (Choose two.) - broadcast portion - host portion - physical portion - logical portion - network portion - subnet portion
- host portion - network portion
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.) - echo request - neighbor advertisement - router advertisement - neighbor solicitation - router solicitation
- neighbor advertisement - neighbor solicitation
Which two ICMPv6 messages are used in to determine the MAC address of a known IPv6 address? - neighbor advertisement - neighbor solicitation - router advertisement - router solicitation
- neighbor advertisement - neighbor solicitation
Which two ICMPv6 messages are used in SLAAC? - neighbor advertisement - neighbor solicitation - router advertisement - router solicitation
- router advertisement - router solicitation
Which two situations are the result of excessive broadcast traffic? (Choose two) - slow network operations - slow device operations - when devices on all adjacent networks are affected - when the router has to forward an excessive number of packets
- slow network operations - slow device operations
What is the prefix length notation for the subnet mask 255.255.255.224? - /27 - /28 - /25 - /26
/27
What is the recommended prefix length for most IPv6 subnets? - /32 - /48 - /64 - /128
/64
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A? - 10.0.0.0 - 10.5.0.0 - 10.5.4.0 - 10.5.4.100
10.5.4.0
Given a /48 Global Routing Prefix and a /64 prefix, what is the subnet portion of the following address: 2001:db8:cafe:1111:2222:3333:4444:5555 - café - 1111 - 2222 - 3333 - 4444
1111
If a network device has a mask of /28, how many IP addresses are available for hosts on this network? - 32 - 254 - 256 - 14 - 16 - 62
14
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A? - 172.0.0.0 - 172.16.0.0 - 172.16.4.0 - 172.16.4.100
172.16.0.0
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234? - 2001:DB8:0:AB::1234 - 2001:DB8:0:AB:0:1234 - 2001:DB8::AB00::1234 - 2001:DB8:0:AB00::1234
2001:DB8:0:AB00::1234
What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64? - 2001:DB8:D15:EA:CC44::/64 - 2001:DB8:D15:EA::/64 - 2001:DB8::/64 - 2001::/64
2001:DB8:D15:EA::/64
What subnet mask is represented by the slash notation /20? - 255.255.255.192 - 255.255.255.248 - 255.255.240.0 - 255.255.255.0 - 255.255.224.0
255.255.240.0
Which subnet mask would be used if 5 host bits are available? - 255.255.255.224 - 255.255.255.0 - 255.255.255.128 - 255.255.255.240
255.255.255.224
Which subnet mask would be used if exactly 4 host bits are available? - 255.255.255.224 - 255.255.255.128 - 255.255.255.248 - 255.255.255.240
255.255.255.240
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How many usable host addresses will this subnet provide? - 14 - 2 - 30 - 62 - 6
30
How many usable IP addresses are available on the 192.168.1.0/27 network? - 30 - 32 - 254 - 62 - 16 - 256
30
Given a /32 Global Routing Prefix and a /64 prefix, how many bits would be allocated for the Subnet ID? - 8 - 16 - 32 - 48 - 64
32
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created? - 4 - 2 - 16 - 1 - 8 - 64
4
How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask? - 192 - 254 - 190 - 64 - 62
62
If a network device has a mask of /26, how many IP addresses are available for hosts on this network? - 16 - 30 - 62 - 64 - 14 - 32
62
What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64? - FE57:FE94 - FE94 - 1000:A9CD:47FF:FE57:FE94 - 47FF:FE57:FE94 - A9CD:47FF:FE57:FE94
A9CD:47FF:FE57:FE94
Which statement is true about ARP? - An ARP cache cannot be manually deleted. - ARP entries are cached permanently. - ARP entries are cached temporarily.
ARP entries are cached temporarily.
Which statement regarding the service password-encryption command is true? - It is configured in privileged EXEC mode. - To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command. - It encrypts only line mode passwords. - As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted
Which IPv6 network prefix is only intended for local links and can not be routed? - FE80::/10 - FC00::/7 - FF00::/12 - 2001::/3
FE80::/10
Which destination address is used in an ARP request frame? - 255.255.255.255 - 01-00-5E-00-AA-23 - 127.0.0.1 - 0.0.0.0 - FFFF.FFFF.FFFF
FFFF.FFFF.FFFF
True or False: 4 out of 5 RIRs no longer have enough IPv4 addresses to allocate to customers on a regular basis. - True - False
False
True or false? RA messages are sent to all IPv6 routers by hosts requesting addressing information. - True - False
False
True or false? The Subnet ID field in an GUA must borrow bits from the interface ID. - True - False
False
What type of information is contained in an ARP table? - domain name to IPv4 address mappings - switch ports associated with destination MAC addresses - IPv4 address to MAC address mappings - routes to reach destination networks
IPv4 address to MAC address mappings
What addresses are mapped by ARP? - destination IPv4 address to the source MAC address - destination MAC address to the source IPv4 address - IPv4 address to a destination MAC address - destination IPv4 address to the destination host name
IPv4 address to a destination MAC address
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? - It initiates an ARP request. - It forwards the frame out of all ports except for the port at which the frame was received. - It broadcasts the frame out of all ports on the switch. - It notifies the sending host that the frame cannot be delivered.
It forwards the frame out of all ports except for the port at which the frame was received.
What is the purpose of the banner motd command? - It is a way that routers communicate the status of their links with one another. - It provides an easy way of communicating with any user attached to a router's LANs. - It configures a message that will identify printed documents to LAN users. - It provides a way to make announcements to those who log in to a router.
It provides a way to make announcements to those who log in to a router.
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame? - It sends the frame to all ports that are registered to forward broadcasts. - It drops the frame. - It sends the frame to all ports except the port on which it received the frame. - It sends the frame to all ports.
It sends the frame to all ports except the port on which it received the frame.
What is the purpose of the command ping ::1? - It tests the broadcast capability of all hosts on the subnet. - It tests the internal configuration of an IPv6 host. - It tests the reachability of the default gateway for the network. - It tests the multicast connectivity to all hosts on the subnet.
It tests the internal configuration of an IPv6 host.
What type of IPv6 address begins with fe80? - GUA - LLA - multicast address - None. An IPv6 address must begin with 2001.
LLA
Which type of IPv6 unicast address is not routable between networks? - unique local address - GUA - embedded IPv4 address - LLA
LLA
The ARP table in a switch maps which two types of address together? - Layer 3 address to a Layer 4 address - Layer 2 address to a Layer 4 address - Layer 3 address to a Layer 2 address - Layer 4 address to a Layer 2 address
Layer 3 address to a Layer 2 address
Which dynamic addressing method for GUAs is the one where devices rely solely on the contents of the RA message for their addressing information? - Method 1: SLAAC - Method 2: SLAAC and stateless DHCPv6 - Method 3: Stateful DHCPv6
Method 1: SLAAC
Which dynamic addressing method for GUAs is the one where devices get their IPv6 configuration in a RA message and request DNS information from a DHCPv6 server? - Method 1: SLAAC - Method 2: SLAAC and stateless DHCPv6 - Method 3: Stateful DHCPv6
Method 2: SLAAC and stateless DHCPv6
Which dynamic addressing method for GUAs is the one where devices rely solely on a DHCPv6 server for their addressing information? - Method 1: SLAAC - Method 2: SLAAC and stateless DHCPv6 - Method 3: Stateful DHCPv6
Method 3: Stateful DHCPv6
Where is the ARP table stored on a device? - ROM - flash - NVRAM - RAM
RAM
Which router component holds the routing table, ARP cache, and running configuration file? - RAM - Flash - ROM - NVRAM
RAM
Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations? - IETF - IEEE - RIRs - Tier 1 ISPs
RIRs
An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco? - Router(config)# line vty 0 4 Router(config-line)# password manage Router(config-line)# exit Router(config)# enable password cisco - Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# exit Router(config)# service password-encryption - Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login - Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login
Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login
Which command is used to encrypt all passwords in a router configuration file? - Router_A (config) # encrypt password - Router_A (config) # enable secret <password> - Router_A (config) # service password-encryption - Router_A (config) # enable password <password>
Router_A (config) # service password-encryption
Which field in an IPv6 GUA is used for subnetting? - Prefix - Network - Global Routing Prefix - Subnet ID - Interface ID
Subnet ID
What destination MAC address would be included in a frame sent from a source device to a destination device on the same local network? - A broadcast MAC address of FF-FF-FF-FF-FF-FF. - The MAC address of the destination device. - The MAC address of the local router interface.
The MAC address of the destination device.
What destination MAC address would be included in a frame sent from a source device to a destination device on a remote local network? - A broadcast MAC address of FF-FF-FF-FF-FF-FF. - The MAC address of the destination device. - The MAC address of the local router interface.
The MAC address of the local router interface.
A router boots and enters setup mode. What is the reason for this? - The POST process has detected hardware failure. - The configuration file is missing from NVRAM. - Cisco IOS is missing from flash memory. - The IOS image is corrupt.
The configuration file is missing from NVRAM.
Which statement is true about variable-length subnet masking? - The size of each subnet may be different, depending on requirements. - Bits are returned, rather than borrowed, to create additional subnets. - Each subnet is the same size. - Subnets may only be subnetted one additional time.
The size of each subnet may be different, depending on requirements.
A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry? - This is a dynamic map entry. - This entry maps to the default gateway. - This entry refers to the PC itself. - This is a static map entry.
This is a static map entry.
True or False? IPv6 was designed with subnetting in mind. - True - False
True
A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task? - privileged EXEC mode - global configuration mode - user executive mode - any line configuration mode
any line configuration mode
A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway? - netstat -r - arp -a - ipconfig /all - route print
arp -a
What is the most important motivating factor for moving to IPv6? - better performance with IPv6 - IPv6 addresses that are easier to work with - better security with IPv6 - depletion of IPv4 addresses
depletion of IPv4 addresses
Which of the following techniques use native IPv6 connectivity? - dual stack - tunneling - translation - all of the above
dual stack
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security? - service password-encryption - enable secret trustknow1 - secret password trustknow1 - enable password trustknow1
enable secret trustknow1
Which part of a GUA is assigned by the ISP? - global routing prefix - global routing prefix and subnet ID - prefix - RIR prefix
global routing prefix
What does the IP address 172.17.4.250/24 represent? - multicast address - host address - broadcast address - network address
host address
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface? - loopback - unique local - global unicast - link-local
link-local
To what type of address are ICMPv6 neighbor solicitation messages sent? - unicast - multicast - broadcast
multicast
What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered? - router(config-host)# - portsmouth(config)# - ? command not recognizedrouter(config)# - portsmouth# - hostname = portsmouthportsmouth# - invalid input detected
portsmouth(config)#
Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? - privileged EXEC mode - global configuration mode - interface configuration mode - user EXEC mode
privileged EXEC mode
What is one function of the ARP protocol? - maintaining a table of domain names with their resolved IP addresses - obtaining an IPv4 address automatically - mapping a domain name to its IP address - resolving an IPv4 address to a MAC address
resolving an IPv4 address to a MAC address
Which devices will not forward an IPv4 broadcast packet by default? - Ethernet switch - router - Windows PC - None of the above. All devices forward IPv4 broadcast packets by default.
router
Which command could be used on a Cisco router to view its ARP table? - arp -a - arp -d - show arp table - show ip arp
show ip arp
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status? - ping - show ip interface brief - show interface fa0/1 - show ip route
show ip interface brief
When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP? - the IPv4 address of the destination host - the MAC address of the router interface closest to the sending host - the MAC address of the switch port that connects to the sending host - the IPv4 address of the default gateway
the MAC address of the router interface closest to the sending host
Which characteristic describes the default gateway of a host computer? - the physical address of the router interface on the same network as the host computer - the physical address of the switch interface connected to the host computer - the logical address assigned to the switch interface connected to the router - the logical address of the router interface on the same network as the host computer
the logical address of the router interface on the same network as the host computer
What is stored in the NVRAM of a Cisco router? - the startup configuration - the bootup instructions - the Cisco IOS - the running configuration
the startup configuration
What is the purpose of the startup configuration file on a Cisco router? - to contain the commands that are used to initially configure a router on startup - to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS - to contain the configuration commands that the router IOS is currently using - to facilitate the basic operation of the hardware components of a device
to contain the commands that are used to initially configure a router on startup
How does the ARP process use an IPv4 address? - to determine the amount of time a packet takes when traveling from source to destination - to determine the MAC address of the remote destination host - to determine the network number based on the number of bits in the IPv4 address - to determine the MAC address of a device on the same network
to determine the MAC address of a device on the same network
What is the purpose of the subnet mask in conjunction with an IP address? - to mask the IP address to outsiders - to determine the subnet to which the host belongs - to uniquely identify a host on a network - to identify whether the address is public or private
to determine the subnet to which the host belongs
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask? - to identify the broadcast address of the destination network - to identify the network address of the destination network - to identify faulty frames - to identify the host address of the destination host
to identify the network address of the destination network
What is the purpose of ARP in an IPv4 network? - to forward data onward based on the destination MAC address. - to forward data onward based on the destination IP address - to build the MAC address table in a switch from the information that is gathered - to obtain a specific MAC address when an IP address is known
to obtain a specific MAC address when an IP address is known