ICND1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following items does a socket comprise?

IP address and port number

What is a stub network?

Stub networks have only one connection to an internetwork. Default routes should be set on a stub network or network loops may occur; A network that has only one entry and exit point

You want to send a console message to a syslog server, but you only want to send status messages of 3 and lower. Which of the following commands will you use?

logging trap errors 0 to 3

What protocols are used to configure trunking on a switch? (Choose two.)

802.1q and ISL encapsulations are used to configure trunking on a port

Which if the following is the only device that operates at all layers of the OSI model?

Network host

There are three possible routes for a router to reach a destination network. The first route is from OSPF with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a composite metric of 20514560. Which route will be installed by the router in its routing table?

Only the EIGRP route will be placed in the routing table because EIGRP has the lowest administrative distance (AD = 5), and that is always used before metrics

Where is a hub specified in the OSI model?

Physical Layer

Which of the following is not one of the actions taken in the operation of CSMA/CD when a collision occurs?

The collision will invoke a backoff algorithm on all systems, not just the ones involve in the collision.

Which of the following statements is/are true with regard to the device shown here?

The device shown is a hub and hubs place all ports in the same broadcast domain and the same collision domain.

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.

n the accompanying graphic, what is the name for the section of the MAC address marked as unknown?

The organizationally unique identifier (OUI) is assigned by the IEEE to an organization composed of 24 bits, or 3 bytes

Which of the following is an example of a multicast address?

The range of multicast addresses starts with 224.0.0.0 and goes through 239.255.255.255.

You reload a router with a configuration register setting of 0x2101. What will the router do when it reloads?

The router boots the mini-IOS in ROM.

Which command is used to determine if an access list is enabled on a particular interface?

The show ip interface command will show you if any interfaces have an outbound or inbound access list set.

When stacking switches, which is true?

The stack is managed as a single object, and has a single management IP address. The master switch is elected from one of the stack member switches

IPv6 unicast routing is running on the Corp router. Which of the following addresses would show up with the show ipv6 int brief command? Corp#sh int f0/0 FastEthernet0/0 is up, line protocol is up Hardware is AmdFE, address is 000d.bd3b.0d80 (bia 000d.bd3b.0d80) [output cut]

FE80::3c3d:2d:bdff:fe3b:0d80

What cable type is shown in the following graphic?

Fiber-optic cables are the only ones that have a core surrounded by a material called cladding.

65 What is the function of a firewall?

Firewalls are used to connect our trusted internal network such as the DMZ, to the untrusted outside network—typically the internet. To monitor and control the incoming and outgoing network traffic

Which protocol is used to send a destination network unknown message back to originating hosts?

ICMP is the protocol at the Network layer that is used to send messages back to an originating router

Which statements are true regarding ICMP packets?

ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostics, it will provide hosts with information about network problems.

1000Base-T is which IEEE standard?

IEEE 802.3ab is the standard for 1 Gbps on twisted-pair.

Which of the following statements is true with regard to ISL and 802.1q?

ISL encapsulates the frame with control information; 802.1q inserts an 802.1q field along with tag control information.

An IPv6 ARP entry is listed as with a status of REACH. What can you conclude about the IPv6-to-MAC-address mapping?

If the state is STALE when the interface has not communicated within the neighbor reachable time frame. The next time the neighbor communicates, the state will be REACH.

Which protocol does DHCP use at the Transport layer?

UDP User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.

Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process?

A host uses something called a gratuitous ARP to help avoid a possible duplicate address. The DHCP client sends an ARP broadcast out on the local LAN or VLAN using its newly assigned address to help solve conflicts before they occur.

With respect to the OSI model, which one of the following is the correct statement about PDUs?

A packet contains IP addresses.

Which mask should you use on point-to-point links in order to reduce the waste of IP addresses?

A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet

You need to troubleshoot an adjacency between two EIGRP configured routers? What should you look for?

A. Verify the AS numbers. B. Verify that you have the proper interfaces enabled for EIGRP. C. Make sure there are no mismatched K-values. D. Check your passive interface settings.

Which layer 4 protocol is used for a Telnet connection?

Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.

When configuring a terminal emulation program, which of the following is an incorrect setting?

Bits per sec: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: None

If you use either Telnet or FTP, what layer are you using to generate the data?

Both FTP and Telnet use TCP at the Transport layer; however, they both are Application layer protocols

Which Class of IP addresses uses the pattern shown here

Class C addresses devote 24 bits to the network portion and 8 bits to the host portion.

You have two OSPF directly configured routers that are not forming an adjacency. What should you check?

In order for two OSPF routers to create an adjacency, the Hello and dead timers must match, and they must both be configured into the same area, as well as being in the same subnet

Which of the following is not a benefit of using a reference model?

It enforces consistency across vendors.

Which of the following statements is/are true with regard to the device shown here?(HUB)

It includes one collision domain and one broadcast domain.

How many collision domains are created when you segment a network with a 12-port switch?

Layer 2 switching creates individual collision domains per port. 12

Which one of the following is true regarding VLANs?

You need to have a trunk link configured between switches in order to send information about more than one VLAN down the link.

If you wanted to delete the configuration stored in NVRAM

The command erase startup-config deletes the configuration stored in NVRAM

Which of the following hexadecimal numbers converts to 28 in decimal?

The hex value 1c is converted as 28 in decimal.

Which command allows you to view the technology options and licenses that are supported on your router along with several status variables?

#show license feature

Which of the following commands provides the product ID and serial number of a router?

#show license udi

How many broadcast domains are created when you segment a network with a 12-port switch

1. By default, switches break up collision domains on a per-port basis but are one large broadcast domain.

Private IP addressing was specified in RFC

1918

What does a VLAN do?

Breaks up broadcast domains in a layer 2 switch internetwork

What must happen if a DHCP IP conflict occurs?

The administrator must fix the conflict by hand at the DHCP server.

What is a function of an access point (AP)?

To allow wireless devices to connect to a wired network

Your inside locals are not being translated to the inside global addresses. Which of the following commands will show you if your inside globals are allowed to use the NAT pool? ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248 ip nat inside source list 100 int pool Corp overload

show access-list

Which router command allows you to view the entire contents of all access lists?

show access-lists

What command produced the following output? via FE80::201:C9FF:FED0:3301 (29110112/33316), Serial0/0/0 via FE80::209:7CFF:FE51:B401 (4470112/42216), Serial0/0/1 via FE80::209:7CFF:FE51:B401 (2170112/2816), Serial0/0/2

show ipv6 eigrp topology

What command is used to view the IPv6-to-MAC-address resolution table on a Cisco router?

show ipv6 neighbors

What protocol is used to find the hardware address of a local device?

Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

When do two adjacent routers-enter the 2WAY state?

After both routers have received Hello information

on an Ethernet network is the retransmission delay that's enforced when a collision occurs.

Backoff on an Ethernet network is the retransmission delay that's enforced when a collision occurs. When that happens, a host will only resume transmission after the forced time delay has expired. Keep in mind that after the backoff has elapsed, all stations have equal priority to transmit data.

Which class of IP address provides 15 bits for subnetting?

Class A addressing provides 22 bits for host subnetting. Class B provides 16 bits, but only 14 are available for subnetting. Class C provides only 6 bits for subnetting

The protocol data unit (PDU) encapsulation is completed in which order?

Data, segments, packets, frames, bits

Serial0/1 goes down. How will EIGRP send packets to the 10.1.1.0 network? Corp#show ip eigrp topology [output cut] P 10.1.1.0/24, 2 successors, FD is 2681842 via 10.1.2.2 (2681842/2169856), Serial0/0 via 10.1.3.1 (2973467/2579243), Serial0/2 via 10.1.3.3 (2681842/2169856), Serial0/1

EIGRP will just keep sending packets out s0/0.

Each field in an IPv6 address is how many bits long?

Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits.

In the Ethernet II frame shown here, what is the function of the section labeled "FCS"?

FCS is a field at the end of the frame that's used to store the cyclic redundancy check (CRC) answer. The CRC is a mathematical algorithm that's based on the data in the frame and run when each frame is built. When a receiving host receives the frame and runs the CRC, the answer should be the same. If not, the frame is discarded, assuming errors have occurred.

For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)

Physical addresses or MAC addresses are used to identify devices at layer 2. MAC addresses are only used to communicate on the same network. To communicate on different network, we have to use layer 3 addresses (IP addresses).

The most effective way to mitigate congestion on a LAN would be to

Replace the hubs with switches

To enable OSPFv3, which of the following would you use?

Router(config-if)#ipv6 ospf 10 area 0.0.0.0

If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000 bps serial link?

RouterA(config-if)#clock rate 64000

Which of the following services use TCP?

SMTP, FTP, and HTTP use TCP.

You need to provide network connectivity to 150 client computers that will reside in the same subnetwork, and each client computer must be allocated dedicated bandwidth. Which device should you use to accomplish the task?

Switch. You should use a switch to accomplish the task in this scenario. A switch is used to provide dedicated bandwidth to each node by eliminating the possibility of collisions on the switch port where the node resides. Switches work at layer 2 in the Open Systems Interconnection (OSI) model and perform the function of separating collision domains.

Switches break up _______________ domains, and routers break up _____________ domains.

Switches create separate collision domains within a single broadcast domain. Routers provide a separate broadcast domain for each interface.

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see whether enough resources exist for that communication?

The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist

Which of the following layers of the OSI model was later subdivided into two layers?

The IEEE Ethernet Data Link layer has two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer.

Which of the following statements is false with regard to Ethernet?

There are very few collisions in full-duplex mode.

Which of the following statements is not true with regard to routers?

They forward broadcasts by default.

What is a function of the WLAN Controller?

To automatically handle the configuration of wireless access points

What command is used to create a backup configuration?

copy running-config startup-config

The cable used to connect to the console port on a router or switch is called a __________ cable.

Although rolled cable isn't used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host EIA-TIA 232 interface to a router console serial communication (COM) port.

Which class of IP address provides a maximum of only 254 host addresses per network ID?

A Class C network address has only 8 bits for defining hosts: 2^8 - 2 = 254.

In an Ethernet network, under what two scenarios can devices transmit?

An Ethernet network is a shared environment, so all devices have the right to access the medium. If more than one device transmits simultaneously, the signals collide and cannot reach the destination. If a device detects another device is sending, it will wait for a specified amount of time before attempting to transmit. When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode.

Which of the following is considered to be the inside host's address after translation?

An inside global address is considered to be the IP address of the host on the private network after translation

If routers in a single area are configured with the same priority value, what value does a router use for the OSPF router ID in the absence of a loopback interface?

At the moment of OSPF process startup, the highest IP address on any active interface will be the router ID (RID) of the router. If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically.

Which of the following Application layer protocols sets up a secure session that's similar to Telnet?

Secure Shell (SSH) protocol sets up a secure session that's similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another

What does the command routerA(config)#line cons 0 allow you to perform next?

Set your console password.

What configuration parameters must be configured the same between switches for LACP to form a channel?

Speed, duplex, and allowed VLANs must match.

What are the two main types of access control lists (ACLs)? (Choose two.)

Standard and extended access control lists (ACLs) are used to configure security on a router.

On which interface do you configure an IP address for a switch?

The IP address is configured under a logical interface, called a management domain or VLAN 1, by default.

You need to connect to a remote IPv6 server in your virtual server farm. You can connect to the IPv4 servers, but not the critical IPv6 server you desperately need. Based on the following output, what could your problem be? C:\>ipconfig Connection-specific DNS Suffix . : localdomain IPv6 Address. . . . . . . . . . . : 2001:db8:3c4d:3:ac3b:2ef:1823:8938 Temporary IPv6 Address. . . . . . : 2001:db8:3c4d:3:2f33:44dd:211:1c3d Link-local IPv6 Address . . . . . : fe80::ac3b:2ef:1823:8938%11 IPv4 Address. . . . . . . . . . . : 10.1.1.10 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 10.1.1.1

The IPv6 default gateway has not been configured or received from the router.

A host sends a type of NDP message providing the MAC address that was requested. Which type of NDP was sent?

The NDP neighbor advertisement (NA) contains the MAC address. A neighbor solicitation (NS) was initially sent asking for the MAC address

Which of the following services provide the operating system and the network?

The SDN. Tthree stacked layers: Data, Control and Application

Which of the following commands will allow you to set your Telnet password on a Cisco router?

The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password

A network interface port has collision detection and carrier sensing enabled on a shared twisted-pair network. From this statement, what is known about the network interface port?

This is an Ethernet port operating at half-duplex.

To use VLSM, what capability must the routing protocols in use possess?

To use VLSM, the routing protocols in use possess the capability to transmit subnet mask information.

Which of the following layers of the OSI model is not involved in defining how the applications within the end stations will communicate with each other as well as with users?

Transport

Which part of a MAC address indicates whether the address is a locally or globally administered address?

U/L bit. When set to 0, this bit represents a globally administered address, as specified by the IEEE, but when it's a 1, it represents a locally governed and administered address

Based on the configuration shown below, what statement is true? S1(config)#ip routing S1(config)#int vlan 10 S1(config-if)#ip address 192.168.10.1 255.255.255.0 S1(config-if)#int vlan 20 S1(config-if)#ip address 192.168.20.1 255.255.255.0

With a multilayer switch, enable IP routing and create one logical interface for each VLAN using the interface vlan number command and you're now doing inter-VLAN routing on the backplane of the switch!

If a host is configured with an incorrect default gateway and all the other computers and router are known to be configured correctly, which of the following statements is TRUE?

With an incorrect gateway, Host A will not be able to communicate with the router or beyond the router but will be able to communicate within the subnet

You are the Cisco administrator for your company. A new branch office is opening and you are selecting the necessary hardware to support the network. There will be two groups of computers, each organized by department. The Sales group computers will be assigned IP addresses ranging from 192.168.1.2 to 192.168.1.50. The Accounting group will be assigned IP addresses ranging from 10.0.0.2 to 10.0.0.50. What type of device should you select to connect the two groups of computers so that data communication can occur?

You should select a router to connect the two groups. When computers are in different subnets, as these two groups are, you will require a device that can make decisions based on IP addresses. Routers operate at layer 3 of the Open Systems Interconnect (OSI) model and make data-forwarding decisions based on layer 3 networking information, which are IP addresses. They create routing tables that guide them in forwarding traffic out of the proper interface to the proper subnet.

You configure a router interface with the IP address 192.168.10.62 255.255.255.192 and receive the following error: Bad mask /26 for address 192.168.10.62 Why did you receive this error

ip subnet-zero is not enabled on the router.


Conjuntos de estudio relacionados

The Thirteen Colonies and The British Empire (1607-1754) Terms & Definitions

View Set

FDMA 2855-Social Media Marketing Tools

View Set

Cambridge English Profile Level C1

View Set

CGS Chapter3: Application Software

View Set

ATI assessment B Med/Surg II (Yamile)

View Set

History & Systems Quiz 2 (Ch. 3-6)

View Set