IT 341 Final Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which three statements accurately describe VLAN types?

-After the initial boot of an unconfigured switch, all ports are members of the default VLAN. -An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic. -A management VLAN is any VLAN that is configured to access management features of the switch.

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks?

-DHCP snooping -port security

Order the steps of configuring a router as a DHCPv4 server.

-Step 2 -> Configure a DHCP pool -Step 1 -> Exclude IP addresses -Step 3 ->Define the default gateway router

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure?

-VoIP phone traffic -mobile cell phone traffic

identify the steps needed to configure a switch for SSH.

-generate RSA keys -use the transport input ssh command -configure a domain name -use the login local command

Which two features of the hierarchical design make it the better choice?

-simpler deployment for additional switch equipment -lower bandwidth requirements

Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an OSPF configuration?

0.0.0.31

Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?

192.168.12.16

Match each statement with the example subnet and wildcard that it describes.

192.168.15.65 255.255.255.240 ==> the first valid host address in a subnet 192.168.15.144 0.0.0.15 ==> subnetwork address of a subnet with 14 valid host addreses host 192.168.15.2 ==> all IP address bits must match exactly 192.168.5.0 0.0.3.255 ==> hosts in a subnet with SM 255.255.252.0 192.168.3.64 0.0.0.7 ==> address with a subnet 255.255.255.248

How many collision domains are shown in the topology?

2???

Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

4

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

Refer to the exhibit. How many broadcast domains are displayed?

8

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined?

???

Match the link state to the interface and protocol status.

???

What is the destination address in the header of a broadcast frame?

???

Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit?

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

What two functions describe uses of an access control list?

ACLs provide a basic level of security for network access. ACLs can control which areas a host can access on a network.

Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?

Add the ipv6 dhcp relay command to interface Fa0/0.

Which two statements correctly describe the concepts of administrative distance and metric?

Administrative distance refers to the trustworthiness of a particular route. Routes with the smallest metric to a destination indicate the best path.

Match the features of link-state routing protocols to their advantages and disadvantages.

Advantage: -event-driven updates -building a topological map -fast convergence Disadvantage: -bandwidth consumption -memory usage -CPU processing time

Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?

All user ports are associated with VLANs distinct from VLAN 1 and distinct from the 'black-hole' VLAN.

Which three statements describe ACL processing of packets?

An implicit deny any rejects any packet that does not match any ACE. Each statement is checked only until a match is detected or until the end of the ACE list. A packet can either be rejected or forwarded as directed by the ACE that is matched.

Refer to the exhibit. What is the result of adding the established argument to the end of the ACE?

Any TCP traffic is allowed to reach the 192.168.254.0 255.255.254.0 network if it is in response to an originated request.

Which dynamic routing protocol was developed as an exterior gateway protocol to interconnect different Internet providers?

BGP

What is a limitation when utilizing both IPv4 and IPv6 ACLs on a router?

Both IPv4 and IPv6 ACLs can be configured on a single device, but cannot share the same name.

Which two characteristics are shared by both standard and extended ACLs?

Both can be created by using either a descriptive name or number. Both include an implicit deny as a final entry.

What is different between IPv6 routing table entries compared to IPv4 routing table entries?

By design IPv6 is classless so all routes are effectively level 1 ultimate routes.

A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?

Clients must use all configuration information that is provided by a DHCPv6 server.

Open the PT Activity. Perform the tasks in the activity instructions and then complete the task. What message is displayed on www.ciscoville.com?

Completion!

In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?​

DHCP starvation

As a DHCPv4 client lease is about to expire, what is the message that the client sends the DHCP server?

DHCPREQUEST

A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?

DHCPv6 INFORMATION-REQUEST

A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?

Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.???

Which two Layer 2 security best practices would help prevent VLAN hopping attacks?

Disable DTP autonegotiation on end-user ports. Change the native VLAN number to one that is distinct from all user VLANs and is not VLAN 1.

After a network topology change occurs, which distance vector routing protocol can send an update message directly to a single neighboring router without unnecessarily notifying other routers?

EIGRP

How are IP addressing designs affected by VLAN implementations?

Each VLAN must have a different network number.

Which statement describes the microsegmentation feature of a LAN switch?

Each port forms a collision domain.

An administrator is attempting to configure a static route on a Cisco 2960 series switch. After the administrator types the command ip route 0.0.0.0 0.0.0.0 10.1.1.1, an error message appears stating that the command is not recognized. What must the administrator do so that this command is accepted?

Enter the command sdm prefer lanbase-routing and reload.

What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?

Enter the switchport access vlan 3 command in interface configuration mode.

Which three addresses could be used as the destination address for OSPFv3 messages?

FF02::6 FE80::1 FF02::5

Which three statements are generally considered to be best practices in the placement of ACLs?

Filter unwanted traffic before it travels onto a low-bandwidth link. Place standard ACLs close to the destination IP address of the traffic. Place extended ACLs close to the source IP address of the traffic.

Inter-VLAN communication is not occurring in a particular building of a school. Which two commands could the network administrator use to verify that inter-VLAN communication was working properly between a router and a Layer 2 switch when the router-on-a-stick design method is implemented?

From the switch, issue the show interfaces trunk command. From the router, issue the show ip route command.

Which two statements are true about using full-duplex Fast Ethernet?

Full-duplex Fast Ethernet offers 100 percent efficiency in both directions. Performance is improved with bidirectional data flow.

Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PCs on different VLANs cannot communicate. Based on the output, what are two configuration errors on switch interface Gi1/1?

Gi1/1 is in the default VLAN. Gi1/1 is configured as trunk mode.

Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1?

ICMPv6 packets that are destined to PC1

In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)

IP address subnet mask default gateway

What two pieces of information are displayed in the output of the show ip interface brief command?

IP addresses Layer 1 statuses

Refer to the exhibit. A network administrator is configuring RT1 for inter-VLAN routing. The switch is configured correctly and is functional. Host1, Host2, and Host3 cannot communicate with each other. Based on the router configuration, what is causing the problem?

IP addresses on the subinterfaces are incorrectly matched to the VLANs

Refer to the exhibit. A network administrator has issued the exhibited commands in an attempt to activate RIPng on interface gig0/0. What is causing the console message that is shown after RIP is enabled?

IPv6 unicast routing has not been enabled on this router.

What are two of the required steps to configure PAT?

Identify the inside interface. Define a pool of global addresses to be used for overload translation.

Which two statements are true regarding switch port security?

If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached. Dynamically learned secure MAC addresses are lost when the switch reboots.

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

If the LED is green, the port is operating at 100 Mb/s.

Refer to the exhibit. What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B?

If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request.

Which statement describes a difference between the operation of inbound and outbound ACLs?

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed

Refer to the exhibit. What can be determined from the output that is shown?

Interface FastEthernet 0/1 is configured with the switchport protected command.

Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?

Interface S0/0/0 should be configured with the command ip nat outside.

A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?

Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway.

Which action will bring an error-disabled switch port back to an operational state?

Issue the shutdown and then no shutdown interface commands.???

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?

It allows only VLAN 30 on Fa0/5.

What is an advantage of configuring a Cisco router as a relay agent?

It can provide relay services for multiple UDP services.

What are two functions of a router?

It determines the best path to send packets. It connects multiple IP networks.

Which three statements describe features of the OSPF topology table?

It is a link-state database that represents the network topology. When converged, all routers in an area have identical topology tables. The table can be viewed via the show ip ospf database command.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​

It is a logical interface internal to the router.

Which statement describes a route that has been learned dynamically?

It is automatically updated and maintained by routing protocols.

Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Based on the partial output that is displayed by the use of the show vlan command, which conclusion can be drawn for the Gi1/1 interface?

It is configured as trunk mode.

What is a characteristic of a routed port on a Layer 3 switch?

It is not assigned to a VLAN.

Consider the following routing table entry for R1: D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 What is the significance of the Serial0/0/0?

It is the interface on R1 used to send data that is destined for 10.1.1.0/24.

Which statement accurately describes dynamic NAT?

It provides an automated mapping of inside local to inside global IP addresses.

How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method?

It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address.

A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.

Refer to the exhibit. What will be the effect of entering the command that is shown in the exhibit on R2 as part of the dynamic NAT configuration?

It will bind NAT-POOL1 with ACL 1.

Which OPSF packet contains the different types of link-state advertisements?

LSU

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.

The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Modify the transport input command.

What is a disadvantage of using multilayer switches for inter-VLAN routing?

Multilayer switches are more expensive than router-on-a-stick implementations.

Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

NAT-POOL2 is not bound to ACL 1.

Match the information to the command that is used to obtain the information.

Neighbor ID of 3.3.3.3 -> show ip ospf neighbor Routing Process "ospf 10" with ID 1.1.1.1 -> show ip ospf Routing Protocol is "ospf 10" -> show ip protocols BW 1544 Kbit/sec -> show interface serial 0/0/0

Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?

No VLAN tag is added to the frame.

Refer to the exhibit. The NAT configuration applied to the router is as follows: ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255 ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224 ERtr(config)# ip nat inside source list 1 pool corp overload ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4 ERtr(config)# interface gigabitethernet 0/0 ERtr(config-if)# ip nat inside ERtr(config-if)# interface serial 0/0/0 ERtr(config-if)# ip nat outside Based on the configuration and the output shown, what can be determined about the NAT status within the organization?

Not enough information is given to determine if both static and dynamic NAT are working.

Which routing protocol uses link-state information to build a map of the topology for computing the best path to each destination network?

OSPF

A router is participating in an OSPFv2 domain. What will always happen if the dead interval expires before the router receives a hello packet from an adjacent DROTHER OSPF router?

OSPF will remove that neighbor from the router link-state database.

Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?

PAT using an external interface

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which PCs will receive the broadcast sent by PC-C?

PC-D, PC-E

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

NAT overload is also known as _____________.

Port Address Translation

What is the purpose of port forwarding?

Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN.

Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server: R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000 R1(config)# access-list 105 deny ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?

R1(config)# interface gi0/0 R1(config-if)# no ip access-group 105 out R1(config)# no access-list 105 R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000 R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20 R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21 R1(config)# access-list 105 deny ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out

A network administrator is configuring a static NAT on the border router for a web server located in the DMZ network. The web server is configured to listen on TCP port 8080. The web server is paired with the internal IP address of 192.168.5.25 and the external IP address of 209.165.200.230. For easy access by hosts on the Internet, external users do not need to specify the port when visiting the web server. Which command will configure the static NAT?

R1(config)# ip nat inside source static tcp 192.168.5.25 8080 209.165.200.230 80

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

Refer to the exhibit. OSPF is used in the network. Which path will be chosen by OSPF to send data packets from Net A to Net B?

R1, R3, R5, R7

Refer to the exhibit. A network administrator issued the command show ip ospf interface on the router R2. What conclusion can be drawn?

R2 has not formed an adjacency with any other router.

Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?

RTA is using the same subnet for VLAN 20 and VLAN 30.

Which statement describes a disadvantage of using router subinterfaces for inter-VLAN routing?

Routed traffic must contend for bandwidth on a single router interface.

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task?

Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0 Router1(config)# access-list 10 permit host 192.168.15.23

Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?

S 10.16.0.0/24 [1/0] via 192.168.0.9

Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?

S1(config-if)# switchport nonegotiate

What packets would match the access control list statement that is shown below? access-list 110 permit tcp 172.16.0.0 0.0.0.255 any eq 22

SSH traffic from the 172.16.0.0 network to any destination network

How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals? -No one is allowed to disconnect the IP phone or the PC and connect some other wired device. -If a different device is connected, port Fa0/2 is shut down. -The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky

Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

Send the packet out the Serial0/0/0 interface.

Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?

Serial0/0/1

Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?

Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?

Match the descriptions to the corresponding DHCPv6 server type.

Stateless DHCPv6: -enabled in RA messages with the ipv6 nd other-config-flag command -clients send only DHCPv6 INFORMATION-REQUEST messages to the server -enabled on the client with the ipv6 address autoconfig command Stateful DHCPv6: -the M flag is set to 1 in RA messages -uses the address command to create a pool of addresses for clients -enabled on the client with the ipv6 address dhcp command

Match the characteristics to the corresponding type of routing.

Static Routing: -typically used on stub networks -less routing overhead Dynamic Routing: -new networks are added automatically to the routing table -best choice for large networks

Refer to the exhibit. Which command can the administrator issue to change the VLAN10 status to up?​

Switch1(config)# vlan 10 Switch1(config-vlan)# exit

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?

The ACEs of access list 10 will be renumbered.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why is the ACL not working?

The ACL is applied to the wrong interface.

Refer to the exhibit. Communication between the VLANs is not occurring. What could be the issue?

The Gi1/1 switch port is not in trunking mode.

What condition is required to enable Layer 3 switching?

The Layer 3 switch must have IP routing enabled.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is causing PC-A to be unable to communicate with the Internet?

The NAT interfaces are not correctly assigned.

A network administrator enters the command ipv6 router ospf 64 in global configuration mode. What is the result of this command?

The OSPFv3 process will be assigned an ID of 64.

Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol?

The command no auto-summary has been used on the RIP neighbor router. RIP version 2 is running on this router and its RIP neighbor.

A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload. Why did the engineer use the overload option?

The company has more private IP addresses than available public IP addresses.

An OSPF enabled router is processing learned routes to select best paths to reach a destination network. What is the OSPF algorithm evaluating as the metric?

The cumulative bandwidth that is used along the routing path.

Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?

The encapsulation dot1Q 5 command contains the wrong VLAN.

Refer to the exhibit. What is the problem with this configuration, based on the output of the router?

The encapsulation has not been configured on the subinterface.

Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table?

The interface Fa0/1 is configured with IPv6 address 2001:DB8:ACAD:A::12. R1 does not know a route to any remote networks.

While configuring RIPv2 on an enterprise network, an engineer enters the command network 192.168.10.0 into router configuration mode. What is the result of entering this command?

The interface of the 192.168.10.0 network is sending only version 2 updates.

Refer to the exhibit. What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has port security enabled.

What happens to switch ports after the VLAN to which they are assigned is deleted?

The ports stop communicating with the attached devices.

When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?

The request to the server for the seventh user fails.

Which two requirements are necessary before a router configured with a link-state routing protocol can build and send its link-state packets?

The router has determined the costs associated with its active links. The router has established its adjacencies.

Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

The router is configured for SLAAC operation.

Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?

The router is configured for stateless DHCPv6 operation.

What is a characteristic of legacy inter-VLAN routing?

The router requires one Ethernet link for each VLAN.

Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

The router will forward the packet out interface FastEthernet 0/1.2.

What is a characteristic of unique local addresses?

They allow sites to be combined without creating any address conflicts.

Which two characteristics match extended range VLANs?

They are saved in the running-config file by default. VLAN IDs exist between 1006 to 4094.

Which three statements describe the similarities between OSPFv2 and OSPFv3?

They both share the concept of multiple areas. They both use the same DR/BDR election process. They both are link-state protocols.

What is a disadvantage of using dynamic routing protocols?

They send messages about network status insecurely across networks by default.

Under which two circumstances would a router usually be configured as a DHCPv4 client?

This is an ISP requirement. The router is intended to be used as a SOHO gateway.

How is traffic routed between multiple VLANs on a multilayer switch?

Traffic is routed via internal VLAN interfaces.

Match the IEEE 802.1Q standard VLAN tag field with the description.

VALN ID --> A VLAN Number Canonical Format Identifier --> an identifier that enables Token Ring frames to Ethernet links

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

What is a disadvantage of NAT?

What is a disadvantage of NAT?

A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?

a 192.168.14.0 /26 route that is learned via RIP

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. What is required to be configured in order for this particular command to be functional?

a NAT pool named corp that defines the starting and ending public IP addresses

Which two events will trigger the sending of a link-state packet by a link-state routing protocol?

a change in the topology the initial startup of the routing protocol process

What is a collapsed core in a network design?

a combination of the functionality of the distribution and core layers

What route would have the lowest administrative distance?

a directly connected network

A destination route in the routing table is indicated with a code D. Which kind of route entry is this?

a route dynamically learned through the EIGRP routing protocol

What are two common types of static routes in routing tables?

a static route to a specific network a default static route

match the functions to the corresponding layers

access layer: -represents the network edge -provides network access to the user distribution layer: -establishes Layer 3 routing boundaries -implements network access policy core layer: -provides high-speed backbone connectivity -functions as an aggregator for all the campus blocks

Which configuration would be appropriate for a small business that has the public IP address of 209.165.200.225/30 assigned to the external interface on the router that connects to the Internet?

access-list 1 permit 10.0.0.0 0.255.255.255 ip nat inside source list 1 interface serial 0/0/0 overload

What single access list statement matches all of the following networks? 192.168.16.0 192.168.17.0 192.168.18.0 192.168.19.0

access-list 10 permit 192.168.16.0 0.0.3.255

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied?

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out

What is used to create the OSPF neighbor table?

adjacency database

What is one function of a Layer 2 switch?

aggregating Layer 3 routing boundaries

An administrator has determined that the traffic from a switch that corresponds to a VLAN is not being received on another switch over a trunk link. What could be the problem?

allowed VLANs on trunks

What is the purpose of the passive-interface command?

allows a router to receive routing updates on an interface but not send updates via that interface

What does a Cisco router use automatically to create link-local addresses on serial interfaces when OSPFv3 is implemented?

an Ethernet interface MAC address available on the router, the FE80::/10 prefix, and the EUI-64 process

Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?

an implicit permit of neighbor discovery packets

Which type of route will require a router to perform a recursive lookup?

an ultimate route that is using a next hop IP address on a router that is not using CEF

Which OSPFv3 function works differently from OSPFv2?

authentication

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

broadcast DHCPREQUEST

Which address does a DHCPv4 server target when sending a DHCPOFFER message to a client that makes an address request?

client hardware address

Which method would mitigate a MAC address flooding attack?

configuring port security

An administrator issues the commands: Router(config)# interface g0/1 Router(config-if)# ip address dhcp What is the administrator trying to achieve?

configuring the router to obtain IP parameters from a DHCPv4 server

What is the primary purpose of NAT?

conserve IPv4 addresses

Which two requirements are used to determine if a route can be considered as an ultimate route in a router's routing table?

contain an exit interface contain a next-hop IP address

A ______________ network is one that uses the same infrastructure to carry voice, data, and video signals.

converged

OSPF uses _________ as a metric.

cost

What are three primary benefits of using VLANs?

cost reduction security improved IT staff efficiency

match the forwarding characteristics to its type:

cut-through: -may forward invalid frames -appropriate for high performance computing applications store-and-forward: -error checking before forwarding -forwarding process only begins after receiving the entire frame

When configuring RIPng, the ____________ command instructs the router to propagate a static default route.​

default-information originate

Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

Which two parameters are used by EIGRP as metrics to select the best path to reach a network?

delay bandwidth

A packet moves from a host on one network to a device on a remote network within the same company. If NAT is not performed on the packet, which two items remain unchanged during the transfer of the packet from source to destination?

destination IP address source IP address

What is a definition of a two-tier LAN network design?

distribution and core layers collapsed into one tier, and the access layer on a separate tier

What is a disadvantage of using router-on-a-stick inter-VLAN routing?

does not scale well beyond 50 VLANs

What is the default DTP mode on Cisco 2960 and 3560 switches?

dynamic auto

Type a command to exclude the first fifteen useable IP addresses from a DHCPv4 address pool of the network 10.0.15.0/24. Router(config)# ip dhcp _____________.

excluded-address 10.0.15.1 10.0.15.15

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?

fixed configuration

match the borderless switched network guideline to the principle. allows intelligent traffic load sharing by using all network resources allows seamless network expansion and integrated service enablement on an on-demand basis facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier satisfies user expectations for keeping the network always on

flexibility modularity hierarchical resiliency

What is the first criterion used by OPSF routers to elect a DR?

highest priority

When does a link-state router send LSPs to its neighbors?

immediately after receiving an LSP from neighbors with updates

What are two advantages of modular switches over fixed-configuration switches?

increased scalability need for fewer power outlets

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames? (Choose two.)

ingress port destination MAC address

Using NAT terminology, what is the address of the source host on a private network as seen from inside the network?

inside local

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations. Which command is missing on the Layer 3 switch to restore the full connectivity between PC1 and the web server? (Note that typing no shutdown will not fix this problem.)

ip address 192.168.20.1 255.255.255.0

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations.What is the missing command on S1?

ip address 192.168.99.2 255.255.255.0

Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?

ip dhcp excluded-address 192.168.100.1 192.168.100.10 ip dhcp excluded-address 192.168.101.254 ip dhcp pool LAN-POOL-100 network 192.168.100.0 255.255.254.0 default-router 192.168.100.1

Single area OSPFv3 has been enabled on a router via the ipv6 router ospf 20 command. Which command will enable this OSPFv3 process on an interface of that router?

ipv6 ospf 20 area 0

What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?

l VLANs will be allowed across the trunk.

Which OSPF component is identical in all routers in an OSPF area after convergence?

link-state database

What are two reasons that will prevent two routers from forming an OSPFv2 adjacency?

mismatched OSPF Hello or Dead timers mismatched subnet masks on the link interfaces

The election of a DR and a BDR takes place on ___________ networks, such as Ethernet networks.

multiaccess

What is the only type of ACL available for IPv6?

named extended

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

native

What two tasks do dynamic routing protocols perform?

network discovery update and maintain routing tables

Refer to the exhibit. Match the description with the routing table entries.

next hop --> 172.16.2.2 destination network --> 10.3.0.0 metric --> 2102400 administrative distance --> 1 route timestamp --> 00:22:15 route source protocol --> D

Refer to the exhibit. In this network design, which connection or connections if any, add the VLAN ID number if host H1 sends information to host H2?

no link

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

no shutdown

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. How many IP addresses has the DHCP server leased and what is the number of DHCP pools configured?

one pool three leases

opinion

opinion

Which three implicit access control entries are automatically added to the end of an IPv6 ACL?

permit icmp any any nd-na deny ipv6 any any permit icmp any any nd-ns

Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64?

permit tcp any host 2001:DB8:10:10::100 eq 25

What is an advantage of deploying IPv4 NAT technology for internal hosts in an organization?

provides flexibility in designing the IPv4 addressing scheme

What is a basic function of the Cisco Borderless Architecture distribution layer?

providing access to end user devices???

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

restrict

Typically, which network device would be used to perform NAT for a corporate environment?

router

Match the inter-VLAN routing method to the corresponding characteristic.

router-on-a-stick -> creation of subinterfaces Layer 3 with SVIs -> routing at wire speeds Layer 3 with routed ports -> need to issue the no switchport command

Fill in the blank. When a router receives a packet, it examines the destination address of the packet and looks in the _______________ table to determine the best path to use to forward the packet.

routing

Match the OSPF state with the order in which it occurs.

second state -> Init state seventh state -> Full state fifth state -> Exchange state first state -> Down state fourth state -> Exstart state third state -> Two-way state sixth state -> Loading state

Which two statements are true regarding classless routing protocols?

sends subnet mask information in routing updates allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology

Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

show interfaces Fa0/1 switchport

What command would be used to determine if a routing protocol-initiated relationship had been made with an adjacent router?

show ip ospf neighbor

Which command will verify that a router that is running OSPFv3 has formed an adjacency with other routers in its OSPF area?

show ipv6 ospf neighbor

To quickly verify OSPFv3 configuration information including the OSPF process ID, the router ID, and the interfaces enabled for OSPFv3, you need to issue the command _______________.

show ipv6 protocols

Which command will provide information specific to OSPFv3 routes in the routing table?

show ipv6 route ospf

A network engineer is troubleshooting the configuration of new VLANs on a network. ​Which command is used to display the list of VLANs that exists on the switch?

show vlan

Which two basic functions are performed by network security tools?

simulating attacks against the production network to determine any existing vulnerabilities (penetration testing) revealing the type of information an attacker is able to gather from monitoring network traffic (auditing)

Which type of address does a switch use to build the MAC address table?

source MAC address

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?

stateless DHCPv6

Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?

stateless DHCPv6

Which type of NAT maps a single inside local address to a single inside global address?

static

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT.

step 5 => R1 replaces the address 192.168.10.10 with a translated inside global address. step 2 => R1 checks the NAT configuration to determine if this packet should be translated. step 4 => R1 selects an available global address from the dynamic address pool. step 1 => The host sends packets that request a connection to the server at the address 209.165.200.254 step 3 => If there is no translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.

Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network?

subnet mask destination IP address

Which network device can be used to eliminate collisions on an Ethernet network?

switch

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?

switchport trunk native vlan 66???

Which software is used for a network administrator to make the initial router configuration securely?

terminal emulation client software

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

the MAC address of the IPv6 enabled interface

An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

the aging-out period of the MAC address table

In a basic VLAN hopping attack, which switch feature do attackers take advantage of?

the default automatic trunking configuration

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?

the interface fa0/0 has not been activated

What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?

the ipv6 unicast-routing command

A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?​

the link-local address of the router interface that is attached to the network

What method is used to apply an IPv6 ACL to a router interface?

the use of the ipv6 traffic-filter command

Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​

to Fa0/1, Fa0/2, and Fa0/3 only

While configuring inter-VLAN routing on a multilayer switch, a network administrator issues the no switchport command on an interface that is connected to another switch. What is the purpose of this command?

to create a routed port for a single network

What is a function of OSPF hello packets?

to discover neighbors and build adjacencies between them

What are the two purposes of an OSPF router ID?

to facilitate router participation in the election of the designated router to uniquely identify the router within the OSPF domain

What are two reasons a network administrator would segment a network with a Layer 2 switch?

to isolate traffic between segments to enhance user bandwidth

What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?

to notify other DHCP servers on the subnet that the IP address was leased

A network administrator configures a router by the command ip route 0.0.0.0 0.0.0.0 209.165.200.226. What is the purpose of this command?

to provide a route to forward packets for which there is no route in the routing table

What is a function of the switch boot loader?

to provide an environment to operate in when the switch operating system cannot be found

Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best practices are being used?

trunk

Which two modes does Cisco recommend when configuring a particular switch port?

trunk access

Under which two occasions should an administrator disable DTP while managing a local area network?

when a neighbor switch uses a DTP mode of dynamic desirable on links that should dynamically attempt trunking

In which situation would a technician use the show interfaces switch command?

when packets are being dropped from a particular directly attached host

In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?

when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface


Conjuntos de estudio relacionados

Subject, Possessive, and Object Pronouns/ Direct and Indirect Objects

View Set

MSK - Histology of Cartilage, Bone, and Skin

View Set

pharmacology practice assessment A 2016

View Set

Michigan State Insurance Exam 6/3/2021

View Set