Modules 8 - 10

¡Supera tus tareas y exámenes ahora con Quizwiz!

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination? destination MAC address source IP address destination IP address source MAC address

destination IP address

What two protocols are used to determine the MAC address of a known destination device IP address (IPv4 and IPv6)? DHCP ARP DNS ND

ARP ND

Which statement is true about ARP? An ARP cache cannot be manually deleted. ARP entries are cached permanently. ARP entries are cached temporarily.

ARP entries are cached temporarily.

Which delivery method does not guarantee that the packet will be delivered fully without errors? Connectionless Best effort Media independent

Best effort

Which field in an IPv4 packet header will typically stay the same during its transmission? Flag Time-to-Live Packet Length Destination Address

Destination Address

Which field is used to detect corruption in the IPv4 header? Header Checksum Time to Live Protocol Differentiated Services (DS)

Header Checksum

What is the term for splitting up an IP packet when forwarding it from one medium to another medium with a smaller MTU? encapsulation fragmentation segmentation serialization

fragmentation

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? It initiates an ARP request. It broadcasts the frame out of all ports on the switch. It notifies the sending host that the frame cannot be delivered. It forwards the frame out of all ports except for the port at which the frame was received.

It forwards the frame out of all ports except for the port at which the frame was received.

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame? It drops the frame. It sends the frame to all ports except the port on which it received the frame. It sends the frame to all ports that are registered to forward broadcasts. It sends the frame to all ports.

It sends the frame to all ports except the port on which it received the frame.

The ARP table in a switch maps which two types of address together? Layer 3 address to a Layer 2 address Layer 3 address to a Layer 4 address Layer 4 address to a Layer 2 address Layer 2 address to a Layer 4 address

Layer 3 address to a Layer 2 address

Which statement about host forwarding decisions is true? A host cannot ping itself. A remote destination host is on the same local network as the sending host. Local hosts can reach each other without the need of a router. Routing is enabled on switches to discover the best path to a destination.

Local hosts can reach each other without the need of a router.

Which two ICMPv6 messages are used in to determine the MAC address of a known IPv6 address? Neighbor Advertisement Neighbor Solicitation Router Advertisement Router Solicitation

Neighbor Advertisement Neighbor Solicitation

Which two ICMPv6 messages are used in SLAAC? Neighbor Advertisement Neighbor Solicitation Router Advertisement Router Solicitation

Router Advertisement Router Solicitation

An administrator is configuring a new router to permit out-of-band management access. Which set of commands will allow the required login using a password of cisco? Router(config)# line vty 0 4 Router(config-line)# password manage Router(config-line)# exit Router(config)# enable password cisco Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# exit Router(config)# service password-encryption

Router(config)# line console 0 Router(config-line)# password cisco Router(config-line)# login

Which command is used to encrypt all passwords in a router configuration file? Router_A (config) # enable secret <password> Router_A (config) # service password-encryption Router_A (config) # enable password <password> Router_A (config) # encrypt password

Router_A (config) # service password-encryption

Which is true of the IPv6 packet header? The Hop Limit field replaces the IPv4 Time to Live field. The Source and Destination IPv6 addresses change while travelling from source to destination. The Time to Live field replaces the DiffServ field. The Version field identifies the next header.

The Hop Limit field replaces the IPv4 Time to Live field.

A router boots and enters setup mode. What is the reason for this? The IOS image is corrupt. Cisco IOS is missing from flash memory. The configuration file is missing from NVRAM. The POST process has detected hardware failure.

The configuration file is missing from NVRAM.

Which is a characteristic of static routes? They are manually configured. They are advertised to directly connected neighbors. They are appropriate when there are many redundant links. They automatically adjust to a change in network topology.

They are manually configured.

Which is true of the IPv6 header? it consists of 20 octets. it consists of 40 octets. it contains 8 header fields. it contains 12 header fields.

it consists of 40 octets. it contains 8 header fields.

To what type of address are ICMPv6 neighbor solicitation messages sent? unicast multicast broadcast

multicast

What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered? portsmouth# portsmouth(config)# invalid input detected router(config-host)# hostname = portsmouth portsmouth# ? command not recognized router(config)#

portsmouth(config)#

Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting? user EXEC mode privileged EXEC mode global configuration mode interface configuration mode

privileged EXEC mode

What is one function of the ARP protocol? obtaining an IPv4 address automatically mapping a domain name to its IP address resolving an IPv4 address to a MAC address maintaining a table of domain names with their resolved IP addresses

resolving an IPv4 address to a MAC address

Which command could be used on a Cisco router to view its ARP table? arp -a arp -d show arp table show ip arp

show ip arp

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status? show ip interface brief ping show ip route show interface fa0/1

show ip interface brief

What is the command used on a Cisco IOS router to view the routing table? netstart -r route print show ip route show routing table

show ip route

Which characteristic describes the default gateway of a host computer? the logical address of the router interface on the same network as the host computer the physical address of the switch interface connected to the host computer the physical address of the router interface on the same network as the host computer the logical address assigned to the switch interface connected to the router

the logical address of the router interface on the same network as the host computer

What is the purpose of the startup configuration file on a Cisco router? to facilitate the basic operation of the hardware components of a device to contain the commands that are used to initially configure a router on startup to contain the configuration commands that the router IOS is currently using to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

to contain the commands that are used to initially configure a router on startup

Which OSI layer sends segments to be encapsulated in an IPv4 or IPv6 packet? data link layer network layer transport layer session layer

transport layer

Which IPv4 address can a host use to ping the loopback interface? 126.0.0.1 127.0.0.0 126.0.0.0 127.0.0.1

127.0.0.1

What is an attack using ARP? ARP broadcasts ARP hopping attacks ARP poisoning ARP starvation

ARP poisoning

Which statement regarding the service password-encryption command is true? It is configured in privileged EXEC mode. It encrypts only line mode passwords. As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted. To see the passwords encrypted by the service password-encryption command in plaint text, issue the no service password-encryption command.

As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.

True or False? A router can be configured with a combination of both static routes and a dynamic routing protocol. True False

True

Which destination address is used in an ARP request frame? 0.0.0.0 255.255.255.255 FFFF.FFFF.FFFF 127.0.0.1 01-00-5E-00-AA-23

FFFF.FFFF.FFFF

Which field in an IPv6 packet is used by the router to determine if a packet has expired and should be dropped? TTL Hop Limit Address Unreachable No Route to Destination

Hop Limit

Which three options are major issues associated with IPv4? (Choose three.) IP address depletion increased network complexity and Internet routing table expansion always on connections lack of end-to-end connectivity global and political boundaries too many IPv4 addresses available

IP address depletion increased network complexity and Internet routing table expansion. lack of end-to-end connectivity

What type of information is contained in an ARP table? switch ports associated with destination MAC addresses domain name to IPv4 address mappings routes to reach destination networks IPv4 address to MAC address mappings

IPv4 address to MAC address mappings

What addresses are mapped by ARP? IPv4 address to a destination MAC address destination IPv4 address to the source MAC address destination IPv4 address to the destination host name destination MAC address to the source IPv4 address

IPv4 address to a destination MAC address

Which statement accurately describes a characteristic of IPv4? All IPv4 addresses are assignable to hosts. IPv4 has a 32-bit address space. An IPv4 header has fewer fields than an IPv6 header has. IPv4 natively supports IPsec.

IPv4 has a 32-bit address space.

What is the purpose of the banner motd command? It configures a message that will identify printed documents to LAN users. It is a way that routers communicate the status of their links with one another. It provides an easy way of communicating with any user attached to a router's LANs. It provides a way to make announcements to those who log in to a router.

It provides a way to make announcements to those who log in to a router.

What two functions are provided by ARP? (Choose two.) Maintains a table of IPv4 address to domain names Maintains a table of IPv4 to MAC address mappings Maintains a table of IPv6 to MAC address mappings Resolves IPv4 addresses to domain names Resolves IPv4 addresses to MAC addresses Resolves IPv6 addresses to MAC addresses

Maintains a table of IPv4 to MAC address mappings Resolves IPv4 addresses to MAC addresses

Which field includes common values such as ICMP (1), TCP (6), and UDP (17)? Header Checksum Time to Live Protocol Differentiated Services (DS)

Protocol

Where is the ARP table stored on a device? ROM flash NVRAM RAM

RAM

Which router component holds the routing table, ARP cache, and running configuration file? RAM Flash NVRAM ROM

RAM

Which characteristic describes an IPv6 enhancement over IPv4? IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing. The IPv6 header is simpler than the IPv4 header is, which improves packet handling. Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities. The IPv6 address space is four times bigger than the IPv4 address space.

The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

What destination MAC address would be included in a frame sent from a source device to a destination device on the same local network? A broadcast MAC address of FF-FF-FF-FF-FF-FF. The MAC address of the destination device. The MAC address of the local router interface.

The MAC address of the destination device.

What destination MAC address would be included in a frame sent from a source device to a destination device on a remote local network? A broadcast MAC address of FF-FF-FF-FF-FF-FF. The MAC address of the destination device. The MAC address of the local router interface.

The MAC address of the local router interface.

How does the network layer use the MTU value? The network layer depends on the higher level layers to determine the MTU. The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it. The MTU is passed to the network layer by the data link layer. To increase speed of delivery, the network layer ignores the MTU.

The MTU is passed to the network layer by the data link layer.

Which default gateway statement is true? A default gateway is required to send packets to other hosts on the local network. The default gateway address is the IP address of a switch on a remote network. The default gateway address is the IP address of the router on the local network. Traffic can only be forwarded outside the local network if there is no default gateway.

The default gateway address is the IP address of the router on the local network.

7. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host. The packet will be sent directly to the destination host. The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host. The packet will be sent only to the default gateway.

The packet will be sent directly to the destination host.

Which statement is correct about IPv4 packet header fields? The source and destination IPv4 addresses remain the same while travelling from source to destination. The Time to Live field is used to determine the priority of each packet. The Total Length and Header Checksum fields are used to reorder a fragmented packet. The Version field identifies the next level protocol.

The source and destination IPv4 addresses remain the same while travelling from source to destination.

A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network administrator issues the arp -a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry? This is a static map entry. This is a dynamic map entry. This entry refers to the PC itself. This entry maps to the default gateway.

This is a static map entry.

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary? Connectionless acknowledgements are used to request retransmission. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host. Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available. The best-effort delivery process guarantees that all packets that are sent are received.

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

What does a code of "O" indicate next to a route in the routing table? a directly connected route a route with an administrative distance of 0 a gateway of last resort a route learned dynamically from OSPF

a route learned dynamically from OSPF

A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task? user executive mode global configuration mode any line configuration mode privileged EXEC mode

any line configuration mode

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the default gateway? ipconfig /all route print netstat -r arp -a

arp -a

Which layer is responsible for taking an IP packet and preparing it for transmission over the communications medium? physical layer network layer data link layer transport layer

data link layer

This type of route is also known as a gateway of last resort. static route remote route default route directly connected route

default route

Which information is used by routers to forward a data packet toward its destination? source IP address destination IP address source data-link address destination data-link address

destination IP address

What are the two most commonly referenced fields in an IPv4 packet header that indicate where the packet is coming from and where it is going? (Choose two.) destination IP address protocol Time to Live source IP address Differentiated Services (DS)

destination IP address source IP address

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security? secret password trustknow1 enable password trustknow1 service password-encryption enable secret trustknow1

enable secret trustknow1

Which two options are improvements provided by IPv6 as compared to IPv4? (Choose two.) header supports additional fields for complex packets increased the IP address space standardizes the use of NAT supports class-based networks uses a simpler header to provide improved packet handling

increased the IP address space uses a simpler header to provide improved packet handling

Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.) router solicitation router advertisement neighbor solicitation neighbor advertisement echo request

neighbor solicitation neighbor advertisement

Which command can be used on a Windows host to display the routing table? netstat -s show ip route netstat -r tracert

netstat -r

Which two commands could be entered on a Windows host to view its IPv4 and IPv6 routing table? (Choose two.) netroute -l netstat -r print route route print print net

netstat -r route print

What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number source and destination IP address

source and destination IP address

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP? the IPv4 address of the destination host the IPv4 address of the default gateway the MAC address of the router interface closest to the sending host the MAC address of the switch port that connects to the sending host

the MAC address of the router interface closest to the sending host

What is stored in the NVRAM of a Cisco router? the Cisco IOS the running configuration the bootup instructions the startup configuration

the startup configuration

How does the ARP process use an IPv4 address? to determine the MAC address of the remote destination host to determine the MAC address of a device on the same network to determine the amount of time a packet takes when traveling from source to destination to determine the network number based on the number of bits in the IPv4 address

to determine the MAC address of a device on the same network

What is the purpose of ARP in an IPv4 network? to forward data onward based on the destination IP address to obtain a specific MAC address when an IP address is known to forward data onward based on the destination MAC address. to build the MAC address table in a switch from the information that is gathered

to obtain a specific MAC address when an IP address is known

What was the reason for the creation and implementation of IPv6? to make reading a 32-bit address easier to relieve IPv4 address depletion to provide more address space in the Internet Names Registry to allow NAT support for private addressing

to relieve IPv4 address depletion


Conjuntos de estudio relacionados

Foundation of cybersecurity module 2

View Set

Chapter 1: The TCP/IP and OSI Networking Models

View Set

Brunner and Suddarth's Textbook of Medical-surgical Nursing- Chapter 38, 39, 40, 41, 43,44

View Set

Sleep and Dreams - Chapter 5, Section 2 - Psych

View Set