Tiddly Networking 2 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

A Standard ACL filters network traffic based on destination MAC T or F

-False

What are two uses of an access control list

- ACLs provide a basic level of security for network access -ACLs can control which areas a host can access on a network

What is a characteristic of a Layer 2 loop?

- Broadcast frames are forwarded back to the sending switch.

In the scenario below, PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

- The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

Based on the topology above, Which trunk link will not forward any traffic after the root bridge election process is complete?

- Trunk2

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

- Use the console port to locally access the switch from a serial or USB interface of the PC.

What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?

- default route

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

- native

What wild card mask will include all addresses from 172.16.0.0 through 172.19.255.255

-0.3.255.255

Based on the commands shown in the exhibit below, how many hosts on the internal LAN of R1 can have simultaneous NAT translation to the ISP?

-1

From the perspective of R1, the NAT router, which address is the inside global address? 192.168.0.10 192.168.0.1 209.165.200.225 209.165.200.254

-209.165.200.225

In OSPF, Hellos are sent to what IP address?

-224.0.0.5

Based on the exhibit above, Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)

-A = 10.1.0.13 -B = 209.165.201.1

What are two characteristics of a Layer 2 Ethernet switch access port? (Choose two.) -Access mode is the default operating mode for a port on a Layer 2 switch. -An access port is associated with a single VLAN. -An access port uses 802.1Q frame encapsulation. -Access ports require an SVI to be configured on the switch. -A native VLAN is configured on each access port.

-Access mode is the default operating mode for a port on a Layer 2 switch. -An access port is associated with a single VLAN.

Which scenario would cause and ACL misconfiguration and deny all traffic

-Apply an ACL that has all deny ACE statements

What is used by BGP to Dermaine the best path to a destination

-Attributes

Which two components are used to identify a neighbor in a BGP configure (Choose two)

-Autonomous system -IP address

Which Cisco switch feature ensures that configured switch edge ports do not cause Layer 2 loops if a port is mistakenly connected to another switch?

-BPDU guard

what are two tasks to perform when configuring static NAT?

-Create a mapping between the inside local and local address -Identify the participating interfaces as insider or outside addresses

There are three possible routes for a router to reach a destination network. The first route is from OSPF with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a composite metric of 20514560. Which route will be installed by the router in its routing table?

-EIGRP

What type of ACL offers greater flexibility and control over network access?

-Extended

What are two tasks to perform when configuring static NAT? (Choose two.)

-Identify the participating interfaces as inside or outside interfaces. -Create a mapping between the inside local and outside local addresses.

A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?

-Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway.

How does the service password-encryption command enhance password security on Cisco routers and switches?

-It encrypts passwords that are stored in router or switch configuration files.

What is a purpose of the network command when configuring RIPv2 as the routing protocol? -It identifies the interfaces that belong to a specified network. -It specifies the remote network that can now be reached. -It immediately advertises the specified network to neighbor routers with a classful mask. -It populates the routing table with the network entry.

-It identifies the interfaces that belong to a specified network.

What is a purpose of the network command when configuring RIPv2 as the routing protocol?

-It is used to advertise the directly connected networks of a router and enables RIP on those interfaces that belong to the specified network.

Which three metric weights are set to zero by default when costs in EIGRP are being calculated?

-K2 -K4 -K5

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for a IPv4 network

-NAT provides a solution to slow down the IPv4 address depletion -NAT introduces problems for some applications that require end-to-end connectivity

An admin first configured an extended ACL as shown by the output of the show access-list command (choose two) -Ping packets will be permitted. -Telnet packets will be permitted. -All TCP and UDP packets will be denied.​ -SSH packets will be permitted. -TFTP packets will be permitted.

-Ping packets will be permitted -SSH packets will be permitted.

A network admin wants to create a standard ACL to prevent network 1 traffic from being transmitted to the research and development network. On which router interface and in which direction should the standard ACL be applied?

-R2 G 0/0 outbound

Which two configurations will allow router R1 to establish a neighbor relationship with router R2? (Choose two.)

-R2(config)# router bgp 65002R2(config-router)# network 192.168.20.0R2(config-router)# neighbor 209.165.200.225 remote-as 65001 -R1(config)# router bgp 65001R1(config-router)# network 192.168.10.0R1(config-router)# neighbor 209.165.200.226 remote-as 65002

All of the following must match for two OSPF routers to become neighbors except which?

-Router ID

Which two commands will configure a standard ACL

-Router(config)# access-list 90 permit 192.168.10.5 0.0.0.0 -Router(config)# access-list 35 permit 172.31.22.7

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.) -Router(config)# access-list 95 deny any -Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 -Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0 -Router(config)# access-list 95 permit any -Router(config)# access-list 95 host 172.16.0.0

-Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 -Router(config)# access-list 95 permit any

A new network policy requires an ACL denying FTP and Telnet access to a Corp file server from all interns. The address of the file server is 172.16.1.15 and all interns are assigned addresses in the 172.18.200.0/24 network. After implementing the ACL, no one in the Corp network can access any of the servers. What is the problem? -Inbound ACLs must be routed before they are processed. -The ACL is implicitly denying access to all the servers. -Named ACLs require the use of port numbers. -The ACL is applied to the interface using the wrong direction.

-The ACL is implicitly denying access to all the servers.

What two factors are added to calculate the overall cost of a route in EIGRP?

-The calculated distance to the neighbor router. -The reported distance from the neighbor.

What happens to the routing table when the outgoing interface associated with a route goes into the down state?

-The route is removed from the routing table.

What is a characteristic of legacy (non-trunked) inter-VLAN routing?

-The router requires one Ethernet link for each VLAN.

You get a call from a network administrator who tells you that he typed the following into his router: He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?

-The wildcard mask is incorrect.

What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface? -All TCP traffic is permitted, and all other traffic is denied. -Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations. -All traffic from 172.16.4.0/24 is permitted anywhere on any port. -The command is rejected by the router because it is incomplete.

-Traffic originating from 172.16.4.0/24 permitted to all TCP port 80 destinations

A network administrator configures a static route on the edge router of a network to assign a gateway of last resort. How would a network administrator configure the edge router to automatically share this route within RIP?

-Use the default-information originate command.

When will EIGRP store a feasible successor in the topology table?

-When the reported distance is less that the successor's total distance.

Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination?

-administrative distance

when configuring rip what is the purpose the passive interface

-allows a router to receive routing updates on an interface but not send updates via that interface

What will an OSPF router prefer to use first as a router ID?

-any IP address that is configured using the router-id command

An administrator issues the router eigrp 100 command on a router. What is the number 100 used for?

-as the autonomous system number

A new network administrator has been asked to verify the metrics that are used by EIGRP on a Cisco device. By default, which two EIGRP metrics are measured by using static values on a Cisco device?

-bandwidth -delay

Only authorized remote users are allowed remote access to the company server 192.168.30.10. What is the best ACL type and placement to use in this situation? -extended ACLs inbound on R1 G0/0 and G0/1 -extended ACL outbound on R2 WAN interface towards the internet -extended ACL inbound on R2 S0/0/0 -extended ACL inbound on R2 WAN interface connected to the internet

-extended ACL inbound on R2 WAN interface connected to the internet

What are two functions of dynamic routing protocols? (Choose two.)

-help maintain routing tables -discover the network

What is the correct syntax of a floating static (backup) route?

-ip route 0.0.0.0 0.0.0.0 serial 0/0/0

Which OSPF component is identical in all routers in an OSPF area after convergence?

-link-state database

What are the two other other factors, besides bandwidth and delay, that can be calculated as part of DUAL in EIGRP if the k values are adjusted from their default values.

-load -reliability

What is the purpose of the Spanning Tree Protocol (STP)?

-prevents Layer 2 loops

Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.)

-redundant links between Layer 2 switches -removing single points of failure with multiple Layer 2 switches

What are three primary benefits of using VLANs? (Choose three.) -security -a reduction in the number of trunk links -cost reduction -end user satisfaction -improved IT staff efficiency -no required configuration

-security -cost reduction -improved IT staff efficiency

A network admin wants to examine the active NAT translations on a border router which command would perform the task?

-show ip NAT translations

Which command should be used to check the OSPF process ID, the router ID, networks the router is advertising, the neighbors the router is receiving updates from, and the default administrative distance?

-show ip protocols

Which table is used by EIGRP to store all routes that are learned from EIGRP neighbors?

-the topology table

A network admin configures a static route on the edge router of a network to assign a gateway of last resort how would a network admin configure the edge router to automatically share this route within RIP?

-use the default information originate command

The bandwidth metric is the real time measured speed of the given link. T or F

False

Based on the topology in the exhibit above, which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?

ip route 192.168.4.0 255.255.255.0 192.168.3.2

Which interface allows remote management of a Layer 2 switch?

the switch virtual interface

Disadvantage of NAT?

there is no end-to-end addressing

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned?

to the subinterface


Conjuntos de estudio relacionados

Ch. 43 Assessment of digestive & GI Function

View Set

Filings and Disclosures - Form ADV

View Set

Accounting 13 Chapter 10 Acquisition and Disposition of Property, Plant, and Equipment

View Set

Introduction to Sociology: Chapter 5 | Socialization

View Set

Review of Alternators, Generators and Motors

View Set

D13 VOIP CALL PROCESSORS AND ENDPOINTS

View Set