Chapter 6&7 TestOut

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

This question includes an image to help you answer the question. View Image You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network shown? -0 -1 -2 -4 -5

-2

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? -RIP -OSPF -EIGRP -IS-IS -BGP

-BGP

Which of the following routing protocols is classified as a hybrid routing protocol? -IS-IS -EIGRP -OSPF -RIP

-EIGRP

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? -BGP -Static Distance vector -Link state -Dynamic -IGP

-IGP

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame? -Process the frame and respond to the sending device. -Forward it out the port and to the device with that MAC address. -Drop the frame. -Send it out all ports except for the port it was received on.

-Send it out all ports except for the port it was received on.

Which command would you use on a switch to enable management from a remote network? -ip address dhcp -ip default-gateway 192.168.10.185 -no shutdown -ip address 192.168.10.185 255.255.255.0

-ip default-gateway 192.168.10.185

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? -192.168.0.1 - 192.168.255.254 -10.0.0.1 - 10.255.255.254 -172.16.0.1 - 172.31.255.254 -169.254.0.1 - 169.254.255.254

-169.254.0.1 - 169.254.255.254

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.) -172.18.188.67 -224.15.166.12 -240.12.188.1 -10.0.12.15 1 -27.0.0.1 -192.168.12.253 -32.188.99.10

-172.18.188.67 -10.0.12.15 1 -192.168.12.253

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions? -OSPF -IS-IS -BGP -EIGRP -RIP

-BGP

Assuming the default switch configuration, how can you force switch C to become the root bridge? -Remove link cables 1 and 6 from the configuration. -Remove link cable 1 from the configuration. -Remove link cable 6 from the configuration. -Configure a priority number of 4096 for switch C. -Configure a priority number of 61440 for switch C.

-Configure a priority number of 4096 for switch C.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change? -Default gateway -DNS server -IP address -Subnet mask

-Default gateway

Which of the following best describes the concept of a VLAN? - Devices connected by a transmission medium other than cable (such as microwave or radio transmissions). -Devices on the same network logically grouped as if they were on separate networks. -Devices on different networks that can receive multicast packets. -Devices connected through the internet that can communicate without using a network address. -Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network.

-Devices on the same network logically grouped as if they were on separate networks.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? -Send the packet to both networks 192.168.3.0 and 192.168.4.0 and to the next hop router. -Drop the packet. -Send the packet out both of its directly-connected networks as a broadcast frame. -Hold the packet in cache until a matching route is learned or configured.

-Drop the packet.

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause? -Incorrect VLAN -Duplex mismatch -Switching loop -Broadcast storm

-Duplex mismatch

You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connections to internal hosts. What type of network address translation (NAT) should you implement? -Dynamic -Static -Restricted -Shared

-Dynamic

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm? -Configure each switch with a single trunk port -Manually set the speed for each switch port -Enable spanning tree on the switches -Disable auto-duplex detection

-Enable spanning tree on the switches

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? -Drop the packet. -Send the packet out both of its directly connected networks as a broadcast frame. -Forward the packet to the next hop router specified by the route to network 0.0.0.0. -Send the packet out both of its directly connected networks to the next hop router.

-Forward the packet to the next hop router specified by the route to network 0.0.0.0.

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? -If the network is connected to the Internet using public addressing. -If the network has over 15 areas and uses IPv6. -If the network is connected to the Internet using multiple ISPs. -If the network has over 15 hops.

-If the network is connected to the Internet using multiple ISPs.

You manage a local area network with several switches. A new employee has started today, so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and see that the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem? -Switching loop -Incorrect VLAN assignment -Incorrect default gateway setting -Half-duplex setting on the switch and workstation

-Incorrect VLAN assignment

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? -RIP -IS-IS -OSPF -EIGRP

-OSPF

Which of the following best describes OSPF? -OSPF is a classless distance vector routing protocol. -OSPF is a classful distance vector routing protocol. -OSPF is a classless link state routing protocol. -OSPF is a classful link state routing protocol.

-OSPF is a classless link state routing protocol.

Which of the following associates a port number with a host on a private network? -NAT -PAT -VLSM -CIDR

-PAT

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? -Port address translation -Spanning tree protocol -EIGRP -Port forwarding

-Port forwarding

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server? -The server isn't using the default subnet mask. -The server must have an entry on a DNS server that exists on the internet. -The server has been assigned a multicast address. -Private addresses are not accessible through the internet.

-Private addresses are not accessible through the internet.

Your computer has an IP address of 161.13.5.15. Your computer is on a: -Class C network -Multi-cast network -Public network -Private network

-Public network

Which of the following protocols has a limit of 15 hops between any two networks? -BGP -EIGRP -OSPF -IS-IS -RIP

-RIP

Which of the following statements about RIP is true? -RIP is a link state routing protocol. -RIP is the routing protocol used on the internet. -RIP is suitable for large networks. -RIP uses hop counts as the cost metric.

-RIP uses hop counts as the cost metric.

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use? -Rapid PVST+ -PortFast -EtherChannel -BPDU guard

-Rapid PVST+

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate? -Routing -Spanning tree -Trunking -PoE -Mirroring

-Routing

Which of the following features dynamically places switch ports in blocking or forwarding states? -Trunking -Spanning tree -Mirroring -PoE

-Spanning tree

Which of the following solutions would you implement to eliminate switching loops? -Inter-VLAN routing -CSMA/CD -Spanning tree -Auto-duplex

-Spanning tree

When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? -Host name -MAC address -IP address -Switch port

-Switch port

Which of the following statements accurately describes a VLAN ID? -VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer. -VLAN IDs are defined at the Network layer and help route the frame through the switch fabric. -Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. -VLAN IDs identify the VLAN where the frame originated so the receiving host can reply

-Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to.

What information does the next hop entry in a routing table identify? -The number of routers that the packet must go through to reach the destination network. -The first router in the path to the destination network. -The last router in the path to the destination network. -A backup router that is used to forward packets addressed to unknown networks

-The first router in the path to the destination network.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? -Bonding -Spanning tree -Trunking -PoE -802.1x

-Trunking

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? -Port security -Spanning tree -VPN -VLAN

-VLAN

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network? -MAC filtering -VLANs -NIC teaming -Subnetting

-VLANs

Which of the following utilities would you use to view the routing table? -tracert -traceroute -route -mtr -dig

-route

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which of these commands produced this output? -pingroute -ping -tracert -nslookup

-tracert

Which TCP/IP utility gives you the following output? -ipconfig -nslookup -ifconfig -tracert

-tracert

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Commonly sold at retail stores. -Unmanaged switch Provides port security features. -Managed switch Supports VLANs. -Managed switch Provides very few configuration options. -Unmanaged switch Can be configured over a network connection. -Managed switch Can be configured over a dedicated communication channel. -Managed switch

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

Competes with normal network traffic for bandwidth. -In-band management Uses a dedicated communication channel. -Out-of-band management Must be encrypted to protect communications from sniffing. -In-band management Does not compete with normal network traffic for bandwidth. -Out-of-band management Affected by network outages. -In-band management

Match the Cisco device password type on the left with its function on the right.

Controls the ability to log on through a LAN or WAN interface configured on the device. -VTY Controls the ability to connect to the device using a web browser using HTTPS. -SDM Controls the ability to connect to the device using a direct connection. -Console

Below are the IP addresses of the hops in the path between ITAdmin and the remote computer on the Internet which has an IP address of 206.8.28.127. Drag the IP addresses listed on the left, to the hops described on the right. Use only the addresses that belong to the routers that match the description. Not all of the IP addresses on the right will be used.

Default gateway for ITAdmin -172.25.10.1 The ISP Internet Router -65.86.1.1 The PartnetNet Router -12.34.58.102 The destination host -206.8.28.127

You need to disable the FastEthernet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all of the commands are required.

Enter global configuration mode. -conf t Enter interface configuration mode. -int fa0/0 Disable the interface. -shutdown Verify that the interface is disabled. -show ip interface brief

Click the View Lab button and use the tracert command to identify the devices in the path between the IT Administrator workstation (named ITAdmin) and a remote computer on the Internet which has an IP address of 206.8.28.127.

How many routers are in the path between ITAdmin and the remote computer? -six What is the default gateway address for ITAdmin? -172.25.10.1 What is the IP address of the last router in the path between ITAdmin and the remote computer? -73.44.216.19

Which of the following IP addresses is a valid IP address for a host on a public network? -142.15.6.1 -192.168.16.45 -172.16.254.12 -10.3.125.2

-142.15.6.1

Select the statement that best describes a broadcast storm. -A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. -A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway. -A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer. -A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity.

-A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

Which of the following is a characteristic of static routing when compared to dynamic routing? -Routers send packets for destination networks to the next hop router. -All routes must be manually updated on the router. -Routers can only use static routing when not connected to the internet. -Routers use the hop count to identify the distance to a destination network.

-All routes must be manually updated on the router.

Assuming the default switch configuration, which switch will become the root bridge? -A -B -C -D

-B

A switch running STP is classified as a backup bridge. What state is it in? -Learning -Blocking -Disabled -Listening -Forwarding

-Blocking

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.) -Devices on separate VLANs share the same subnet address. -Broadcast traffic is only transmitted on VLAN1. -Broadcast traffic is transmitted to all devices on all VLANs. -Broadcast traffic is transmitted only within a VLAN. -Devices on the same VLAN have the same subnet address.

-Broadcast traffic is transmitted only within a VLAN. -Devices on the same VLAN have the same subnet address.

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. Which condition are you most likely to experience on the network? -Echo -Interference -Crosstalk -Attenuation -Collisions

-Collisions

This question includes an image to help you answer the question. View Image Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B? -Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to Computer B. -Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B where it removes the VLAN ID. -Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. -Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch up to Computer B

-Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

How can you guarantee that switch C becomes the root bridge? -Configure Fa0/1 and Fa0/2 on switch C with a higher port priority. -Configure Fa0/1 and Fa0/2 on switch C with a lower port priority. -Configure switch C with a higher priority value. -Configure switch C with a lower priority value. -Configure Fa0/1 and Fa0/2 on switch C with a higher cost value. -Configure Fa0/1 and Fa0/2 on switch C with a lower cost value.

-Configure switch C with a lower priority value.

What does the ip address dhcp command allow you to do? -Configure the switch to obtain an IP address from a DHCP server. -Send the DHCP server address to all connected devices. -Configure the switch to act as a DHCP server. -Specify the DHCP relay server for forwarding DHCP packets.

-Configure the switch to obtain an IP address from a DHCP server.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? -VLSM -Convergence -Distance vector -Classful -Link state

-Convergence

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) -Redundant paths between two hosts -Increased security -Increased number of collision domains -Allowing broadcast traffic between subnets -Increased number of broadcast domains

-Increased security -Increased number of broadcast domains

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? -It places the source address and segment in its database, but does not forward the message. -It does not record address or segment information. -It does not forward the message. -It does not record address or segment information. However, the message is forwarded. -It places the source address and segment in its database and forwards the message.

-It does not record address or segment information.

A switch is running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? -It does not record address or segment information. However, the message is forwarded. -It does not record address or segment information. -It does not forward the message. -It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. -It places the source address and segment in its database and forwards the message.

-It uses the source MAC address and network segment information to build its bridge database, but does not forward the message.

Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in? -Listening -Disabled -Forwarding -Blocking -Learning

-Listening

Which of the following tasks do routers perform? (Select two.) -Identify devices through hardware addresses. -Multiplex signals onto the same transmission media. -Maintain information about paths through an internetwork. -Route data based on logical network addresses. -Control access to the transmission media. -Route data based on hardware device addresses

-Maintain information about paths through an internetwork. -Route data based on logical network addresses.

When multiple routes to a destination exist, what is used to select the best possible route? -Distance vector -Exterior gateway protocol -Metric -Autonomous system number

-Metric

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the internet. You investigate the problem and find that she can access all hosts on the private network, including subnets, but no hosts on the internet. Which of the following is likely the cause of the problem? -Missing default route on a router -Duplex mismatch between a switch and a router -Switching loop on the user's subnet -Incorrect default gateway setting on the computer

-Missing default route on a router

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet. However, the computer does access other computers on other subnets as well as the internet. Which of the following is most likely the cause of the problem? -Missing route on the default gateway router -Incorrect default gateway setting on the computer -Switching loop on the user's subnet -Incorrect VLAN membership of the accounting server

-Missing route on the default gateway router

You are configuring a switch so that you can manage it using PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? -No, the ip default-gateway command needs to be set. -No, the no shutdown command needs to be entered. -Yes, the switch can now be accessed by PuTTY using the IP address 192.168.1.10. -No, the switch needs to obtain an IP address from the DHCP server using the ip address dhcp command.

-No, the no shutdown command needs to be entered.

Which of the following routing protocols uses relative link cost as the metric? -OSPF -RIP -EIGRP -BGP

-OSPF

You work for a large multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: -Verified that the server is up and running. -Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -f -l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean? -One of the intermediate routers is an MTU black hole. -Collisions are occurring on the network. -The destination host is down. -Communications are functioning normally between your workstation and the target server. -One of the intermediate routers is offline.

-One of the intermediate routers is an MTU black hole.

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? -PoE -Mirroring -Spanning tree -Trunking -OSPF

-Spanning tree

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? -802.1x -Trunking -Bonding -PoE -Spanning tree

-Spanning tree

You are the network administrator for a small company that implements NAT to access the internet. You recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these five servers? -Overloading -Dynamic -Static -Restricted

-Static

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access? -Static NAT -Dynamic NAT -Multicast DNS -CNAME record -DNS A record

-Static NAT

Which of the following connectivity hardware is used to create a VLAN? -Bridge -Router -Switch -Hub

-Switch

You can create a virtual LAN using which of the following? -Switch -Hub -Gateway -Router

-Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? -Switch -Router -Bridge -Active hub

-Switch

Which problem does the spanning tree protocol prevent? -Buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device. -Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs. -Routing tables from becoming outdated by decreasing the convergence time on a network. -Switching loops from developing when redundant paths are implemented between switches.

-Switching loops from developing when redundant paths are implemented between switches.

Which of the following are true regarding using multiple VLANs on a single switch? (Select two.) -The number of broadcast domains increases. -The number of collision domains decreases. -The number of collision domains increases. -The number of broadcast domains decreases. -The number of broadcast domains remains the same. -The number of collision domains remains the same.

-The number of broadcast domains increases. -The number of collision domains remains the same.

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. This interface is connected to a workstation located on the second floor. What could cause this to happen? -A strong EMI emitter is near the cable that connects the workstation to the interface. -Two hosts on the network have the same MAC address. -The workstation's network board is jabbering. -An incorrect subnet mask has been configured on the workstation. -Collisions between two or more network hosts are occurring.

-The workstation's network board is jabbering.

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? -Each port can only be a member of a single VLAN. -Trunk ports. -Uplink ports. -Any port not assigned to a VLAN. -Gigabit and higher Ethernet ports

-Trunk ports.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches? -Layer 3 switching -Spanning tree -Bonding -Trunking

-Trunking

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? -VPN -VLAN -Port security -Spanning tree

-VLAN

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? -VPN -VLAN -Spanning tree -Port security

-VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? -Port authentication -NAT -DMZ -VLANs

-VLANs

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? -Port authentication -VLANs -Spanning tree -PoE

-VLANs

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? -Manually reconfigure the default route to point to the new next hop router. -Force RIP to perform an immediate update. - -Wait for convergence to take place. -Stop and restart the RIP protocol on the router

-Wait for convergence to take place.

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches? -You can provide guaranteed bandwidth between two devices. -You can segment the network based on physical location. -You can create multiple collision domains. -You can create multiple broadcast domains.

-You can create multiple broadcast domains.

Which of the following commands would display the output shown here? -ifconfig -host -route print -mtr

-route print

The network board in a workstation is currently configured as follows: Network speed = Auto Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings? (Select two.) -show interface ethernet counters -show running-config interface -show interface switchport -show interface -show interface capabilities

-show interface

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is working properly? -netstat -nbtstat -nslookup -tracert

-tracert

Match the EtherChannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all.

Desirable mode places the port in a negotiating state. -Port Aggregation Protocol (PAgP) Based on the 802.3ad standard. -Link Aggregation Control Protocol (LACP) Passive mode places the port into a passive negotiating state. -Link Aggregation Control Protocol (LACP) Auto mode places the port into a passive negotiating state. -Port Aggregation Protocol (PAgP) Active mode places the port in a negotiating state. -Link Aggregation Control Protocol (LACP)

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all commands are required.

Enter global configuration mode. -conf t Enter interface configuration mode. -int fa0/0 Enable the interface. -no shut Verify that the interface is enabled. -show interface status

You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all of the commands are required

Enter global configuration mode. -conf t Enter interface configuration mode. -int fa0/1 Set the speed of the interface. -speed auto Set the duplex setting for the interface. -duplex auto

What are the main differences between the OSPF and IS-IS routing protocols? -OSPF requires an area 0, while IS-IS does not. -OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. -OSPF is a classful protocol, while IS-IS is a classless protocol. -OSPF is a link state protocol, while IS-IS is not.

OSPF requires an area 0, while IS-IS does not.


Kaugnay na mga set ng pag-aaral

Community Nursing Ch. 15: Emerging Infectious Diseases

View Set

Chapter 5 - Receivables and Sales, Ch 4: Cash and Internal Controls, CHAPTER 6: Cost of Goods Sold, ACC 210 E2

View Set

***HURST Review Elevate Q-Cards***

View Set

6 - Java OCA 8 - Array, ArrayList, String, StringBuilder, Lambda, and Date

View Set