CIT 240 testout week07 quiz on 5.6-6.3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

3.1.6 2. A workstation has been assigned the following IP addressing information: IP address: 192.168.1.26 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.254 DNS server: 192.168.1.1 Given this information, what is the IP address of the network where this host resides?

192.168.1.0 The IP address includes both the network and the host address. The subnet mask is a 32-bit number associated with each IP address that identifies the network portion of the address. In binary form, the subnet mask is always a series of 1s followed by a series of 0s (1s and 0s are never mixed in sequence in the mask). In this example, the decimal form of the subnet mask is 255.255.255.0. This specifies that the network address in this example is 192.168.1.0 192.168.1.255 is the broadcast address for this network. A network address of 192.168.0.0 would require a subnet mask of 255.255.0.0. A network address of 192.0.0.0 would require a subnet mast of 255.0.0.0

2. You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?

2

3.1.6 1. Given that an IPv4 address is a 32-bit binary number represented in four octets (four 8-bit values), which of the following are valid IP Addresses? 224.0.0.1 137.65.1.1 172.17.13

224.0.0.1 137.65.1.1 172.17.13 An IPv4 address is a 32-bit binary number represented as four octets (four 8-bit values). Each octet is separated by a period. Because each octet is 8 bits long, the smalles possible decimal value for a single octet is ) while the largest possible decimal value is 255. In theis example, the other addresses: 137.65.1.257 10.256.1.1 256.1.1.1 are not valid because they contain values larger than 255

3.5.6 7. You have been assigned the IP address of 140.255.0.0 for your network. You have determined that you need 39 subnets to allow for growth. What subnet mask value would you use?

255.255.252.0 Do the math on this it might be wrong (my math gives me 255.255.255.192) with a /26 mask so==>11111111.11111111.11111111.11000000

3.4.4 5. You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 hosts per subnet. Which subnet mask would you use?

255.255.255.224

15. Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. a cable has been plugged in to the port and is connected to a device. You press the mode button to select Stat, and the port light alternately flashes amber and green. What should you do to correct the problem?

Check the NIC in Wrk1 for frame errors or excessive collisions

1. Computer A and B are on the same VLAN and are separated by two switches, as show in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the Frame. The second switch removes the VLAN ID before forwarding it to computer B.

10. For each operation on the right match the appropriate command from the list on the left.

Configure DNS server addresses for the router to use for resolving host names =ip name-server Create static entries for hosts, associating a host name with an IP address =ip host Prevent the router from using DNS to resolve host names =no ip domain-lookup Set the DNS name used by the router =hostname

1. Using the exhibit to answer the following questions. You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a Catalyst 2960 switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch.

5. You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17, but that it an send and receive frames from the five workstations on the network. What should you do?

Configure swtichport security on fa0/17 to allow only the MAC address of SrvFS

4. You need to disable the fastehternet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= int fa0/0 Disable the interface= shutdown Verify the interface is disabled= show ip interface brief

7. you have a small network with four switches as shown in the diagram. which of the following are true. select two

Fa0/3 on switch B is an access port Fa0/2 on switch B is a trunk port

13. YOu want to verify that trunking is enable between the Catalyst 2950XL switch and the Cisco 2600 router. Which command must you enter?

Show interface fa0/1 trunk

3.4.4 1. You have a small network with three subnets as shown in the exhibit. IP addresses for each router interface are also indicated. How many IP address on each subnet remain that can be assigned to hosts?

SubnetA = 125 SubnetB = 0 SubnetC = 13

9. You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from forwarding packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?

Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk allowed vlan remove 3

4. Which command(s) would you use to configure a default-gateway on a Catalyst 2950XL switch?

Switch(config)#ip default-gateway 192.168.10.1

3. Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?

You can create multiple broadcast domains

7. Which interface is the member of VLAN 65?

fa0/22

4. You've just enabled trunking on the fa0/1 port of Catalyst 2960 switch. By default, what traffic can now be sent across this interface?

only 802.1Q traffic

6. You are the only administrator for your company. You are planning for an upcoming vacation and need to ensure that you can administer your switches remotely while you are gone. What must you configure to allow remote administration? select two

~The switch must be configured with a valid IP address and default gateway ~The remote workstation must have access to the management VLAN of the switch

6.1.10 4. which two of the following accurately describe cut-through switching?

~the switch reduces latency by forwarding the frame almost immediately ~the switch copies only the destination address of the frame into its buffer

3.2.6 1. Which of the following is not one of the ranges of private IP addresses that are commonly used behind a NAT router? >10.0.0.1 - 10.255.255.254 >172.16.0.1 - 172.31.255.254 >169.254.0.1 - 169.254.255.254 >192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254 This is the range of IP addresses assigned to Windows DHCP clients if a DHCP server does not assign the client an IP address. this range is know as the Automatic Private IP Addressing (APIPA) range. The other three ranges listed in this question are defined as the private IP addresses from RFC 1918 which are commonly used behind a NAT server.

11. After using the show run command on a 2960 Cisco switch, you receive the following output. Which of the following is true?

Both fastethernet 0/9 and 0/10 are configured as unconditional access ports.

2.1.5 4. Match each characteristic on the left with the appropriate fiber optic connector on the right.

MT-RJ==>Uses metal guide pins to ensure proper alignment LC==>Uses a connector that is half the size of the other fiber optic connectors ST==>Uses a bayonet-type connector SC==>Uses a separate push-on, pull-off connector with a locking tab for each wire

6. You have a Catalyst 2960 switch on a small local area network with one server and five workstations. The file server is named SrvFS and is connected to port fa0/17 on the switch. You have to make sure that only this server can connect to port fa0/17. If any unauthorized devices attempt to attach, you want to disable the port until you manually re-enable it. On fa0/17, you use the swtichport port-security mac-address command to identify the MAC address on the server. What else should you include in your commands? select two.

swithcport port-security maximum 1 switch port port-security violation shutdown

6.1.10 3. you have implemented a network switch. each switch port is connected to a workstation or server host. Which of the following is /not/ true regarding this implementation?

the broadcast domain is reduced to only one device

3.2.6 6. A network host has an IP address of 10.10.0.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address? /8 /16 /24 /32

/8 Class A 10.0.0.0 to 126.255.255.255, default routing prefix is /8 Class B 128.16.0.0 - 191.31.255.255 routing prefix /16 Class C 192.168.0.0 - 223.168.255.255 routing prefix /24

2.6.5 5. You have several hosts, a switch and a router as shown in the image (folder 240: 2.6.5 image). Workstation1 sends an IP packet containing a text document to Workstation2. Which destination address does workstation1 put in the ethernet frame header of the packet containing the text document?

080046987654

2.5.9 2. Which of the following are functions of the MAC sublayer in the OSI model? 2)

==>Defining a unique hardware address for each device on the network ==>Letting devices on the network have access to the LAN

2.7.10 12. Which of the following are true about Gigabit Ethernet? (2)

==>Uses CSMA/CD (Carrier Sense, Multiple Access/Collision Detection) ==>Can use both copper and fiber optic

2.2.8 9. Which of the following are characteristics of a switch? (select two)

=>a switch reads the MAC address in a frame and makes forwarding decisions based on that address. =>The collision domain on a switch is all devices connected to a single switch port

3.4.4 3. You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which four of the following are valid subnet addresses?

>132.66.224.0 >132.66.96.0 >132.66.0.0 >132.66.192.0 1. Convert the custom subnet mask value to binary (224 = 11100000). 2. Select the rightmost masked bit (100000). 3. Convert this bit to decimal. This is the increment value (32). 4. Add the increment value to the network address, up to the subnet mask value

3.2.6 2. . Which of the following IP addresses is a valid IP address for a host on a public network?>172.16.254.12 >192.168.16.45 >10.3.125.2 >142.15.6.1

>142.15.6.1 A public network is a network that does not limit traffic to members of a corporation or other group. The Internet is an example of a public network. Certain sets of IP addresses are reserved for private networks only and cannot be used on public networks. They are: >10.0.0.0 - 10.255.255.255 >172.16.0.0 - 172.31.255.255 >192.168.0.0 - 192.168.255.255

3.3.5 3. Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network?

>254 host addresses are available >172.17.2.0 is a valid subnet

3.3.5 1. Drag each binary subnet mask on the left to its appropriate decimal equivalent on the right.

>255.0.0.0 > 11111111.00000000.00000000.00000000 >255.255.255.128> 11111111.11111111.11111111.1000000 >255.224.0.0> 11111111.1110000.00000000.00000000 >255.255.0.0> 11111111.11111111.00000000.00000000 >255.255.255.252> 11111111.11111111.11111111.11111100

3.3.5 2. Drag each binary subnet mask on the left to its appropriate decimal equivalent on the right.

>255.254.0.0> 11111111.11111110.00000000.00000000 >255.255.255.224> 11111111.11111111.11111111.11100000 >255.248.0.0> 11111111.11111000.00000000.00000000 >255.255.255.0> 11111111.11111111.11111111.00000000 >255.255.255.248> 11111111.11111111.11111111.11111000

2.7.10 5. Which two of the following statements accurately describe half-duplex Ethernet?

>It uses collision detection and recovery. >It sends both signals along the same wire.

2.2.8 3. Which of the following are general advantages of using routers on your network? (3)

>Routers provide multiple links between devices to support load balancing. >Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges. >Routers support multiple routing protocols for better flexibility.

2.3.10 3. Which two of the following lists accurately describes TCP and UDP?

>UDP: connectionless, unreliable, unsequenced, low overhead >TCP: connection-oriented, reliable, sequenced, high overhead

3. What primary advantages does the 802.1Q Trunking Protocol offer compared to ISL. choose two

Can be used with a mix of Cisco and non-disco devices IEEE standard

8. Listed below are several places that a workstation checks to resolve DNS host names. A-Primary DNS server B-Secondary DNS servers C-Host files D-Local DNS cache

D,C,A,B

2.5.9 1. The following items describe the functions performed at various OSI model layers: 1. logical topology, hardware addresses, media access, framing 2. logical device identification, path identification and selection 3. flow control, reliable data transfer, windowing, segmentation, and sequencing 4. convert data to 0s and 1s, bit signaling and synchronization Which of the following correctly identifies the layers that perform each of the functions listed here?

Data link, Network, Transport, Physical

2. You have a small network as shown in the exhibit. You have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the internet to connect to sites like www,cisco.com. What other parameters are required on the workstation? select two

Default gateway DNS server address

4. Which of the following statements describe how VLANs affect broadcast traffic within and internetwork? select two

Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted only within a VLAN

3. You need to configure the fastethernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= ing fa0/1 Set speed of the interface= speed auto Set duplex setting for the interface= duplex auto

5. The fastethernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.

Enter global configuration mode= conf t Enter interface configuration= int fa0/0 Enable the interface= no shutdown Verify the interface is disabled= show interface status

4. You are configuring a new 2960 switch. You issue the following commands. Switch(config)#interface fast 0/15 switch(config-if)#swtichport modes access switch(config-if)#switchport port-security switch(config-if)#switchport port-security maximum 1 switch(config-if)#switchport port-securitymac-address sticky switch(config-if)#switchport port-security violation protect you connect a hub with two workstation to port fa0/15. You power on first device1 and then device2. what will be the result?

Frames from device1 will be allowed; frats from device2 will be dropped

3. You have a small network with a single subnet connected to the internet as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstations should use RouterA as the default gateway, and DNS1 as the DNS server address. From the down-down list, select the appropriate parameters to configure the workstations TCP/IP settings.

IP Address 192.168.12.46 Subnet Mask 255.255.255.240 Default Gateway 192.168.12.34 DNS Server 198.162.1.22

2.6.5 1. What role does ARP play in the routing process?

If a router does not know a destination device's MAC address, it sends and ARP broadcast containing the IP address and requesting the MAC address.

2. A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The ethernet interface in the workstation has been manually configured to use a 100Mbps link speed and full duplexing. Which of the following are true in this scenario? select three

If the link speed is 1000 Mbps or faster, full-duplex is used If the link speed is 10 Mbps or 100 Mbps, half-duplex is used The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected.

10. Which of the following is true concerning the native VLAN and VLAN trunking? select three

If the native VLAN on one end of the trunk is different that the native VLAN on the other end, the traffic of the native VLANs on both sides cannot be transmitted correctly on the trunk Frames are placed on the native VLAN when they enter an 802.1Q trunking interface but do not have an 802.1Q header With 802.1Q trunking, frames from the native VLAN are not tagged

1. Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs?

Increased security Increased number of broadcast domains

2.4.3 3. Drag the information type on the left to the appropriate layer of the OSI model that it is associated with on the right.

Network Layer > Packets Data Link Layer > Frames Physical Layer > Bits Transport Layer > Segments Application Layer > Data

2.4.3 1. The following names are given to data at various stages in the encapsulation process. 1. Packets 2. Bits 3. Segments 4. Frames To which layer of OSI model do the names correspond?

Network, Physical, Transport, Data Link

3.5.6 2. You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure your do not waste IP addresses. How should you implement your plan?

Place all hosts on the same subnet. Use a mask of 255.255.254.0

2.1.5 1.you want to implement and ethernet network using the 1000baseT standard using the minimum hardware specifications possible. which of the following should be in ur plan?

RJ-45 connectors Cat5e twisted pair cable

8. You are implementing a static VLAN trunking configuration on a Catalyst 3550 switch. You would like to keep the switch from tagging packets from VLAN 3 as they leave fastethernet 0/1. Which commands would you use?

Switch(config)#int fa 0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#swtichport trunk native vlan3

2. Which of the following statements accurately describes a VLAN ID?

Switches append a VLAN ID to the header of each frame to identify the virtual network to witch it belongs

2.3.10 2. How does TCP handle data sequencing?

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgment before sending the next segment.

1. You have a small network connected to the Internet as shown in the exhibit. You need to configure the default gateway address on Wr1 so that it can communicate with hosts on the internet. Which address would you use for the default gateway address?

The IP address assigned to FA0/0 on Router 1.

1. Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with swtch2. To check the status of the interface, you run the following commands What is the issue with this network?

The device connected to the Fa0/1 interface has auto negotiation disabled

5. Which of the following are true regarding using multiple VLANs on a single switch? select two

The number of broadcast domains increases The number of collisions domains remains that same

8. You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-shutdown violation mode; shutdown What is true of this configuration?

The port has been disabled because too many MAC address have been detected

7. You have a switch that has port security enable on the fa0/3 interface. The output of the show port-security interface fa0/3 command is shown below. Port security: enable Port status; secure-up violation mode; protect What is true of this configuration? select two

The port has learned one MAC address and saved that address in the running config file The port allows up to two connected devices

13. You are checking the status of port Gi0/1 on your Cisco switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. the results are shown below. Stat=Flashing green Duplex=Solid green Speed= Flashing green Which of the following are true. select two

The port is operating in full duplex mode The port speed is 1000 Mbps

12. You are checking the status of port fa0/12 on your Cisco 2960 switch. A cable has been plugged in to the port and is connected to a device. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which of the following is true?

The port is shut down or the cable is bad.

11. You have just started a Cisco 2960 switch. You notice that the system light is a solid amber color. What does this indicate?

The system has power but is not functioning properly

10. Which of the follwing are true of port security sticky addresses? select two

They can be learned automatically or manually configured they are placed in the running-config-file, and can be saved to the startup-config file

3. What are the default swtichport configurations parameters on a 2960 switch? select two

Violation actions is set to shutdown A maximum of 1 MAC per port is allowed

2.6.5 8. You have several hosts, a switch and a router as shown in image () Workstation3 sends an IP packet to Workstation1. The packet is recieved by CISCO 2600 router as shown in diagram. When the packet leaves the router, which source and estination IP addresses will be contained in the IP packet?

destination IP address = 192.168.10.11 source IP address = 192.168.11.11

9. You have configured port security for the fa0/3 interface. To test the security settings, you connect two workstations to the same port. Both are allowed to connect. You check the running-config file and fine the fowling for the interface. interface fastethernet0/3 swithport mode access swithport port-security mac-address sticky

for the interface, use the swithport port-security command

6.1.10 1. You have used a set of bridges and routers to segment your LAN into smaller networks. What results will you get? (2)

increased number of collision domains decreased congestion on each segment

6.1.10 2. which of the following results of using a router to segment a network? (2)

increased number of collision domains fewer devices per broadcast domain

5. You must configure an IP address on a Catalyst 2950XL switch using the default management switch port. From global configuration mode, which commands would you enter to configure the correct management port?

int vlan 1 ip address 192.168.10.2 255.255.255.0

14. Wrk1 is connected to port fa0/16 on your Cisco 2960 switch. The user complains that she can't access the network server. You verify that a cable is connected to the fa0/16 port on the switch. You press the Mode button to select Stat, Duplex, and Speed. Each time the port light remains off. Which command would most likely correct the problem?

no shutdown

7. You have a workstation configured with DNS server addresses as follows. Primary-192.168.1.1 Alt- 192.168.1.115 While browsing the internet, you go to www.cisco.com. A few minutes later, you type ping www.cisco.com into a command prompt. How will the workstation get the ipad dress for www.cisco.com?

out of its local DNS cache

2. You've just enabled port security on an interface of a Catalyst 2950 switch. You want to generate an SNMP trap whenever a violation occurs. Which feature should you enable?

restrict

9. You would like to see what host names have been cached on your router. Which command displays the cashed list of host names?

show hosts

12. You want to get a list of all ports on your switch that are currently trunking. Which command should you use?

show interface trunk

6. You want to make interface fa0/2 a member of VLAN2 on a Catalyst 2950XL switch. Which commands must you enter? select two

switch port access vlan2 int fastethernet 0/2

5. Switch B is a Catalyst 2924 switch you're configuring to support VLAN trunking. Switch B is both ISL and 802.1Q callable. With a is encapsulating 802.1Q. You want switch B's port to be in trunk mode regardless of the mode configured on switch A. Which commands should you use to configure the trunk port on Switch B? choose two

switchport trunk encapsulation dot1q switch port mode trunk


Kaugnay na mga set ng pag-aaral

Pharm - Ch. 49 Drugs to Treat Anemias

View Set

Exam 2 - quiz questions - Ch. 6,7, 8

View Set

翰林-BOOK 5- 第二次月考-文法選擇

View Set

Vocab Unit 1 CHOOSING THE RIGHT WORD

View Set

InQuizitive Sociology: Chapter 1

View Set

Chapter 11 Stress Psychology 2301

View Set

MacroEconomics 10.3 Long-Run Equilibrium and the Price Level

View Set