network essentials
Convert the following decimal number into HEX: 620
0x26C
You have a network with a custom subnet mask of 255.255.255.240. How many usable IP addresses are available?
14
How many bits are there in each hextet of an IPvo address?
16
You have a prefix length of /19. What is your custom subnet mask?
255.255.224.0
A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?
255.255.255.255
Convert the following IPvo address into the most compressed form 0678:0DF5:0000:CB34:0034:0000:0000:02B0.
678:DF5:0:CB34:34::2B0
Convert the following IPv6 address into the most compressed form 0009:FEAO:00DA:F4A8:00 8A:0000:0000:0000. (Must be in CAPS)
9:FEAO:DA:F4A8:8A::
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files
The ARP table in a switch maps which two types of address together?
Layer 3 address (IP) to a Layer 2 address (MAC)
During a move , employee workstations were disconnected from the network and reconnected in new offices . However , after the move a few workstations cannot get a valid IP address . What should be checked first to identify the root cause of the problem ?
Make sure the cables are functional and properly plugged .
A customer calls the help line to report a computer problem . The help line technician responds and works with the customer for some time . However the technician cannot identify root cause of problem . What should the technician to help the customer ?
Tell the customer that a ticket and another technician will contact the user soon .
A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?
The PC was preconfigured to use DHCP.
When a router is powered on, where will the router first search for a valid lOS image to load by default?
flash memory
Which three commands are used to set up secure access to a router through a connection to the console interface?
line con 0, password cisco, login
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
remote access to a switch where data is encrypted during the session
A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?
the broadcast MAC address
What is indicated by the term throughput?
the measure of the bits transferred across the media over a given period of time