NETWORKING II MIDTERM

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your client has a class B network IP address and needs to support 60 subnets. What subnet mask should you recommend? a. 255.255.252.0 b. 255.255.254.0 c. 255.255.255.0 d. 255.255.255.128

255.255.252.0

Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message? a. %LINEPROTO b. -5- c. UPDOWN d. FastEthernet0/0

%LINEPROTO

An Ethernet network meets the specification for Ethernet 1000BaseT. A single server is connected to a port on the switch. The switch port is configured for auto-detect. What is the available bandwidth on the server cable segment? a. 1000 Mbps if the server NIC is half duplex; 2000 Mbps if the server NIC is set to full duplex b. 1000 Mbps c. 2000 Mbps d. 500 Mbps if the server NIC is half duplex; 1000 Mbps if the server NIC is full duplex e. 500 Mbps

1000 Mbps if the server NIC is half duplex; 2000 Mbps if the server NIC is set to full duplex

Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What is the severity level of this message? a. %LINEPROTO b. -5- c. UPDOWN d. FastEthernet0/0

-5-

When the router boots, it looks for the IOS image in the following locations: Page 17 of 29 http://cdn.testout.com/client-v5-1-10-552/startlabsim.html 2/26/2019 • ROM • Flash • Locations specified by the boot system statements in startup-config • Default TFTP server In what order are these locations checked? a. boot system statements, flash, TFTP server, ROM b. flash, TFTP server, ROM, boot system statements c. flash, boot system statements, TFTP server, ROM d. flash, TFTP server, boot system statements, ROM e. boot system statements, ROM, flash, TFTP server

. boot system statements, flash, TFTP server, ROM

You have a single router with three subnets as shown in the Exhibit. Each subnet has the number of hosts specified. You need to select a subnet mask for each subnet that provides sufficient host addresses without wasting addresses. Which mask values should you use? • SubnetA = 255.255.255.192 • SubnetB = 255.255.255.224 • SubnetC = 255.255.255.128 • SubnetA = 255.255.255.128 • SubnetB = 255.255.255.240 • SubnetC = 255.255.255.192 • SubnetA = 255.255.255.64 • SubnetB = 255.255.255.32 • SubnetC = 255.255.255.64 • SubnetA = 255.255.255.224 • SubnetB = 255.255.255.240 • SubnetC = 255.255.255.192

.• SubnetA = 255.255.255.192 • SubnetB = 255.255.255.224 • SubnetC = 255.255.255.128

A network host has an IP address of 137.65.1.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address? a. /16 b. /8 c. /24 d. /32

/16

A network host has an IP address of 10.10.0.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address? a. /16 b. /8 c. /24 d. /32

/8

You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a photograph to Workstation3. Which destination MAC address does Workstation1 use? a. 080046982365 b. 000b5f2a2222 c. 000b5f2a2223 d. 000b5f2a5111

000b5f2a2222

You have several hosts, a switch and a router as shown in the exhibit. Workstation1 sends an IP packet containing a text document to Workstation2. Which destination address does Workstation1 put in the Ethernet frame header of the packet containing the text document? a. 192.168.10.1 b. 192.168.10.12 c. 080046987654 d. 000b5f2a2222 e. 000b5f2a5111

080046987654

Which of the following configuration register values tells the router to use configuration information from NVRAM? a. 0x42 b. 0x2102 c. 0x001 d. 0x2101

0x2102

What is the correct decimal form of the following binary IP address? 00001010.00000000.01100100.00011101 a. 10.0.100.29 b. 192.0.1.26 c. 137.0.65.11 d. 10.0.65.29

10.0.100.29

What is the correct binary form of the decimal IP address 192.168.1.1? a. 11000000.10101000.00000001.00000001 b. 10101100.00010001.00000001.00000001 c. 00001010.10101000.00000001.00000001 d. 11000000.10101000.00000010.00000001

11000000.10101000.00000001.00000001

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many possible host addresses are on each subnet, excluding subnet address and broadcast address? a. 0 b. 2 c. 6 d. 14 e. 30 f. 62

14

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many possible host addresses are on each subnet? a. 0 b. 2 c. 6 d. 14 e. 30 f. 62

14

Which of the following IP addresses is a valid IP address for a host on a public network? a. 10.3.125.2 b. 172.16.254.12 c. 192.168.16.45 d. 142.15.6.1

142.15.6.1

You have been assigned the IP network address of 135.65.0.0 and have selected 255.255.240.0 as the subnet mask. How many valid subnet addresses are available? a. 8 b. 16 c. 32 d. 64 e. 128

16

You have a network address of 160.88.0.0 with a subnet mask of 255.255.248.0. Which of the following is the broadcast address for subnet 160.88.64.0? a. 160.88.64.255 b. 160.88.71.255 c. 160.88.95.255 d. 160.88.127.255 e. 160.88.255.255

160.88.71.255

Which of the following is not one of the ranges of private IP addresses that are commonly used behind a NAT router? a. 10.0.0.1 - 10.255.255.254 b. 172.16.0.1 - 172.31.255.254 c. 169.254.0.1 - 169.254.255.254 d. 192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254

A workstation has been assigned the following IP addressing information: • IP address: 192.168.1.26 • Subnet mask: 255.255.255.0 • Default gateway: 192.168.1.254 • DNS server: 192.168.1.1 Given this information, what is the IP address of the network where this host resides? a. 192.168.1.0 b. 192.168.0.0 c. 192.0.0.0 d. 192.168.1.255

192.168.1.0

You have several hosts, a switch, and a router as shown in the exhibit. Workstation2 sends an IP packet to Workstation3. Which default gateway address is used by Workstation2? a. 192.168.10.2 b. 192.168.10.1 c. 192.168.11.1 d. 192.168.11.11

192.168.10.1

You need to connect a router to a subnet. The subnet uses the 192.168.12.0 subnet address with a 26-bit subnet mask. You are instructed to assign the last IP address on the subnet to the router. Which IP address will you use? a. 192.168.12.255 b. 192.168.12.254 c. 192.168.12.63 d. 192.168.12.62 e. 192.168.12.30 f. 192.168.12.31 g. 192.168.12.15 h. 192.168.12.14

192.168.12.62

What is the last host IP address on subnet 202.177.48.64 if the mask value is 255.255.255.240? a. 202.177.48.78 b. 202.177.48.95 c. 202.177.48.255 d. 202.177.48.79 e. 202.177.48.254

202.177.48.78

You have a network address of 202.200.55.0 with a subnet mask of 255.255.255.224. Which of the following is the broadcast address for subnet 202.200.55.96? a. 202.200.55.1 b. 202.200.55.96 c. 202.200.55.97 d. 202.200.55.111 e. 202.200.55.127 f. 202.200.55.255

202.200.55.127

A host on the network has an IP address of 223.233.11.101 with a subnet mask of 255.255.255.240. What is the subnet address of this host? a. 223.233.11.96 b. 223.233.11.0 c. 223.233.11.128 d. 223.233.11.224

223.233.11.96

You have been asked to configure a router to connect to network 10.96.0.0. Your supervisor tells you to use an additional three bits in the subnet mask. Which subnet mask should you use to configure the router? a. 255.224.0.0 b. 255.255.220.0 c. 240.0.0.0 d. 224.0.0.0 e. 255.103.0.0 f. 255.240.0.0 g. 255.100.0.0

255.224.0.0

You are examining the network design documents and you see a network address listed as 10.20.0.0/13. What is the subnet mask used for this network? a. 255.248.0.0 b. 255.255.248.0 c. 255.255.240.0 d. 255.240.0.0 e. 255.33.0.0 f. 255.7.0.0

255.248.0.0

Your client has a class B network address and needs to support 500 hosts on as many subnets as possible. Which subnet mask should you recommend? a. 255.255.254.0 b. 255.255.255.0 c. 255.255.255.128 d. 255.255.255.224

255.255.254.0

Your network has been assigned 168.11.0.0 as the network address. You have determined that you need 70 subnets. Which subnet mask value should you select to provide 70 subnets? a. 255.255.252.0 b. 255.255.248.0 c. 255.255.240.0 d. 255.255.254.0 e. 255.255.255.0

255.255.254.0

Your network has been assigned 200.55.6.0 as the network address. You have determined that you need four subnets. Which subnet mask should you use to provide four subnets? a. 255.255.255.128 b. 255.255.255.192 c. 255.255.255.224 d. 255.255.255.240 e. 255.255.255.248 f. 255.255.255.252

255.255.255.192

You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 hosts per subnet. Which subnet mask should you use? a. 255.255.255.224 b. 255.255.255.240 c. 255.255.255.192 d. 255.255.255.248 e. 255.255.255.128

255.255.255.224

You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow for 5 subnets with 20 hosts per subnet. Which subnet mask should you use? a. 255.255.255.224 b. 255.255.255.240 c. 255.255.255.192 d. 255.255.255.248 e. 255.255.255.128

255.255.255.224

Your network has been assigned 200.55.6.0 as the network address. You have determined that you need six subnets. Which of the following should you use as your subnet mask to provide six subnets? a. 255.255.255.128 b. 255.255.255.192 c. 255.255.255.224 d. 255.255.255.240 e. 255.255.255.248 f. 255.255.255.252

255.255.255.224

You have been asked to configure a router to connect to network 192.168.3.48. Your supervisor tells you to use an additional four bits in the subnet mask. Which subnet mask should you use to configure the router? a. 255.255.255.52 b. 255.255.255.63 c. 255.255.255.224 d. 255.255.255.240 e. 255.255.255.248 f. 255.255.255.4 g. 255.255.255.15

255.255.255.240

You have been asked to configure a router to connect to network 192.168.3.48. Your supervisor tells you to use an additional four bits in the subnet mask. Which subnet mask should you use to configure the router? a. 255.255.255.52 b. 255.255.255.63 c. 255.255.255.224 d. 255.255.255.240 e. 255.255.255.248 f. 255.255.255.4 g. 255.255.255.15

255.255.255.240

How many possible host addresses are on each subnet, excluding addresses of all 1s and all 0s? a. 0 b. 62 c. 510 d. 1022

510

Your network uses a network address of 137.65.0.0 with a subnet mask of 255.255.0.0. How many address are available for assignment to network hosts on this network? a. 254 b. 65534 c. 16777214 d. 2

65534

Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1? a. :: b. ::1 c. FF02::1 d. FE80::1

::1

While working at the console of a Cisco device, you need to view a list of the commands that are available in the current mode. Which command should you use? a. ? b. terminal history c. show history d. terminal editing

?

You have a router with three subnets as shown in the Exhibit. You need to choose subnet addresses and masks for each subnet. Which values would you use? A = 172.22.19.32/26 B = 172.22.19.96/27 C = 172.22.19.128/26 A = 172.22.19.64/26 B = 172.22.19.32/27 C = 172.22.19.192/26 A = 172.22.19.128/26 B = 172.22.19.48/27 C = 172.22.19.64/26 A = 172.22.19.128/26 B = 172.22.19.64/27 C = 172.22.19.0/27 A = 172.22.19.192/26 B = 172.22.19.128/27 C = 172.22.19.64/27

A = 172.22.19.64/26 B = 172.22.19.32/27 C = 172.22.19.192/26

Which of the following devices is most likely to be assigned a public IP address? a. A router that connects your home network to the Internet b. A workstation on your company network that has Internet access c. A router on your company network that segments your LAN into two subnets d. A database server used by your company's website for storing customer information

A router that connects your home network to the Internet

A host wants to send a message to another host with the IP address 115.99.80.157. The host does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? a. ICMP b. IGMP c. BOOTP d. DHCP e. ARP f. DNS

ARP

A network administrator is located in a subnet connected to Switch P1 as shown in the exhibit. The administrator is unable to ping Switch A1 connected to the Atlanta router. What is the cause of the problem? a. An incorrect IP address is configured on Switch P1. b. An incorrect IP address is configured on Switch A1. c. An incorrect default-gateway address is configured on Switch P1. d. An incorrect default-gateway address is configured on Switch A1.

An incorrect default-gateway address is configured on Switch A1

How does configuring banners add to the security of your router? a. Banners turn on password checking, allowing only those with the correct password to gain access to the router. b. Banners provide a notice of intent, informing users that access is controlled or that activity may be logged. c. Banners encrypt passwords, making them impossible to recognize and difficult to crack. d. Banners obscure the intended use of the device, making it harder for attackers to perform reconnaissance attacks. e. Banners identify allowed traffic by protocol or source or destination address, allowing you to control which devices or applications have access.

Banners provide a notice of intent, informing users that access is controlled or that activity may be logged.

Which of the following is a list of Layer 2 devices? a. Bridge, network interface card, switch b. Hub, network interface card, switch c. Network interface card, router, switch d. Bridge, hub, switch

Bridge, network interface card, switch

Which of the following is an advantage of using a bridge? a. Bridges forward frames with little or no latency. b. Bridges can be used to increase the maximum physical distance of a LAN. c. Bridges offer guaranteed bandwidth to each device or group of devices. d. Bridges create separate subnets.

Bridges can be used to increase the maximum physical distance of a LAN.

You have a small network as shown in the Exhibit. You are unable to ping Wrk2 from Wrk1. What should you do to fix the problem? a. Change the IP address assigned to Wrk2. b. Change the IP address assigned to Wrk1. c. Use a 29-bit mask for the link between RouterA and RouterB. d. Change the default gateway address on Wrk1. e. Change the default gateway address on Wrk2. f. Change the subnet mask on Wrk1. g. Change the subnet mask on Wrk2

Change the IP address assigned to Wrk2.

The user of Host P1 is complaining he can't communicate with any other device in the company network. What can the network administrator do to correct the problem? a. Change the IP address on Host P1 to 192.168.80.32 . b. Change the subnet mask on both Phoenix E0 and Host P1 to 255.255.255.240. c. Change the subnet mask on Phoenix interface E0 to 255.255.255.248. d. Change the subnet mask on Host P1 to 255.255.255.224.

Change the subnet mask on Host P1 to 255.255.255.224.

You have a small network as shown in the Exhibit. You are unable to ping Wrk2 from Wrk1. What should you do to fix the problem? a. Change the IP address assigned to Wrk2. b. Change the IP address assigned to Wrk1. c. Change the default gateway address on Wrk1. d. Change the default gateway address on Wrk2. e. Change the subnet mask on Wrk1. f. Change the subnet mask on Wrk2.

Change the subnet mask on Wrk1.

You want to enable full duplex on your Ethernet network. Which of the following should you do? a. Configure NICs and switch interfaces to use full duplex. b. Enable loopback and collision detection. c. Upgrade to Cat 6 UTP cable. d. Replace copper cable with fiber optic cable.

Configure NICs and switch interfaces to use full duplex.

You have a small network with two switches, SwitchA and SwitchB. Each switch has three client computers connected. WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA using their own subnet, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB using a different subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. Which should you do? a. Connect SwitchA and SwitchB to a router using a straight-through cable on each side. b. Connect SwitchA and SwitchB with a crossover cable. c. Connect SwitchA and SwitchB with a straight-through cable. d. Connect SwitchA and SwitchB to a bridge using a crossover cable on each side. e. Connect SwitchA and SwitchB with a bridge and a straight-through cable on each side.

Connect SwitchA and SwitchB to a router using a straight-through cable on each side.

You have a small network with two switches, SwitchA and SwitchB. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: Device IP address SwitchA 192.168.1.12/24 WrkA_1 192.168.1.250/24 WrkA_2 192.168.1.251/24 WrkA_3 192.168.1.252/24 SwitchB 192.168.1.15/24 WrkB_4 192.168.1.151/24 WrkB_5 192.168.1.152/24 WrkB_6 192.168.1.153/24 WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do? a. Connect SwitchA and SwitchB to a router using a straight-through cable on each side. b. Connect SwitchA and SwitchB using a crossover cable. c. Connect SwitchA and SwitchB using a rollover cable. d. Connect SwitchA and SwitchB to a router using a crossover cable on each side. e. Connect SwitchA and SwitchB to a router using a rollover cable on each side.

Connect SwitchA and SwitchB using a crossover cable.

You manage a small LAN for a branch office. The branch office has six file servers. You want to use full-duplex Ethernet and offer guaranteed bandwidth to each server. How should you design the network? a. Connect all network devices to a switch. Connect each server to its own switch port. b. Divide the network using a bridge. Place the six servers on one side of the bridge, with all client devices on the other side. c. Divide the network using a router. Place the six servers on one side of the router, with all client devices on the other side. d. Connect all network devices to a switch. On one switch port, connect a hub. Connect all six servers to this hub.

Connect all network devices to a switch. Connect each server to its own switch port.

Which of the following IPv6 addresses is used by a host to contact a DHCP server? a. FF02::1 b. FF02::1:2 c. FF02::2 d. FE80::1 e. FE80::1:2 f. FE80::2

FF02::1:2

At which layer of the OSI model do network switches operate? a. Physical b. Data Link c. Network d. Transport

Data Link

The following items describe the functions performed at various OSI model layers: 1. Logical topology, hardware addresses, media access, framing 2. Logical device identification, path identification and selection 3. Flow control, reliable data transfer, windowing, segmentation, and sequencing 4. Convert data to 0s and 1s, bit signaling and synchronization Which of the following correctly identifies the layers that perform each of the functions listed here? a. Transport, Network, Physical, Data Link b. Network, Data Link, Transport, Physical c. Network, Transport, Physical, Data Link d. Physical, Transport, Network, Data Link e. Data Link, Network, Transport, Physical

Data Link, Network, Transport, Physical

What is the purpose of the CRC in network communications? a. Detect lost packets b. Request retransmission of lost packets c. Detect data errors d. Correct data errors e. Slow down or speed up data transmissions f. Re-assemble packets into their original order

Detect data errors

A Cisco router boots but cannot locate a valid IOS image in flash memory or on a TFTP server. Assuming the default configuration, what will the router do next? a. Enter setup mode b. Enter ROM monitor mode c. Stop with an IOS image load error d. Prompt you for the location of a valid IOS image

Enter ROM monitor mode

A Cisco router boots but cannot locate the startup-config file. Assuming the default configuration, what will the router do next? a. Stop with a configuration file load error b. Enter ROM monitor mode c. Enter setup mode d. Prompt you for the location of a valid configuration file

Enter setup mode

You are working on a workstation with the following MAC address: 10-01-64-AB-78-96 Which of the following will be the link-local address using the modified EUI-64 format? a. FE80::1201:64FF:FEAB:7896 b. FE80::1001:64AB:7896 c. FE80::1001:64AB:7896:FFFF d. FC00::1001:64FF:FEAB:7896 e. FC00::1001:64AB:7896 f. FC00::1001:64AB:7896:FFFF

FE80::1201:64FF:FEAB:7896

You want to prevent users from accessing a router through a Telnet session. What should you do? a. For the VTY lines, set a password but remove the login parameter. b. For the VTY lines, add the login parameter and configure a password. c. For the console line, add the login parameter and remove any passwords. d. For the VTY lines, add the login parameter and remove any passwords. e. For the console line, set a password but remove the login parameter. f. For the console line, add the login parameter and configure a password.

For the VTY lines, add the login parameter and remove any passwords.

You need to design an IPv6 addressing scheme for your network. The following are key requirements for your design: • Infrastructure hosts, such as routers and servers, will be assigned static interface IDs while workstations, notebooks, tablets, and phones will be assigned interface IDs dynamically. • Internet access must be available to all hosts through an ISP. • Site-to-site WAN connections will be created using leased lines. Which type of IPv6 addressing is most appropriate for hosts in this network? a. Global Unicast Addressing b. Unique Local Unicast Addressing c. Link-Local Addressing d. Anycast Addressing

Global Unicast Addressing

Your company wants to begin the transition from IPv4 to IPv6. You want to stage the implementation on a host-by-host basis. You will enable IPv6 on existing hosts as time and budget allows. During the transition, all hosts in your site need to communicate with all other hosts. IPv6 should be used between hosts when both hosts support IPv6. NAT support is not required. Which method should you use? a. Teredo b. ISATAP c. 6-to-4 d. Manual tunnels

ISATAP

What role does ARP play in the routing process? a. If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the IP address and requesting the MAC address. b. If a router does not know a destination device's IP address, it sends an ARP broadcast containing the MAC address and requesting the IP address. c. If a router knows the MAC and IP address of a destination host, it sends an ARP request to update the other routers' route tables. d. ARP does not play any role in the routing process. Switches use ARP to map IP addresses to MAC addresses in collision domains.

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the IP address and requesting the MAC address.

Your router generates a log message with a severity level of 1. What does this indicate? a. Immediate action is needed. b. A critical condition exists. c. The system is unusable. d. The message is only informational in nature.

Immediate action is needed.

You want users to enter a password before being able to access the router through a Telnet session. You use the following commands: router#config t router(config)#line vty 0 4 router(config-line)#password cisco router(config-line)#exit router(config)#exit You open a Telnet session with the router and discover that the session starts without being prompted for a password. What should you do? a. In line configuration mode, add the login parameter. b. Repeat the same configuration steps in line con 0 mode. c. Use the enable secret command in line configuration mode to set the password d. In global configuration mode, configure the enable secret password.

In line configuration mode, add the login parameter.

You have a small network as shown in the Exhibit. You are troubleshooting connectivity issues at Wrk1. From Wrk1 you are able to ping hosts Wrk2 and Wrk3. A ping to any host in the main office fails. From Wrk2, you can ping any host in the branch office or the main office. a. What is the most likely cause of the problem? b. Incorrect default gateway configuration on the workstation. c. Incorrect IP address or subnet mask setting on Wrk1. d. Bad cable between Wrk1 and the switch. e. Bad cable between the switch and the SFO router. f. Missing or incorrect static route from SFO to the main office.

Incorrect default gateway configuration on the workstation.

Which of the following is true of the system ROM on a Cisco device? a. It holds the current configuration used by the device as it runs. b. It holds a limited version of the IOS software to be used if the full IOS image can't be found. c. It holds the startup-config file that is copied into memory when the device boots. d. It provides a long-term storage location for saving alternate configuration files and IOS images.

It holds a limited version of the IOS software to be used if the full IOS image can't be found.

What is the backoff on an Ethernet network? a. It signals that a collision has occurred. b. It is the random amount of time a device waits before retransmitting after a collision. c. It prevents collisions from occurring. d. It identifies the maximum size of a data segment within a packet.

It is the random amount of time a device waits before retransmitting after a collision.

Which of the following is the most important thing to do to prevent console access to the router? a. Keep the router in a locked room. b. Set console and enable secret passwords. c. Disconnect the console cable when not in use. d. Implement an access list to prevent console connections.

Keep the router in a locked room.

You have a small network with a single subnet connected to the Internet. You have configured a DHCP server to deliver IP address, default gateway, and DNS server addresses to hosts. You are using a Windows laptop connected to the LAN through an Ethernet connection. You would like the laptop to use a different DNS server address than is used on the rest of the LAN. It should have an IP address on the subnet, and use the same default gateway address. What will you need to configure on the laptop? a. Manually configure the IP address, mask, default gateway, and DNS server addresses. b. Manually configure the default DNS server address. c. Manually configure the default gateway and DNS server addresses. d. Manually configure the IP address, mask, and DNS server address.

Manually configure the default DNS server address.

You have a small network with a single subnet connected to the Internet. You have configured a DHCP server to deliver IP address, default gateway, and DNS server addresses to hosts. You are using a Windows laptop connected to the LAN through an Ethernet connection. You would like the laptop to use a different default gateway address than is used on the rest of the LAN. It should have an IP address on the subnet, and use the same DNS server addresses. What will you need to configure on the laptop? a. Manually configure the IP address, mask, default gateway, and DNS server addresses. b. Manually configure the default gateway address. c. Manually configure the default gateway and DNS server addresses. d. Manually configure the IP address, mask, and default gateway address

Manually configure the default gateway address.

Your company has just started contracting with the government. As part of the contract, you have configured a special server for running a custom application. Contract terms dictate that this server use only IPv6. You have several hosts that need to communicate with this server. Hosts run only IPv4 and cannot be configured to run IPv6. Which solution would you use to allow the IPv4 clients to communicate with the IPv6 server? a. NAT-PT b. Teredo c. ISATAP d. 6-to-4 e. Dual stack

NAT-PT

The following names are given to data at various stages in the encapsulation process. 1. Packets 2. Bits 3. Segments 4. Frames To which layer of the OSI model do the names correspond? a. Transport, Data Link, Network, Physical b. Transport, Physical, Data Link, Network c. Physical, Data Link, Network, Transport d. Network, Physical, Transport, Data Link e. Data Link, Transport, Physical, Network

Network, Physical, Transport, Data Link

Which of the following describes the function of a dedicated wireless access point on an enterprise network? a. On an enterprise network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet. b. On an enterprise network, a wireless access point only acts as a switch that forwards traffic from the wireless network to the wired network. c. On an enterprise network, a wireless access point only acts as a hub that connects to both the wireless and wired networks. d. On an enterprise network, a wireless access point only acts as a router that connects the wireless network to the wired network

On an enterprise network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.

What is the main security weakness in using the service password-encryption command? a. Passwords are kept in the configuration register b. Passwords are rendered as 4-digit hexadecimal values c. Password values are transposed d. Passwords can be easily broken

Passwords can be easily broken

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not waste IP addresses. How should you implement your plan? a. Place all hosts on the same subnet. Use a mask of 255.255.254.0. b. Use a router to create two subnets, with half of the hosts on each subnet. Use a mask of 255.255.255.0 on each subnet. c. Use a router to create two subnets. Put 250 hosts on one subnet and 25 hosts on the other subnet. Use 255.255.255.0 and 255.255.255.224 as subnet masks. d. Use a bridge on a single subnet. Use a mask of 255.255.255.128 for each bridge port. e. Connect a router to a switch with a single connection. Create two subinterfaces on the router. Use a mask of 255.255.255.0 for each subinterface.

Place all hosts on the same subnet. Use a mask of 255.255.254.0.

An Internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server? a. Port or socket number b. Session ID c. IP address d. Routing Information Protocol (RIP) e. Sequence number

Port or socket number

While working at the console of a Cisco device, you need to use the same command repeatedly. Given that the command is quite long, what can you do to avoid having to retype it over and over? a. Enter terminal editing at the command prompt. b. Enter terminal no history at the command prompt. c. Press the Up arrow key. d. Enter show history at the command prompt.

Press the Up arrow key.

Shown here is a diagram of the back of a sample router. If Port C is the console port, what type of cable and connector would you use to connect to the console port? a. RJ-45 rollover cable b. RJ-45 straight-through cable c. RJ-45 crossover cable d. RJ-11 straight-through cable e. DB-60 DTE cable f. DB-60 DCE cable

RJ-45 rollover cable

You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups, Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the needs while providing the most economical and simplest administration? a. Router b. Hub c. Switch d. Bridge e. Gateway

Router

You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite . Which connectivity device would be the best choice in this situation? a. Repeater b. Hub c. Router d. Bridge e. Switch f. Gateway

Router

You have established an SSH connection to your router. You use the following command and receive the error message shown: Router>enable % Error in authentication Which command would correct the problem? a. RouterA(config)#enable secret cisco b. RouterA(config-line)#transport input ssh c. RouterA(config)#username admin password cisco d. RouterA(config)#crypto key generate rsa e. RouterA(config)#ip domain-name westsim.com

RouterA(config)#enable secret cisco

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true? a. Routers use ARP to resolve known IP addresses into MAC addresses by broadcasting requests to the network. b. Routers use DNS to resolve MAC addresses of diskless workstations into IP addresses, based on the information contained in other routers' route tables. c. Diskless workstations use ARP to ask a server for an IP address. d. ICMP lets routers bypass the general network broadcast by providing a dynamic table of IP-to-MAC address mappings.

Routers use ARP to resolve known IP addresses into MAC addresses by broadcasting requests to the network.

You have been assigned a network address of 131.189.0.0. You have subnetted the network using 255.255.224.0 as the subnet mask. Which of the host address assignments in the graphic will not cause problems? (Exclude addresses with all 1s or all 0s.) a. Scenario 1 b. Scenario 2 c. Scenario 3 d. Scenario 4

Scenario 2

You have been assigned a network address of 211.155.189.0. You have subnetted the network using 255.255.255.240 as the subnet mask. Which of the host address assignments in the graphic will not cause problems (exclude addresses with all 1s or all 0s)? a. Scenario 1 b. Scenario 2 c. Scenario 3 d. Scenario 4

Scenario 4

A client computer starts to download some files from an FTP server named FTPsvr1. While the first download is in progress, the user opens a second instance of the FTP program and initiates a second download. What does the server and the client use to keep each download separate? a. Port or socket numbers b. Session ID c. IP Address d. Sequence numbers e. CRC

Session ID

You have a network with two routers as shown in the exhibit. You need to assign subnet addresses and masks to subnets 1, 2, and 3. Which subnet values should you use? Subnet 1 = 172.16.0.0/29 Subnet 2 = 172.16.0.8/28 Subnet 3 = 172.16.0.24/30 Subnet 1 = 172.16.0.16/29 Subnet 2 = 172.16.0.0/28 Subnet 3 = 172.16.0.20/30 Subnet 1 = 172.16.0.0/29 Subnet 2 = 172.16.0.16/28 Subnet 3 = 172.16.0.32/30 Subnet 1 = 172.16.0.16/29 Subnet 2 = 172.16.0.0/28 Subnet 3 = 172.16.0.28/30

Subnet 1 = 172.16.0.16/29 Subnet 2 = 172.16.0.0/28 Subnet 3 = 172.16.0.28/30

You have a small network with three subnets as shown in the exhibit. IP addresses for each router interface are also indicated. How many IP addresses on each subnet remain that can be assigned to hosts? a. SubnetA = 125, SubnetB = 0, SubnetC = 13 b. SubnetA = 253, SubnetB = 4, SubnetC = 29 c. SubnetA = 126, SubnetB = 2, SubnetC = 14 d. SubnetA = 254, SubnetB = 6, SubnetC = 30 e. SubnetA = 61, SubnetB = 0, SubnetC = 5 f. SubnetA = 62, SubnetB = 0, SubnetC = 6

SubnetA = 125, SubnetB = 0, SubnetC = 13

You have a network with three subnets. You have selected the following subnet addresses: • SubnetA = 172.29.10.32/29 • SubnetB = 172.30.10.128/26 • SubnetC = 172.31.10.32/30 How many host addresses are available on each subnet? a. SubnetA = 6, SubnetB = 62, SubnetC = 2 b. SubnetA = 14, SubnetB = 126, SubnetC = 4 c. SubnetA = 2, SubnetB = 30, SubnetC = 0 d. SubnetA = 14, SubnetB = 126, SubnetC = 2 e. SubnetA = 6, SubnetB = 30, SubnetC = 4 f. SubnetA = 30, SubnetB = 30, SubnetC = 30

SubnetA = 6, SubnetB = 62, SubnetC = 2

You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose? a. Bridge b. Switch c. Router d. Active hub

Switch

How does TCP handle data sequencing? a. TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment. b. TCP breaks user data into segments, numbers each segment, and sends each segment in order, without waiting for an acknowledgement. c. TCP breaks the data into segments, numbers each segment, and passes them to d. UDP, which sequences the segments into the correct order. d. TCP does not sequence the data; it simply passes numbered segments created at a higher layer in the sequence defined.

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for an acknowledgement before sending the next segment.

You have a special server at work with a custom application installed. Connections to the server that use the custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost-effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which method should you use? a. NAT-PT b. ISATAP c. Teredo d. 6-to-4

Teredo

The Serial 0/1/0 interface on RouterA is connected to the Serial0/0/1 interface on RouterB. The link between the routers uses subnet address 172.99.5.112 with a mask of 255.255.255.240. RouterA is unable to communicate with RouterB. You view the interface status on RouterA and see the following information: RouterA#sh int s0/1/0 Serial0/1/0 is up, line protocol is up Hardware is GT96K Serial Internet address is 172.99.5.129/28 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set Keepalive set (10 sec) --additional output omitted What is the problem? a. The IP address assigned to the interface is not on the 172.99.5.112 subnet. b. The wrong subnet mask is used . c. The interface has been shut down. d. The encapsulation types used by both routers do not match.

The IP address assigned to the interface is not on the 172.99.5.112 subnet.

You have a small network as shown in the Exhibit. You are unable to ping Wrk2 from Wrk1. What is causing the problem? a. The default gateway setting on Wrk1 is not on the same subnet as its IP address. b. The default gateway setting on Wrk2 is not on the same subnet as its IP address. c. The IP address assigned to RouterA is the broadcast address. d. The IP address assigned to RouterB is the broadcast address. e. Addresses assigned to RouterA and RouterB are not on the same subnet.

The default gateway setting on Wrk2 is not on the same subnet as its IP address

You have a small network as shown in the Exhibit. You are unable to ping Wrk2 from Wrk1. What is causing the problem? a. The default gateway setting on Wrk1 is not on the same subnet as its IP address. b. The default gateway setting on Wrk2 is not on the same subnet as its IP address. c. The IP address assigned to RouterA is the broadcast address . d. The IP address assigned to RouterB is the broadcast address. e. Addresses assigned to RouterA and RouterB are not on the same subnet.

The default gateway setting on Wrk2 is not on the same subnet as its IP address.

What is the first thing that happens when a collision occurs on an Ethernet network? a. The device that detected the collision transmits a jam signal. b. All devices wait a random amount of time before trying to retransmit. c. Devices listen to the medium before trying to retransmit. A device that wants to send data sends a request to send (RTS) message. d. All devices that were sending data transmit a clear to send (CTS) message.

The device that detected the collision transmits a jam signal.

Your router generates a log message with a severity level of 6. What does this indicate? a. Immediate action is needed. b. A critical condition exists. c. The system is unusable. d. The message is only informational in nature.

The message is only informational in nature.

You have a small network, as shown in the image. The user on workstation A reports that she cannot communicate with remote workstation D. You begin to troubleshoot the problem by sending a ping from workstation A to the remote workstation D, but it does not reply. Next you try sending a ping from workstation A to the remote workstation C, and it replies successfully. Which of the following can you assume based on these results? a. The problem is with the configuration or connectivity of remote workstation D. b. The problem is with the remote router that is connected to workstations D and C. c. The problem is the connectivity or configuration of the local workstation A. d. Nothing yet, because you still need to try sending a ping to remote workstation E.

The problem is with the configuration or connectivity of remote workstation D.

You have just connected a Windows workstation to the network. The workstation can communicate with all devices on the same subnet, but can't communicate with other devices on other subnets. You use the ipconfig command on the workstation and see the following: C:\ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: IP Address . . . . . . . . . . : 192.168.1.100 Subnet Mask. . . . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . : 192.168.1.1 No other devices seem to have a problem. What is the most likely cause of the problem? a. The IP address is already used on the subnet. b. The subnet mask is configured incorrectly. c. The wrong default gateway address has been configured. d. The cable connecting the workstation to the network is bad. e. The default gateway router is down.

The wrong default gateway address has been configured.

The Serial 0/1/0 interface on RouterA is connected to the Serial0/0/1 interface on RouterB. The link between the routers uses subnet address 10.198.166.184 with a mask of 255.255.255.248. RouterA is unable to communicate with RouterB. You view the interface status on RouterA and see the following information: RouterA#sh int s0/1/0 Serial0/1/0 is up, line protocol is up Hardware is GT96K Serial Internet address is 10.198.166.190/28 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, loopback not set Keepalive set (10 sec) --additional output omitted What is the problem? a. The IP address assigned to the interface is not on the 10.198.166.184 subnet. b. The wrong subnet mask is used. c. The interface has been shut down. d. The encapsulation types used by both routers do not match.

The wrong subnet mask is used.

You have a small network, as shown in the image. The user on workstation A reports that he cannot communicate with remote workstation E. You begin to troubleshoot the problem by sending a ping from workstation A to the remote workstation E, but cannot reach this host. Next you try sending pings from workstation A to the remote workstations C and D, and cannot reach either of them. You also try pinging the IP address assigned to interface 1 on the Default Gateway router, which is also unsuccessful. Finally, you ping workstation B, and this time you get a successful reply. Which of the following can you assume based on these results? a. There is a problem with the default gateway router. b. Workstation A has a connectivity issue that needs to resolved. c. There is a configuration issue with interface 2 on the default gateway router. d. Nothing yet, because you still need to see if you can successfully ping the local host (127.0.0.0) on workstation A.

There is a problem with the default gateway router.

Which of the following commands lists a workstation's ARP cache? a. ipconfig b. arp -a c. arp -d d. tracert e. ping

arp -a

Which is the primary role of a firewall? a. protect users from phishing, botnets, and other types of social networking and social media attacks. b. To detect and block messages that contain viruses and worms that could infect the network or workstations. c. To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules. d. To protect network users from accessing dangerous or questionable webpages. The firewall does this using a website blacklist.

To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.

When you start up your router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password: The sky is blue Router> For security purposes, you would like to change the message The sky is blue to read All activity is monitored. Which command should you use? a. banner incoming *All activity is monitored* b. banner motd *All activity is monitored* c. banner login *All activity is monitored* d. banner exec *All activity is monitored*

banner exec *All activity is monitored*

You are troubleshooting a router remotely using Telnet. You issue the following command at the CLI: pdx#debug ip rip You watch for a few minutes, but no debug output is displayed. What is the problem? a. You must use the terminal monitor command to view debug output from a Telnet session. b. This is not a valid command c. Debug output can only be viewed from the console d. The router must be restarted before the debug command takes effect e. You must also issue the debug start command

You must use the terminal monitor command to view debug output from a Telnet session.

When you start up your router, you see the following messages: Have a nice day! The grass grows green User Access Verification Password: The sky is blue Router> For security purposes, you would like to change the message The grass grows green to read Only administrator access is allowed. Which command should you use? a. banner exec *Only administrator access is allowed* b. banner motd *Only administrator access is allowed* c. banner login *Only administrator access is allowed* d. banner incoming *Only administrator access is allowed*

banner login *Only administrator access is allowed*

You need to back up the current IOS image on your router to the TFTP server. The TFTP server's IP address is 192.56.145.23. Which of the following commands do you use? a. backup tftp 192.56.145.23 flash IOSBackup b. backup flash tftp 192.56.145.23 c. copy flash tftp 192.56.145.23 d. copy flash tftp e. backup flash tftp

copy flash tftp

You want to save the configuration file in NVRAM to a TFTP server with address 192.168.1.10 to be used as a backup. Which command would you use? copy run tftp copy start tftp 192.168.1.10 copy tftp run copy tftp start copy start tftp

copy start tftp

Which command do you use to copy a file named ATL-1.cfg on the TFTP server to the running-config on the router? copy ATL-1.cfg run copy ATL-1.cfg tftp run copy run tftp ATL-1.cfg copy tftp run copy run ATL-1.cfg copy tftp ATL-1.cfg run

copy tftp run

Which of the following commands configures a password to switch to privileged EXEC mode, and saves the password using MD5 hashing? a. enable secret b. enable password c. password d. service password-encryption

enable secret

While configuring a new router, you use the following commands: Router(config)#enable password cisco Router(config)#enable secret highway Router(config)#username admin password television Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login Which password would you use to open a Telnet session to the router? a. cisco b. highway c. airplane d. garage

garage

While configuring a new router, you use the following commands: Router(config)#enable password cisco Router(config)#enable secret highway Router(config)#line con 0 Router(config-line)#password airplane Router(config-line)#login Router(config-line)#line vty 0 4 Router(config-line)#password garage Router(config-line)#login You establish a Telnet session to the router. Which password would you use to enter privileged EXEC mode? a. cisco b. highway c. airplane d. garage

highway

You have connected five Windows workstations and one server to a switch. The server is configured as a DHCP server. You want to verify that each workstation has received its IP address from the DHCP server. Which command would you use? a. ipconfig b. ping c. tracert d. arp e. telnet

ipconfig

Your organization has been assigned a registered global routing prefix of 2001:FEED:BEEF::/48 by an ISP. Using your organization's IPv6 addressing scheme, you've used the next 16 bits beyond the global routing prefix to define the following subnets: • 2001:FEED:BEEF:0001::/64 • 2001:FEED:BEEF:0002::/64 • 2001:FEED:BEEF:0003::/64 • 2001:FEED:BEEF:0004::/64 You need to statically assign an interface ID of 0000:0000:0000:0001 to the router interface connected to the 2001:FEED:BEEF:0003::/64 subnet. Which interface configuration command would you use to do this? a. ipv6 address 2001:FEED:BEEF:0003::1/64 b. ipv6 address 2001:FEED:BEEF:0003::/64 c. ipv6 address 2001:FEED:BEEF:0003::/64 eui-64 d. ipv6 address 2001:FEED:BEEF:0003::1/48 e. ipv6 address 2001:FEED:BEEF:0002::1/64

ipv6 address 2001:FEED:BEEF:0003::1/64

Your organization has decided to implement unique local unicast IPv6 addressing. A global ID of FD01:A001:0001::/48 been selected for the organization's IPv6 addressing scheme. The next 16 bits beyond the global ID have been used to define the following subnets: • FD01:A001:0001:0001::/64 • FD01:A001:0001:0002::/64 • FD01:A001:0001:0003::/64 • FD01:A001:0001:0004::/64 You need to statically assign an interface ID to a router interface connected to the FD01:A001:0001:0003::/64 subnet. To ensure uniqueness, the interface ID should be constructed using the MAC address of the router interface. Which interface configuration command would you use to do this? a. ipv6 address FD01:A001:0001:0003::1/64 b. ipv6 address FD01:A001:0001:0003::/64 eui-64 c. ipv6 address FD01:A001:0001:0002::/64 eui-64 d. ipv6 address FD01:A001:0001:0003::/48 eui-64 e. ipv6 address FD01:A001:0001:0002::1/64

ipv6 address FD01:A001:0001:0003::/64 eui-64

Which IPv6 address type is only valid within a subnet? a. link-local b. unique local c. global unicast d. multicast e. site-local

link-local

You are configuring a router to redirect and consolidate log messages to a Syslog server. The router has multiple interfaces. However, you want all log messages being sent to the Syslog server to be seen as coming from the same IP address on the router, regardless of which interface the message actually exits the router from. Which command is used to accomplish this? a. logging host <address> b. logging trap <level> c. logging source-interface <interface> d. show logging

logging source-interface <interface>

Listed below are three banner types that can be configured on a router: • exec • motd • login If all three banners were configured, in which order would they display when a Telnet session is used to connect to the router? a. login, exec, motd b. exec, motd, login c. motd, exec, login d. motd, login, exec e. login, motd, exec

motd, login, exec

You have a test lab that you use to test different configurations before deploying them in your live network. You have been testing several commands from configuration mode, then going back to enable mode to view the running-configuration. Every time you exit configuration mode, the following output is displayed: %SYS-5-CONFIG_I: Configured from console by console What command can stop these messages from appearing on your screen? a. no logging console b. no syslog c. terminal no monitor d. terminal no notify

no logging console

You have configured PPP with CHAP authentication on the BRI0 interface of your router. You now want to hide the CHAP password from view in the configuration file. What command should you use? a. ppp encryption b. ppp MD5 encrypt c. enable secret password d. service password-encryption

service password-encryption

While working at the console of a Cisco device, you need to view a list of the commands that are currently stored in the history buffer of the system. Which command should you use? a. ? b. terminal history c. show history d. terminal editing e. terminal no history

show history

Which of the following Cisco router commands can you use to test IP Application-layer processes as well as Network-layer connectivity? a. ping telnet trace All of the above

telnet

Which of the following utilities gives you the most information about the operational status of a router? a. ping b. traceroute c. telnet d. ipconfig e. show ip interfaces

telnet


Kaugnay na mga set ng pag-aaral

AP Government: Chapter 8-9 President and Bureaucracy

View Set

CH. 4: Human digestion and absorption

View Set

SBM2000 Chapter 11 Quiz: Supply Chain Management

View Set

HITT 2149-RHIT Competency Review

View Set