7.0 Test out Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation? 6,000 3,000 1,500 9,000

9,000

Which of the following BEST describes Ethernet flow control? A configuration that allows frames larger than 1,500 bytes to pass through the port without fragmentation. A protocol designed to prevent looping in network traffic. A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent. A configuration that allows traffic from multiple VLANs on a single port.

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Which of the following is a method that allows you to connect a private network to the internet without obtaining registered addresses for every host? BGP NAT EIGRP OSPF

NAT

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6? NDP Auto-MDIX ARP CSMA/CD

NDP

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen? PoE++ Type 3 PoE PoE+ PoE++ Type 4

PoE++ Type 4

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls? Spanning Tree Protocol Port mirroring LACP Priority-based flow control

Port mirroring

Which of the following switch features allows you to configure how the switch's MAC address table is filled? Port security Auto-negotiation Spanning Tree Protocol Port mirroring

Port security

Which of the following is NOT one of the IP address ranges defined in RFC 1918 that are commonly used behind a NAT server? 172.16.0.1 to 172.31.255.254 169.254.0.1 to 169.254.255.254 10.0.0.1 to 10.255.255.254 192.168.0.1 to 192.168.255.254

169.254.0.1 to 169.254.255.254

Which of the following is the open standard for tagging Layer 2 frames? 802.1q ARP RFC1918 NDP

802.1q

Which of the following best describes DHCP scope exhaustion? When IP address lease times on a DHCP server are shortened. When a DHCP snooping technique is used to drop packets from untrusted DHCP servers. A denial of service from a lack of IP addresses in a DHCP server's pool. When an attacker adds a second DHCP server to a network and offers IP addresses to clients wanting to join the network.

A denial of service from a lack of IP addresses in a DHCP server's pool.

Which of the following do hosts on a private network share if the network utilizes a NAT router? A physical IP address A physical MAC address A virtual MAC address A virtual IP address

A physical IP address

Which of the following BEST describes an ARP spoofing attack? An attack where a frame is manipulated to contain two tags. An attack in which a switch is flooded with packets, each containing a different source MAC address. An attack that associates an attacker's MAC address with the IP address of a victim's device. An attack that changes the source MAC address on frames.

An attack that associates an attacker's MAC address with the IP address of a victim's device.

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device? CSMA/CD ARP NDP Auto-MDI-X

CSMA/CD

MAC spoofing

Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

MAC flooding

Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode.

Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay? BGP OSPF EIGRP RIP

EIGRP

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following BEST describes the frame's composition as it travels from A to B? https://cdn.testout.com/_version_6023/netpro2021v6-en-us/en-us/resources/text/t_conf_switch_ports_np6/q_conf_switch_port_vlan_id_01_np6.jpg Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to Computer B. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch up to Computer B. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B, where it removes the VLAN ID.

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge? https://cdn.testout.com/_version_6023/netpro2021v6-en-us/en-us/resources/text/t_switch_attacks_np6/q_switch_attacks_root_01_np6.png Configure a priority number of 61440 for switch C. Remove link cables 1 and 6 from the configuration. Remove link cable 1 from the configuration. Remove link cable 6 from the configuration. Configure a priority number of 4096 for switch C.

Configure a priority number of 4096 for switch C.

What does the ip address dhcp command allow you to do? Configure a switch to act as a DHCP server. Configure a switch to obtain an IP address from a DHCP server. Specify the DHCP relay server for forwarding DHCP packets. Send the DHCP server address for all connected devices.

Configure a switch to obtain an IP address from a DHCP server.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do? Create a VLAN for each group of four computers. Remove the hub and place each library computer on its own access port. Configure port security on the switch. Create static MAC addresses for each computer and associate each address with a VLAN.

Configure port security on the switch.

Which of the following scenarios would typically utilize 802.1x authentication? Controlling access through a switch. Authenticating remote access clients. Controlling access through a router. Authenticating VPN users through the internet.

Controlling access through a switch.

Which of the following allows incoming traffic addressed to a specific port to move through the firewall and be transparently forwarded to a specific host on the private network? Dynamic NAT DNAT IP masquerade OSPF

DNAT

Which level of the OSI model does a Layer 2 switch operate at? Data Link layer Session layer Network layer Transportation layer

Data Link layer

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having issues. Which of the following configuration values would you MOST likely need to change? DNS server Subnet mask Default gateway IP address

Default gateway

Which device is NAT typically implemented on? RADIUS server Default gateway router ISP router AD server

Default gateway router

Which of the following is a method of VLAN hopping? MAC spoofing Double tagging MAC flooding ARP spoofing

Double tagging

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of these broadcast storms? Enable Spanning Tree on the switches. Disable auto-duplex detection. Configure each switch with a single trunk port. Manually set the speed for each switch port.

Enable Spanning Tree on the switches.

Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable? Interior dynamic routing protocols Link state routing protocols Distance vector routing protocols Exterior dynamic routing protocols

Exterior dynamic routing protocols

Which of the following is a device that can send and receive data simultaneously? Honeypot Managed Unmanaged Full-duplex

Full-duplex

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers? If the network has over 15 hops. If the network is connected to the internet using multiple ISPs. If the network is connected to the internet using public addressing. If the network has over 15 areas and uses IPv6.

If the network is connected to the internet using multiple ISPs.

Which statements accurately describe the port states of both bridges and switches? (Select two.) In the learning state, the MAC address table can be populated, but frames are not forwarded. In the learning state, all ports are in a forwarding state. In the learning state, the MAC address table cannot be populated because the port is blocked. Ports in a blocked state cannot receive BPDUs. Ports in a blocked state still receive BPDUs.

In the learning state, the MAC address table can be populated, but frames are not forwarded. Ports in a blocked state still receive BPDUs.

Match each switch management method with in-band management or out-of-band management. Competes with normal network traffic for bandwidth. Uses a dedicated communication channel. Must be encrypted to protect communications from sniffing. Does not compete with normal network traffic for bandwidth. Does not compete with normal network traffic for bandwidth.

In-band management: Competes with normal network traffic for bandwidth. Must be encrypted to protect communications from sniffing. Affected by network outages. Out-of-band management: Uses a dedicated communication channel. Does not compete with normal network traffic for bandwidth.

Which of the following is true about an unmanaged switch? It is capable of VLAN creation. It can connect to all devices in a small area. It allows port configuration. It supports link aggregation.

It can connect to all devices in a small area.

Which of the following are true of the IS-IS routing protocol? (Select two.) It supports IPv6 routing. A router is the boundary between one area and another. It is a classful protocol. It divides large networks into areas. It uses bandwidth and delay for the metric. It is best suited for small networks.

It supports IPv6 routing. It divides large networks into areas.

Which of the following is true about Network Address Translation? It cannot forward DNS requests to the internet. It provides end-device to end-device traceability. It allows external hosts to initiate communication with internal hosts. It supports up to 5,000 concurrent connections.

It supports up to 5,000 concurrent connections.

As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs? Layer 2 switch Layer 3 switch Repeater Load balancer

Layer 3 switch

On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs? Load balancer Layer 3 switch Layer 2 switch Repeater

Layer 3 switch

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform? VLAN hopping attack DTP attack ARP spoofing attack MAC spoofing attack

MAC spoofing attack

Match each type of switch with managed switch or unmanaged switch. Commonly sold at retail stores. Provides port security features. Supports VLANs. Provides very few configuration options. Can be configured over a network connection. Can be configured over a dedicated communication channel.

Managed Switch: Provides port security features. Supports VLANs. Can be configured over a network connection. Can be configured over a dedicated communication channel. Unmanaged Switch: Provides very few configuration options. Commonly sold at retail stores.

Which of the following BEST describes port aggregation? IEEE network standard 802.3. Multiple ports linked together and used as a single logical port. Multiple VLANs traveling through a single port. A priority-based flow control that allows you to prioritize network traffic.

Multiple ports linked together and used as a single logical port.

You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? No. The switch needs to obtain an IP address from the DHCP server using the ip address dhcp command. No. The no shutdown command needs to be entered. Yes. The switch can now be accessed by PuTTY using the IP address 192.168.1.10. No. The ip default-gateway command needs to be set.

No. The no shutdown command needs to be entered.

What are the main differences between the OSPF and IS-IS routing protocols? OSPF is a classful protocol, while IS-IS is a classless protocol. OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. OSPF is a link state protocol, while IS-IS is not. OSPF requires an area 0, while IS-IS does not.

OSPF requires an area 0, while IS-IS does not.

Which of the following is required to establish a new network switch and configure its IP address for the first time? In-band management Site-to-site VPN Out-of-band management Client-to-site VPN

Out-of-band management

Which of the following methods is best to have when a network goes down? Site-to-site VPN Client-to-site VPN Out-of-band management In-band management

Out-of-band management

What is the main difference between RIP and RIPv2? RIP is a classful protocol, while RIPv2 is a classless protocol. RIP use hop count for the metric, while RIPv2 uses a relative link cost. RIP is a distance vector protocol, while RIPv2 is a link state protocol. RIP has a limit of 15 hops, while RIPv2 increases the hop count limit.

RIP is a classful protocol, while RIPv2 is a classless protocol.

Which of the following BEST describes dynamic routing? Routing is done between autonomous systems. Routing entries are manually added to routing tables. Routing is done within an autonomous system. Routers learn about networks by sharing routing information with each other.

Routers learn about networks by sharing routing information with each other.

You are unsure if the gateway address is correct for one of your subnetworks because traffic is not leaving the network. Which of the following tables could you look at to check if the gateway address is correct? ARP table State table MAC address table Routing table

Routing table

Dynamic Trunking Protocol

Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches? Spanning Tree Trunking PoE 802.1x

Spanning Tree

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches? Bonding Spanning Tree Trunking Layer 3 switching

Trunking

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these servers? Restricted Dynamic Overloading Static

Static

Which of the following NAT implementations maps a single private IP address to a single public IP address on the NAT router? Static NAT Many-to-one NAT Dynamic NAT IP masquerade

Static NAT

Which of the following has the least default administrative distance? Static route to an IP address External BGP OSPF RIP

Static route to an IP address

You have only one physical interface but want to connect two IP networks. Which of the following would allow you to do so? Virtual IPs A loopback address The sticky feature Subinterfaces

Subinterfaces

In which type of device is a MAC address table stored? Repeater Switch Router Hub

Switch

Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN? Switch Hub Router Access point

Switch

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN? Dynamic Trunking Protocol attack MAC spoofing Switch spoofing ARP spoofing

Switch spoofing

Which of the following can cause broadcast storms? Routing loops Duplicate IP addresses Switching loops Duplicate MAC addresses

Switching loops

A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next? The frame stops at the switch and is not forwarded until the destination MAC address is manually added to the MAC address table. The frame is replicated and sent to every active port on the switch. The frame is rejected and returned to the source host. The frame is replicated and sent to every active port on the switch except the source port.

The frame is replicated and sent to every active port on the switch except the source port.

ARP spoofing/poisoning

The source device sends frames to the attacker's MAC address instead of to the correct device.

In which of the following tables does a NAT router store port numbers and their associated private IP addresses? MAC address table Routing table Translation table ARP table

Translation table

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network? https://cdn.testout.com/_version_6023/netpro2021v6-en-us/en-us/resources/text/t_switch_security_np6/ivlan2.png Zero One Two Four Five

Two

Kate, a network administrator, has been tasked with staying within the company budget. She has a large network and doesn't want to spend more than she needs to on purchasing and registering multiple public IP addresses for each of the hosts on her network. Which of the following methods could help her provide internet access but also keep costs low and limit the number of registered IP addresses her organization needs to purchase? Use Network Address Translation. Use Layer 3 switches. Use PoE devices. Use Layer 2 switches.

Use Network Address Translation.

Which of the following scenarios would cause a problem in asymmetric routing? Using two stateful firewalls in the traffic flow. Using two routers in the traffic flow. Using a hub in the traffic flow. Using two switches in the traffic flow.

Using two stateful firewalls in the traffic flow.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? VLAN Port security VPN Spanning Tree

VLAN

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? VLAN Port security Spanning Tree VPN

VLAN

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network? ARP spoofing Dynamic Trunking Protocol attack MAC spoofing VLAN spoofing

VLAN spoofing

For which of the following devices does a voice VLAN prioritize traffic? VoIP phone Hub Layer 3 switch Bridge

VoIP phone

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Wait for convergence to take place. Stop and restart the RIP protocol on the router. Force RIP to perform an immediate update. Manually reconfigure the default route to point to the new next hop router.

Wait for convergence to take place.

Which command would you use on a switch to enable management from a remote network? ip default-gateway 192.168.10.185 ip address 192.168.10.185 255.255.255.0 ip address dhcp no shutdown

ip default-gateway 192.168.10.185

Which of the following utilities would you use to view the routing table? traceroute mtr dig route tracert

route

A workstation's network board is currently configured as follows: Network Speed = Auto Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is incorrectly detecting the network speed and duplex settings. Upon investigation, you find that it's running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the switch port configuration for the connected workstation. Given that it's a Cisco switch, which commands can you use on the switch to show a list of all switch ports and their current settings? (Select two.) show interface show interface switchport show interface ethernet counters show interface capabilities show running-config interface

show interface show running-config interface


Ensembles d'études connexes

Renacimiento, Ilustración, Revolución Francesa, Revolución Industrial

View Set

Equal credit opportunity act (ECOA)

View Set

Module 6 - The Active Earth: Plate Tectonics

View Set

Nursing Informatics Ch 5-8, Midterm Nursing Info. and Tech.

View Set

Biology 202 Lesson 2: How Genetic Information is organized in the genome

View Set

A1.2: Fragen mit "wann", "seit wann" oder "wie lange"

View Set