How2pass ICDN 1
Which network topology allows all traffic to flow through a central hub?
Star
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
Application
Which two layers can be found in the TCP/IP model and the OSI model? (Choose two.)
Application Transport
Fiber
Base-BX
What is the requirement of configuring 6to4 tunneling on two routers?
Both IPv6 and IPv4 must be configured
Which statement about 6to4 tunneling is true?
Both tunnel endpoints must support IPv4 and IPv6.
Which address block identifies all link-local addresses?
FE80::/10
Which of these represents an IPv6 link-local address?
FE80::380e:611a:e14f:3d69
Which three statements about IPv6 prefixes are true? (Choose three.)
FF00::/8 is used for IPv6 multicast. FE80::/10 is used for link-local unica st. FC00::/7 is used in private networks.
Which IPv6 address is the all-router multicast group?
FF02::2
Which header field is new in IPv6?
Flow Label
Which WAN topology provides a direct connection from each site to all other sites on the network?
Full mesh
Which type of IPv6 unicast IP address is routable across the internet?
Global
Which two statements describe characteristics of IPv6 unicast addressing? (Select two)
Global addresses start with 2000::/3 and There is only one loopback address.
TCP correct IP traffic type
HTTP, SMTP and Telnet
In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three.)
IPv6 headers have a fixed length, it uses an extension header and headers eliminate the IPv4 Checksum field.
Which two features can dynamically assign IPv6 addresses? (Choose two.)
IPv6 stateless autoconfiguration and stateful
Which entity assigns IPv6 addresses to end users?
ISPs
Which two statements about access points are true? (Choose two.)
In most cases, they are physically connected to other network devices to provide network connectivity. Most access points provide Wi-Fi and Bluetooth connectivity.
Where does routing occur within the DoD TCP/IP reference model?
Internet
Which option describes a standard role that a firewall plays in an enterprise network
It can decide which packets can traverse from a less secure segment of the network to a more secure.
Which two statements about UDP are true?
It can transmit data at a rate higher than the path capacity. It can be used for multicast and broadcast traffic.
Which statement about unique local IPv6 addresses is true?
They require all prefixes to be unique.
Which two statements about IPv6 router advertisement messages are true? (Choose two)
They use ICMPv6 type 134. The advertised prefix length m ust be 64 bits.
Which destination IP address can a host use to send one message to multiple devices across different subnets?
239.255.0.1
View the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network?
255.255.255.192
Which CIDR notation represents the subnet mask 255.255.255.252?
30
Which tunneling mechanism embeds an IPv4 address within an IPv6 address?
6to4
Which technique can you use to route IPv6 traffic over an IPv4 infrastructure?
6to4 tunneling
Which three of the following are IPv6 transition mechanisms? (Choose three)
6to4 tunneling ISATAP tunneling Teredo tunneling
Which two of these statements are true of IPv6 address representation?
A single interface may be assigned multiple IPv6 addresses of any type. Every IPv6 interface contains at least one loopback address
What is known as "one-to-nearest" addressing in IPv6?
Anycast
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three.)
Session Presentation Application
Which two statements about unique local IPv6 addresses are true?
They are identical to IPv4 private addresses. They use the prefix FC00::/7
What are two benefits of private IPv4 IP addresses? (Choose two.)
They are less costly than public IP addresses. They can be assigned to devices without Interne t connections.
What are two benefits of private IPv4 addresses? (Choose two.)
They can be implemented without requiring admin to coordinate with IANA. They provide network isolation from the internet.
Which statement about IPv6 link-local addresses is true?
They must be configured on all IPv6 interface.
Which two statements about wireless controllers are true? (Choose two)
They provide the configuration for managed access points on the network. At least one physical controller is needed to manage the virtual controllers o f a network.
Which two statements about IPv6 anycast addresses are true ? (Choose two.)
They receive packets on the closest interface that is discovered by the routing protocol. They are allocated from the IPv6 unicast address space.
Which two options are the best reasons to use an IPv4 private IP space? (Choose two.)
To enable intra-enterprise communication. To conserve global address space.
For which important purpose was IPv6 addressing developed?
To relieve the shortage of public IP addresses on the internet
Which networking technology is currently recognized as the standard for computer networking?
Transmission control protocol/Internet protocol
::
Unspecified
When is the most appropriate time to escalate an issue that you are troubleshooting?
When you lack the proper skills to resolve the issue.
What is the most efficient subnet mask for a point to point ipv6 connection?
/127
What is the most appropriate summarization for these routes?
10.0.0.0 /22
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?
10.10.0.0/23 subnetted with mask 255.255.255.252
Which IP address can send traffic to all hosts on network 10.101.0.0/16?
10.101.255.255
Twisted
10/100/1000 Base-T
Which two cables can be used for star topology? (Choose two)
100base-T and 10base-T
Which sequence begins a unique local IPv6 address in binary notation?
1111110
What is the binary prefix of the IPv6 multicast address?
11111111
What is the maximum number of bits that can be borrowed to create subnets if a Class B network address is being used?
14
How many bits are contained in each field of an IPv6 address?
16
Which two addresses are broadcast addresses? (Choose two.)
172.17.210.255/24 10.1.1.255/23
What is the subnet address for the IP address 172.19.20.23/28?
172.19.20.16
Which IP configuration does the CIDR notation 192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?
192.168.1.40/29
A new subnet with 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses?
192.168.1.64/26
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
192.168.252.8 255.255.255.248
Which IPv6 address is valid?
2031:0:130F::9C0:876A:130B
Host 1 is trying to communicate with Host 2. The e0 interface on the Charlie router is down. Which of the following are true? (Choose two)
Charlie will use ICMP to inform to both hosts it cannot be reached and Charlie will send a destination unreachable message type.
Which address class includes network 191.168.0.1/27?
Class B
Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme (Choose three
Configure IPv4 tunnels between IPv6 islands. Use proxying and translation (NAT-PT) to trans late IPv6 packets into IPv4 packets. Enable dual-stack routing.
UDP correct traffic type
DHCP SNMP VoIP
Which type of network topology requires each network node to be connected to one another?
Mesh
Which two services can be provided by a wireless controller?
Mitigating threats from the Internet. Providing authentication services to u sers.
Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?
NDP
Which IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?
Neighbor discovery verification
View the exhibit. A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Select three)
Network Device A is a switch. Network Device B is a hub. Area 1 contains a Layer 2 d evice.
In which two circumstances are private IPv4 addresses appropriate? (Choose two)
On hosts that communicates only with other internal hosts. On hosts that require minimal access to external resources
What are three features of the IPV6 protocol? (Choose three)
Plug-and-play No broadcasts Autoconfiguration
Which RFC was created to alleviate the depletion of IPv4 public addresses?
RFC 1918
Which IPv6 routing protocol uses multicast group FF02::9 to send updates?
RIPng
How does TCP differ from UDP? (Choose two.)
TCP provides synchronized communication. TCP provides sequence numbering of packets .
Which statements are true regarding ICMP packets? (Select two)
TRACERT uses ICMP packets. They are encapsulated within IP datagrams.
Refer to the exhibit. A TFTP server has recently been instated in the Atlanta office. The network administrator is located in the NY office and has made a console connection to the NY router. After establishing the connection they are unable to backup the configuration file and iOS of the NY router to the TFTP server. What is the cause of this problem?
The TFTP server has an incorrect subnet mask.
Which two statements about IPv6 address 2002:ab10:beef::/48 are true? (Choose two.)
The embedded IPv4 address can be globally routed. It is used for a 6to4 tunnel
Which two statements describe the IP address 10.16.3.65/23?
The lowest host address in the subnet is 10.16.2.1 255.255.254.0. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?
The node transmits, but the access point is unable to receive.
Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose three
The subnet ID is 4079 The global ID is 14920b f83d The address is a unique loca l address
View the Exhibit. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? (Choose three)
The subnet mask in use is 255.255.255.128. The IP address 172.16.1.25 can be assigned t o hosts in VLAN1. The LAN interface of the router is configured with multiple IP add resses.
Which of the following correctly describe steps in the OSI data encapsulation process? (Select two)
The transport layer divides a data stream into segments and may add reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to
Which two statements are true regarding ICMP packets? (Choose two.)
They are encapsulated within IP datagrams. TRACERT uses ICMP packets.
What are three parts of an IPv6 global unicast address? (Choose three.)
an interface ID that is used to identify the local host on the network. a subnet ID that is used to identify networks inside of the local enterp rise site. a global routing prefix that is used to identify the network portion of the addres s that has been provided by an ISP.
Which IPv6 feature is supported in IPv4 but is not commonly used?
anycast
How is an EUI-64 format interface ID created from a 48-bit MAC address?
by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
At which layer of the OSI model does the protocol that provides the information displayed by the show cdp neighbors command operate?
data link
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)
fd15:0db8:0000:0000:700:3:400F:572B fd15:db8::700:3:400F:572B
Which command can you use to manually assign a static IPV6 address to a router interface?
ipv6 address
D8:FC:93:FF:FE:D8:05:0A
modified EUI-64
FF01::1
multicast
Which command can you enter to verify that a 128-bit address is live and responding?
ping ipv6
Which two benefits are provided by using a hierarchical network addressing scheme? (Select two)
reduces routing table entries ease of management and trou bleshooting
For which two reasons was RFC 1918 address space defined? (Choose two.)
to preserve public IPv4 address space to reduce the occurrence of overlapping IP addresses
What kind of cabling would you use in a star topology?
twisted pair
2020:10DB:0:0:85AB:800:52:734B
unicast
Coaxial
used for TV connection
USB
used for connection between computers
Crossover
used for devices of the same type