Networking II Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.

*A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?* -It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use. -It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server. -It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network. -It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address.

sticky secure MAC addresses

*A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?* auto secure MAC addresses dynamic secure MAC addresses static secure MAC addresses sticky secure MAC addresses

modular configuration

*A lab in a network management software company is configuring a testing environment to verify the performance of new software with different network connectivity speeds, including FastEthernet, GigabitEthernet, and 10 GigabitEthernet, and with copper and fiber optic connections. Which type of switch should the software company purchase to perform the tests?* stackable modular configuration access layer fixed configuration

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

*A network administrator configures a router with the command sequence:* *R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin* *R1(config)# boot system rom* *What is the effect of the command sequence?* -The router will copy the IOS image from the TFTP server and then reboot the system. -On next reboot, the router will load the IOS image from ROM. -The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM. -The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

Verify that the serial 0/0/1 interface is active and available.

*A network administrator has entered the following command:* *ip route 192.168.10.64 255.255.255.192 serial0/0/1* *When the network administrator enters the command show ip route, the route is not in the routing table. What should the administrator do next?* -Re-enter the command using the correct mask. -Verify that the 192.168.10.64 network is active within the network infrastructure. -Re-enter the command using a network number rather than a usable IP address. -Verify that the serial 0/0/1 interface is active and available.

172.16.45.2

*A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255.* *Which IPv4 address matches the ACE?* 172.16.20.2 172.16.26.254 172.16.45.2 172.16.48.5

Clients must use all configuration information that is provided by a DHCPv6 server.

*A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?* -Clients must use the information that is contained in RA messages. -Clients must use all configuration information that is provided by a DHCPv6 server. -Clients must use the prefix and prefix length that are provided by a DHCPv6 server and generate a random interface ID. -Clients must use the prefix and prefix length that are provided by RA messages and obtain additional information from a DHCPv6 server.

access-list 1 permit 192.168.128.0 0.0.63.255

*A network engineer is configuring PAT on a router and has issued the command:* *ip nat source list 1 interface serial 0/1/0 overload* *Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses?* -access-list 1 permit 192.168.128.0 0.0.127.255 -ip nat inside source static 192.168.128.0 209.165.200.254 -ip nat inside source list 1 pool INSIDE_NAT_POOL -access-list 1 permit 192.168.128.0 0.0.63.255 -access-list 1 permit 192.168.128.0 255.255.192.0

protect

*A network technician is configuring port security on switches. The interfaces on the switches are configured in such a way that when a violation occurs, packets with unknown source addresses are dropped and no notification is sent. Which violation mode is configured on the interfaces?* off restrict protect shutdown

It is used to set the trusted state of an interface to allow classification of traffic for QoS based on the CoS value of the IP phone.

*A technician is configuring a switch to allow access both to IP phones and to PCs on interface Fa0/12. The technician enters the interface command mls qos trust cos. What is the reason for including that command?* -It is used to verify service levels and to ensure that congestion over serial interfaces is minimized for voice traffic. -It is used in conjunction with STP PortFast to ensure that interface Fa0/12, in case of a shutdown, regains an "up" state immediately. -It is used to provide higher categories of security for voice and video traffic. -It is used to set the trusted state of an interface to allow classification of traffic for QoS based on the CoS value of the IP phone.

Copy the running configuration to the startup configuration.

*After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?* Configure port security for violation protect mode. Copy the running configuration to the startup configuration. Reboot the switch. Shut down the interface then enable it again with the no shutdown command.

level 1 ultimate routes

*In an IPv6 routing table, all routing table entries are classified as which type of routes?* level 2 child routes level 1 ultimate routes level 1 parent routes level 1 network routes

It works!

*Launch PT* *Hide and Save PT* *Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.* *Which code is displayed on the web browser?* Welldone! It works! Great! Inter-VLAN configured!

192.168.10.35

*Refer to the exhibit. A company has an internal network of 192.168.10.0/24 for their employee workstations and a DMZ network of 192.168.3.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT?* 10.0.0.31 192.168.3.5 192.168.3.33 192.168.10.35 172.16.20.5

A standard access list numbered 1 was used as part of the configuration process. Two types of NAT are enabled. Address translation is working.

*Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)* -The name of the NAT pool is refCount. -One port on the router is not participating in the address translation. -Three addresses from the NAT pool are being used by hosts. -A standard access list numbered 1 was used as part of the configuration process. -Two types of NAT are enabled. -Address translation is working.

5

*Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?* 1 5 8 20 25 30

2

*Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?* 1 2 3 4 5

Another router in the same organization provided the default route by using a dynamic routing protocol.

*Refer to the exhibit. How did the router obtain the last route that is shown?* -The ipv6 route command was used. -Another router in the same organization provided the default route by using a dynamic routing protocol. -The ip route command was used. -The ip address interface configuration mode command was used in addition to the network routing protocol configuration mode command.

The IP address of the default gateway router is not contained in the excluded address list.

*Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?* -The IP address of the default gateway router is not contained in the excluded address list. -The default-router and dns-server commands need to be configured with subnet masks.​ -The IP address of the DNS server is not contained in the excluded address list.​ -The DNS server and the default gateway router should be in the same subnet.

209.165.200.245

*Refer to the exhibit. NAT is configured on R1 and R2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between R2 and the web server?* 10.130.5.76 209.165.200.245 172.16.1.10 203.0.113.5 192.0.2.1 172.16.1.1

NAT-POOL2 is not bound to ACL 1.

*Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?* NAT-POOL2 is not bound to ACL 1. Access-list 1 is misconfigured. The NAT pool is incorrect. Interface Fa0/0 should be identified as an outside NAT interface.

The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.

*Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1?* -The DHCPv6 pool has not been bound to the LAN interface. -The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6. -The DHCPv6 pool does not match the IPv6 address configured on interface FA0/0. -IPv6 has not been enabled globally on router R1.

Create a fully specified static route pointing to Fa0/0 with an AD of 95.

*Refer to the exhibit. This network has two connections to the ISP, one via router C and one via router B. The serial link between router A and router C supports EIGRP and is the primary link to the Internet. If the primary link fails, the administrator needs a floating static route that avoids recursive route lookups and any potential next-hop issues caused by the multiaccess nature of the Ethernet segment with router B. What should the administrator configure?* -Create a static route pointing to 10.1.1.1 with an AD of 95. -Create a fully specified static route pointing to Fa0/0 with an AD of 1. -Create a static route pointing to Fa0/0 with an AD of 1. -Create a static route pointing to 10.1.1.1 with an AD of 1. -Create a fully specified static route pointing to Fa0/0 with an AD of 95.

1

*Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?* 1 120 0 2

10.16.100.128

*Refer to the exhibit. Which highlighted value represents a specific destination network in the routing table?* 0.0.0.0 10.16.100.128 10.16.100.2 110 791

S 10.0.2.0/24 [1/0] via 192.168.2.2

*Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?* S 10.0.2.0/24 [1/0] via 192.168.2.2 S 0.0.0.0/0 [1/0] via 192.168.2.2 C 192.168.2.0/24 is directly connected, Serial0/0/0 S 10.0.2.0/24 is directly connected, Serial 0/0/0

recursive static route

*Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?* directly attached static route fully specified static route recursive static route floating static route

level 1 parent route

*Refer to the exhibit.* *Which type of route is 172.16.0.0/16?* default route ultimate route child route level 1 parent route

RAM

*The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?* flash NVRAM RAM ROM

192.168.5.0

*To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?* 192.168.5.64 192.168.5.0 192.168.0.0 No address is displayed.

the ipv6 unicast-routing command

*What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?* the ipv6 unicast-routing command a static route the ip routing command the ipv6 route ::/0 command

source MAC address and incoming port number

*What information is added to the switch table from incoming frames?* source IP address and incoming port number destination IP address and incoming port number destination MAC address and incoming port number source MAC address and incoming port number

End-to-end IPv4 traceability is lost.

*What is a disadvantage when both sides of a communication use PAT?* The security of the communication is negatively impacted. End-to-end IPv4 traceability is lost. Host IPv4 addressing is complicated. The flexibility of connections to the Internet is reduced.

interconnection of large-scale networks in wiring closets

*What is a function of the distribution layer?* fault isolation interconnection of large-scale networks in wiring closets network access to the user high-speed backbone connectivity

to have only a link-local IPv6 address

*What is the minimum configuration for a router interface that is participating in IPv6 routing?* to have both a link-local and a global unicast IPv6 address to have only a link-local IPv6 address to have a self-generated loopback address to have both an IPv4 and an IPv6 address to have only an automatically generated multicast IPv6 address

access

*What is the name of the layer in the Cisco borderless switched network design that would have more switches deployed than other layers in the network design of a large organization?* access core data link network access network

License Type: Permanent License State: Active, In Use

*What two license conditions would be expected on a new Cisco router once the license has been activated? (Choose two.)* License Type: ipbasek9 License Type: Permanent License State: Active, Registered License Type: Temporary License State: Active, In Use License State: On

DHCPDISCOVER

*Which DHCP IPv4 message contains the following information?* *Destination address: 255.255.255.255* *Client IPv4 address: 0.0.0.0* *Default gateway address: 0.0.0.0* *Subnet mask: 0.0.0.0* DHCPACK DHCPDISCOVER DHCPREQUEST DHCPOFFER

access-class 11 in

*Which command is issued in the VTY line configuration mode to apply a standard ACL that will control Telnet access to a router?* ip access-group 11 in access-class 11 in transport input none access-class 110 in

console

*Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?* console nearest syslog server RAM NVRAM

modularity

*Which network design principle focuses on the capability of on-demand seamless network expansion in a switched network?* resiliency modularity flexibility hierarchical

A cable has not been attached to the port.

*Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?* A cable has not been attached to the port. There is an IP address conflict with the configured address on the interface. The no shutdown command has not been issued on the interface. An encapsulation mismatch has occurred.

There is sufficient space in flash memory.

*Which requirement should be checked before a network administrator performs an IOS image upgrade on a router?* The desired IOS image file has been downloaded to the router. There is sufficient space in flash memory. The old IOS image file has been deleted. The FTP server is operational.

R1(config)# line vty 0 4 R1(config​-line)# access-class 15 in

*Which series of commands will cause access list 15 to restrict Telnet access on a router?* -R1(config)# line vty 0 4 R1(config​-line)# access-class 15 in -R1(config)# int gi0/0 R1(config​-if)# access-class 15 in -R1(config)# int gi0/0 R1(config​-if)# ip access-group 15 in -R1(config)# line vty 0 4 R1(config​-line)# ip access-group 15 in

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.

*Which statement correctly describes how a LAN switch forwards frames that it receives?* -Unicast frames are always forwarded regardless of the destination MAC address. -Only frames with a broadcast destination address are forwarded out all active switch ports. -Frame forwarding decisions are based on MAC address and port mappings in the CAM table. -Cut-through frame forwarding ensures that invalid frames are always dropped.

store-and-forward

*Which switching method provides error-free data transmission?* fast-forward fragment-free integrity-checking store-and-forward

Security Unified Communications DATA

*Which three software packages are available for Cisco IOS Release 15.0?* IPVoice Security Unified Communications DATA Enterprise Services Advanced IP Services

A management VLAN is any VLAN that is configured to access management features of the switch. After the initial boot of an unconfigured switch, all ports are members of the default VLAN. An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.

*Which three statements accurately describe VLAN types? (Choose three).* -A data VLAN is used to carry VLAN management data and user-generated traffic. -Voice VLANs are used to support user phone and e-mail traffic on a network. -VLAN 1 is always used as the management VLAN. -An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic. -After the initial boot of an unconfigured switch, all ports are members of the default VLAN. -A management VLAN is any VLAN that is configured to access management features of the switch.

router on a stick

*Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?* routing via a multilayer switch router on a stick legacy inter-VLAN routing routing for the management VLAN

floating static route

*Which type of static route typically uses the distance parameter in the ip route global configuration command?* summary static route floating static route default static route standard static route

VoIP

*Which type of traffic requires a separate VLAN, strict QoS requirements, and a one-way overall delay of less than 150 ms across the network?* VoIP POP/IMAP HTTP video

Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch.

A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task? -Erase the startup configuration and reboot the switch. -Erase the running configuration and reboot the switch. -Delete the startup configuration and the vlan.dat file in the flash memory of the switch and reboot the switch. -Delete the IP address that is assigned to the management VLAN and reboot the switch.

They improve netw​ork security. They use fewer router resources.

Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.) -They improve netw​ork security. -They use fewer router resources. -They improve the efficiency of discovering neighboring networks. -They take less time to converge when the network topology changes. -They automatically switch the path to the destination network when the topology changes.

when the Layer 2 switch needs to be remotely managed

In what situation would a Layer 2 switch have an IP address configured? -when the Layer 2 switch needs to forward user traffic to another device -when the Layer 2 switch is the default gateway of user traffic -when the Layer 2 switch needs to be remotely managed -when the Layer 2 switch is using a routed port

hierarchical modularity resiliency empty flexibility

Match each borderless switched network principle to its description. (Not all options are used.)

empty flash rom ram nvram

Match the router memory type that provides the primary storage for the router feature. (Not all options are used.)

The inside global address is not on the same subnet as the ISP.

Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The administrator tries to ping a server on the Internet from PC-A and collects the debugs that are shown in the exhibit. Based on this output, what is most likely the cause of the problem? -The address on Fa0/0 should be 64.100.0.1. -The NAT source access list matches the wrong address range. -The inside global address is not on the same subnet as the ISP. -The inside and outside NAT interfaces have been configured backwards.

because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command

Refer to the exhibit. Based on the exhibited configuration and output, what are two reasons VLAN 99 missing? (Choose two.) -because there is a cabling problem on VLAN 99 -because VLAN 99 is not a valid management VLAN -because VLAN 1 is up and there can only be one management VLAN on the switch -because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface -because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command

PAT using an external interface

Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented? -dynamic NAT with a pool of two public IP addresses -PAT using an external interface -static NAT with one entry -static NAT with a NAT pool

ip route 10.10.0.0 255.255.0.0 209.165.200.225 100

Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down? -ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100 -ip route 10.10.0.0 255.255.0.0 209.165.200.226 100 -ip route 10.10.0.0 255.255.0.0 209.165.200.225 100 -ip route 10.10.0.0 255.255.0.0 209.165.200.225 50

203.0.113.5

Refer to the exhibit. NAT is configured on Remote and Main. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between Main and the web server? 10.130.5.76 209.165.200.245 203.0.113.5 172.16.1.10 192.0.2.1 209.165.200.226

192.168.11.252

Refer to the exhibit. The network administrator enters these commands into the R1 router: R1# copy running-config tftp Address or name of remote host [ ]? When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? 192.168.9.254 192.168.10.1 192.168.10.2 192.168.11.252 192.168.11.254

IEEE 802.1Q

Refer to the exhibit. What protocol should be configured on SW-A Port 0/1 if it is to send traffic from multiple VLANs to switch SW-B? Spanning Tree RIP v2 IEEE 802.1Q ARP Rapid Spanning Tree

172.16.100.64

Refer to the exhibit. Which highlighted value represents a specific destination network in the routing table? 0.0.0.0 172.16.100.64 172.16.100.2 110 791

S 192.168.2.0/24 [1/0] via 172.16.2.2

Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address? -C 172.16.2.0/24 is directly connected, Serial0/0/0 -S 192.168.2.0/24 [1/0] via 172.16.2.2 -S 192.168.2.0/24 is directly connected, Serial 0/0/0 -S 0.0.0.0/0 [1/0] via 172.16.2.2

ipv6 nd other-config-flag​

Refer to the exhibit. Which statement shown in the output allows router R1 to respond to stateless DHCPv6 requests? ipv6 unicast-routing dns-server 2001:DB8:8::8​ ipv6 dhcp server LAN1​ ipv6 nd other-config-flag​ prefix-delegation 2001:DB8:8::/48 00030001000E84244E70​

The output is the result of the show ip nat translations command. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.

Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.) -The output is the result of the show ip nat translations command. -The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10. -The host with the address 209.165.200.235 will respond to requests by using a source address of 209.165.200.235. -Traffic with the destination address of a public web server will be sourced from the IP of 192.168.1.10. -The output is the result of the show ip nat statistics command.

All VLANs will be allowed across the trunk.

What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value? -All VLANs will be allowed across the trunk. -Only VLAN 1 will be allowed across the trunk. -Only the native VLAN will be allowed across the trunk. -The switches will negotiate via VTP which VLANs to allow across the trunk.

to gather logging information for monitoring and troubleshooting to select the type of logging information that is captured to specify the destinations of captured messages

What are three functions provided by the syslog service? (Choose three.) -to gather logging information for monitoring and troubleshooting -to select the type of logging information that is captured -to specify the destinations of captured messages -to periodically poll agents for data -to provide statistics on packets that are flowing through a Cisco device -to provide traffic analysis

provides access to the rest of the network through switching, routing, and network access policies

What is a characteristic of the distribution layer in the three layer hierarchical model? -acts as the backbone for the network, aggregating and distributing network traffic throughout the campus -provides access to the rest of the network through switching, routing, and network access policies -distributes access to end users represents the network edge

to notify other DHCP servers on the subnet that the IP address was leased

What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process? -to notify other DHCP servers on the subnet that the IP address was leased -to notify other hosts not to request the same IP address -for hosts on other subnets to receive the information -for routers to fill their routing tables with this new information

::/0

What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination? ::/128 ::/0 ::1/64 FFFF::/128

Product Activation Key

When a customer purchases a Cisco IOS 15.0 software package, what serves as the receipt for that customer and is used to obtain the license as well? Software Claim Certificate End User License Agreement Unique Device Identifier Product Activation Key

ip address dhcp

Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled? ip dhcp pool ip address dhcp service dhcp ip helper-address

the source MAC address and the incoming port

Which information does a switch use to populate the MAC address table? -the destination MAC address and the incoming port -the destination MAC address and the outgoing port -the source and destination MAC addresses and the incoming port -the source and destination MAC addresses and the outgoing port -the source MAC address and the incoming port -the source MAC address and the outgoing port

ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443 ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 4365

A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home? -ip nat pool mktv 10.18.7.5 10.18.7.5 ip nat outside source static 10.18.7.5 209.165.200.225 -ip nat inside source static tcp 10.18.7.5 443 209.165.200.225 443 -ip nat inside source static udp 10.18.7.5 4365 209.165.200.225 4365 -ip nat inside source static tcp 209.165.200.225 443 10.18.7.5 443 -ip nat inside source static udp 209.165.200.225 4365 10.18.7.5 4365 -No additional configuration is necessary

The router will propagate a static default route in its RIP updates, if one is present.

A network administrator adds the default-information originate command to the configuration of a router that uses RIP as the routing protocol. What will result from adding this command? -The router will be reset to the default factory information. -The router will not forward routing information that is learned from other routers. -The router will propagate a static default route in its RIP updates, if one is present. -The router will only forward packets that originate on directly connected networks.

IP address vty lines default gateway

A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.) IP address VTP domain vty lines default VLAN default gateway loopback address

protect

A network administrator is configuring port security on a Cisco switch. When a violation occurs, which violation mode that is configured on an interface will cause packets with an unknown source address to be dropped with no notification sent? off restrict protect shutdown

0.0.1.255

A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry? 0.0.0.127 0.0.0.255 0.0.1.255 0.0.255.255 A single ACL command and wildcard mask should not be used to specify these particular networks or other traffic will be permitted or denied and present a security risk.

ultimate route level 2 child route

A network administrator reviews the routing table on the router and sees a route to the destination network 172.16.64.0/18 with a next-hop IP address of 192.168.1.1. What are two descriptions of this route? (Choose two.) default route supernet route ultimate route parent route level 2 child route

access-class 11 in

A network engineer has created a standard ACL to control SSH access to a router. Which command will apply the ACL to the VTY lines? access-group 11 in access-class 11 in access-list 11 in access-list 110 in

show cdp neighbors

A network engineer is interested in obtaining specific information relevant to the operation of both distribution and access layer Cisco devices. Which command provides common information relevant to both types of devices? show ip protocols show ip interface show cdp neighbors show port-security show mac-address-table

sticky secure MAC addresses

A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements? auto secure MAC addresses dynamic secure MAC addresses static secure MAC addresses sticky secure MAC addresses

ip route 172.16.32.0 255.255.224.0 S0/0/0 200

A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network? ip route 172.16.0.0 255.255.240.0 S0/0/0 200 ip route 172.16.32.0 255.255.224.0 S0/0/0 200 ip route 172.16.0.0 255.255.224.0 S0/0/0 100 ip route 172.16.32.0 255.255.0.0 S0/0/0 100

access

Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate? distribution data link physical access core

NAT-POOL2 is bound to the wrong ACL.

Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect? -The static NAT entry is missing. -NAT-POOL2 is bound to the wrong ACL. -The ACL does not define the list of addresses to be translated. -The overload keyword should not have been applied.

The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0? -The default gateway address is not provided in the pool. -No clients have communicated with the DHCPv6 server yet. -The IPv6 DHCP pool configuration has no IPv6 address range specified. -The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.

It identifies the VLAN number.

Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic? -It identifies the subinterface. -It identifies the VLAN number. -It identifies the native VLAN number. -It identifies the type of encapsulation that is used. -It identifies the number of hosts that are allowed on the interface.

The configuration is correct.

Refer to the exhibit. A network engineer is examining a configuration implemented by a new intern who attached an IP phone to a switch port and configured the switch. Identify the issue, if any, with the configuration. -The voice VLAN should be 150. -The configuration is correct. -There must be a data VLAN added. -The spanning-tree BPDU guard feature is missing. -The switch port is not configured as a trunk.

This is a notification message for a normal but significant condition.

Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message? -This is a notification message for a normal but significant condition. -This is an alert message for which immediate action is needed. -This is an error message for which warning conditions exist. -This is an error message that indicates the system is unusable.

access-class 5 in access-list 5 permit 10.7.0.0 0.0.0.31

The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.) access-class 5 in access-list 5 deny any access-list standard VTY permit 10.7.0.0 0.0.0.127 access-list 5 permit 10.7.0.0 0.0.0.31 ip access-group 5 out ip access-group 5 in

switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict

Two employees in the Sales department work different shifts with their laptop computers and share the same Ethernet port in the office. Which set of commands would allow only these two laptops to use the Ethernet port and create violation log entry without shutting down the port if a violation occurs? -switchport mode access switchport port-security -switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict -switchport mode access switchport port-security maximum 2 switchport port-security mac-address sticky -switchport mode access switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation protect

ip dhcp excluded-address 192.168.100.1 192.168.100.10 ip dhcp excluded-address 192.168.101.254 ip dhcp pool LAN-POOL-100 network 192.168.100.0 255.255.254.0 default-router 192.168.100.1

Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment? -ip dhcp excluded-address 192.168.100.1 192.168.100.10 ip dhcp excluded-address 192.168.100.254 ip dhcp pool LAN-POOL-100 network 192.168.100.0 255.255.255.0 ip default-gateway 192.168.100.1 -ip dhcp excluded-address 192.168.100.1 192.168.100.10 ip dhcp excluded-address 192.168.101.254 ip dhcp pool LAN-POOL-100 network 192.168.100.0 255.255.254.0 default-router 192.168.100.1 -dhcp pool LAN-POOL-100 ip dhcp excluded-address 192.168.100.1 192.168.100.9 ip dhcp excluded-address 192.168.100.254 network 192.168.100.0 255.255.254.0 default-router 192.168.101.1 -ip dhcp excluded-address 192.168.100.1 192.168.100.9 ip dhcp excluded-address 192.168.101.254 ip dhcp pool LAN-POOL-100 ip network 192.168.100.0 255.255.254.0 ip default-gateway 192.168.100.1

It is automatically updated and maintained by routing protocols.

Which statement describes a route that has been learned dynamically? -It is automatically updated and maintained by routing protocols. -It is unaffected by changes in the topology of the network. -It has an administrative distance of 1. -It is identified by the prefix C in the routing table.

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.

Which statement is correct about Ethernet switch frame forwarding decisions? -Frame forwarding decisions are based on MAC address and port mappings in the CAM table. - Cut-through frame forwarding ensures that invalid frames are always dropped. -Only frames with a broadcast destination address are forwarded out all active switch ports. -Unicast frames are always forwarded regardless of the destination MAC address.

store-and-forward switching

Which switching method drops frames that fail the FCS check? borderless switching cut-through switching ingress port buffering store-and-forward switching

scalability speed of convergence

Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.) scalability ISP selection speed of convergence the autonomous system that is used campus backbone architecture

The NTP master will claim to be synchronized at the configured stratum number​. Other systems will be willing to synchronize to that master using NTP​.

Which two statements are correct if a configured NTP master on a network cannot reach any clock with a lower stratum number? (Choose two.) -The NTP master will claim to be synchronized at the configured stratum number​. -The NTP master will be the clock with 1 as its stratum number​. -An NTP server with a higher stratum number will become the master. -Other systems will be willing to synchronize to that master using NTP​. -The NTP master will lower its stratum number.

floating static route

Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol? standard static route floating static route default static route summary static route


Ensembles d'études connexes

Micro Exam 3 Practice Exam Questions

View Set

Environmental Science Renewable energy, etc

View Set

Marketing Chapter 6: Segmenting Consumer Markets/Business Markets, Market Targeting Strategy, The Positioning Process

View Set

Introduction to Computer Graphics (Glossary)

View Set

PRE-LAB: STAINING & LAB 11 Staining - Gram Staining

View Set