USMC CISCO ANNEX B STUDY GUIDE
What is the default administrative distance for a static route?
1
What subnet mask would be used as the classful mask for the IP address 198.133.219.27?
255.255.255.0*
What problem is obvious if the show ip interface command shows that the interface is down and the line protocol is down?
A cable has not been attached to the port
What is the purpose of setting the native VLAN separate from data VLANs?
A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs.*
What name is assigned to the transport layer PDU?
Segment
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address
Show ip interface brief
A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?
Switch(config)# interface gigabitethernet 1/1 Switch(config-if)# switchport mode trunk*
On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from the switch?
Switch(config)# no vlan 100
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?
TCP
Which characteristics describe the native VLAN?
The native VLAN provides a common identifier to both ends of a trunk.* The native VLAN traffic will be untagged across the trunk link
What are ways of turning off DTP on a trunk link between switches?
Configure attached switch ports with the nonegotiate command option.* Place the two attached switch ports in access mode.*
What process involves placing one PDU inside of another PDU?
ENCAPSULATION
Static routes are configured by the use of what global configuration command?
IP route
What are benefits of using a layered network model?
It assists in protocol design. It prevents technology in one layer from affecting other layers.
What describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
What is a characteristic of a switch virtual interface (SVI)?
It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default
In the show running-config command, which part of the syntax is represented by running-config?
Keyword
What value in a routing table represents the trustworthiness of learned routes and is used by the router to determine which route to install into the routing table for this specific situation?
Metric/Administrative Distance
What OSI model layers have the same functionality as two layers of the TCP/IP model? NETWORK/TRANSPORT
NETWORK/TRANSPORT
A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?
Only devices in VLAN 20 see the frame.
A company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?
Protect
Which type of router memory temporarily stores the running configuration file and ARP table?
RAM
What connection provides a secure CLI session with encryption to a Cisco switch?
SSH Connection
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?
Vlan 1
What is correct about IPv6 routing?
all routes are level " 1 " ultimate routes
What interface, line, or port is used for initial configuration?
console
What pairs of trunking modes will establish a functional trunk link between two Cisco switches?
dynamic desirable - dynamic auto* dynamic desirable - dynamic desirable* dynamic desirable - trunk*
What is the role of IANA?
global coordination of the Internet Protocol addressing systems, commonly known as IP Addresses
What is a function of the distribution layer?
interconnection of large-scale networks in wiring closets
What is the function of the shell in an OS?
interfaces between the users and the kernel
What command will implement a backup floating static route to a network?
ip route 172.16.32.0 255.255.224.0 S0/0/0 200
When switches are brought back online after losing power, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?
sticky secure MAC addresses
What switching method drops frames that fail the FCS check?
store-and-forward switching
What set of commands would allow only two laptops to use an Ethernet port and only create violation log entry without shutting down the port if a violation occurs?
switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address sticky switchport port-security violation restrict*
What information does a switch use to populate the MAC address table?
the source MAC address and the incoming port
Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?
to determine which ports are not correctly configured to prevent MAC address flooding
What is the purpose of using the Ctrl-Shift-6 key combination on a switch?
to interrupt the ping process
What are some of the Standards organizations which help to promote and maintain an open Internet?
The Internet Society (ISOC) The Internet Architecture Board (IAB) The Internet Engineering Task Force (IETF) The Institute of Electrical and Electronics Engineers (IEEE)The International Organization for Standardization (ISO)
The following command is rejected by the device. SanJose(config)# ip address 192.168.2.1 255.255.255.0. What is the reason for this?
The command is being entered from the wrong mode of operation.
While analyzing log files, a network administrator notices reoccurring native VLAN mismatches. What is the effect of these reoccurring errors?
The control and management traffic on the error-occurring trunk port is being misdirected or dropped.
