CCNA 200-301 Domain 1: Network Fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A network host has an IP address of 137.65.1.2 assigned to it. Given that the network uses the default classful subnet mask, what is the default routing prefix for this address using CIDR subnet mask notation?

/16

Which pins are used in a Cat 5 Ethernet (100BASE-T) UTP cable?

1, 2, 3, and 6

Which of the following are private IP addresses? (Select two.)

10.244.12.16 192.168.250.11

What is the maximum cable length for UTP Ethernet T implementations?

100 meters

You have two subnets on your private network, one with a 20-bit mask, and another with a 22-bit mask. How many available host addresses are there on each subnet? (Select two.)

1022 4094

As specified in the Ethernet standards, what is the maximum number of hosts supported on a single subnet?

1024

What is the correct binary form of the decimal IP address 192.168.1.1?

11000000.10101000.00000001.00000001

Match each decimal value on the left with the corresponding hexadecimal value on the right. Not all decimal values have a corresponding hexadecimal value.

11:17 B:11 D:13 F:15 C:12 10:16

You have a network address of 132.66.0.0 and a subnet mask of 255.255.224.0. Which four of the following are valid subnet addresses?

132.66.96.0 132.66.192.0 132.66.0.0 132.66.224.0

Which of the following are valid IP addresses? (Select three.)

137.65.1.1 224.0.0.1 172.17.1.3

You have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. How many assignable host addresses are on each subnet?

14

Which of the following IP addresses is a valid IP address for a host on a public network?

142.15.6.1

You have a network with three routers as shown. All routers are configured to share information for all known routes using the same routing protocol. Automatic summarization is enabled. Router B shares its known networks with router A. Which of the following routes will be in router A's routing table?

172.16.2.0/27, 172.16.2.32/28, and 172.16.2.48/28

Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network? (Select two.)

172.17.0.255 is the network broadcast address. 254 IP addresses can be assigned to host devices.

You have a network with two routers as shown. You need to choose subnet addresses for subnets 1 and 2. Which of the following subnets would you use? (Select two.)

172.30.12.128/26 172.30.12.0/28

A workstation has been assigned the following IP addressing information: - IP address: 192.168.1.26 - Subnet mask: 255.255.255.0 - Default gateway: 192.168.1.254 - DNS server: 192.168.1.1 Given this information, what is the network IP address of this workstation?

192.168.1.0

You have a network with two routers as shown. RouterA and RouterB are configured to use RIP version 2 with auto-summarization enabled. Which summarized network entry will RouterA have in its routing table for the subnets connected to RouterB?

192.168.12.0/24

You need to connect a router to a subnet. The subnet uses the IP address 192.168.12.0/26. You are instructed to assign the last IP address on the subnet to the router. Which IP address will you use?

192.168.12.62

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

2.4 GHz 5.75 GHz

Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that was configured incorrectly.

2001:0BEF:0BAD:0003::2/64

Based on the address prefix for each IPv6 address on the right, identify the address type from the list on the left. (Addresses used might not represent actual addresses used in production.)

2001:6789:9078::ABCE:AFFF:FE98:0001 - Global unicast FD00::8907:FF:FE76:ABC - Unique local FEA0::AB89:9FF:FE77:1234 - Link-local FF00:98BD:6532::1 - Multicast FF02::1:2 - Multicast

You have a network address of 201.79.187.0 and a subnet mask of 255.255.255.192. Which three of the following are valid host addresses for subnet 201.79.187.128?

201.79.187.166 201.79.187.132 201.79.187.189

You have a network address of 202.200.55.0 with a subnet mask of 255.255.255.224. Which of the following is the broadcast address for subnet 202.200.55.96?

202.200.55.127

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011

206.58.170.67

How many total channels are available for 802.11a wireless networks?

23

Drag each binary subnet mask on the left to its appropriate decimal equivalent on the right.

255.0.0.0 : 11111111.00000000.00000000.00000000 255.255.255.128 : 11111111.11111111.11111111.10000000 255.224.0.0 : 11111111.11100000.00000000.00000000 255.255.0.0 : 11111111.11111111.00000000.00000000 255.255.255.252 : 11111111.11111111.11111111.11111100

Your client has a class B network address and needs to support 500 hosts on as many subnets as possible. Which subnet mask should you recommend?

255.255.254.0

Your network has been assigned 168.11.0.0 as the network address. You have determined that you need 70 subnets. Which subnet mask value should you select to provide 70 subnets?

255.255.254.0

You are configuring a network and have been assigned the network address of 221.12.12.0. You want to subnet the network to allow 5 subnets with 20 hosts per subnet. Which subnet mask should you use?

255.255.255.224

You have been assigned the IP address of 197.177.25.0 for your network. You have determined that you need five subnets to allow future growth. What subnet mask value would you use?

255.255.255.224

You have a network consisting of a switch, a router, a hub, and several workstations connected as shown in the graphic. No VLANs have been configured. How many collision domains exist on the network shown?

4

You have a network address of 132.66.0.0 and a subnet mask of 255.255.254.0. How many possible host addresses are on each subnet, excluding host addresses of all 1s and all 0s?

510

Which cellular network type can, theoretically, provide speeds up to 10Gbps?

5G

Your network uses a network address of 137.65.0.0 with a subnet mask of 255.255.0.0. How many IP addresses are available for assignment to network hosts on this network?

65534

You have a network address of 220.16.22.0 and have selected 255.255.255.224 as the subnet mask value. How many possible subnets are there?

8

Which IEEE standard describes wireless communication?

802.11

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.11a 802.11g

You are designing a wireless network for a client. Your client would like to implement the highest speed possible. Which 802.11 standard will work best in this situation?

802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a frequency range of 5 GHz and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11ac

After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely using? (Select two.)

802.11b 802.11g

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.11b Bluetooth

Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?

::1

Review the output from the show interfaces fa0/1 command on the switch2 switch in the image. What is wrong with the fa0/1 interface in this example?

A duplex mismatch exists with the device on the other end of the connection.

Which of the following accurately describe how switches and hubs work? (Select two.)

A hub repeats frames to all ports, regardless of the destination address. Switches use the hardware address in the frame to send it only to the port where the device is located.

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptop's wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem?

A mismatched SSID.

Which of the following are limitations of the TCP/IP model? (Select two.)

A particular protocol implementation may not represent every layer. TCP/IP layers are theoretical and do not actually perform real functions.

Which of the following best describes a site survey?

A process of planning and designing a wireless network.

Which of the following devices is most likely to be assigned a public IP address?

A router that connects your home network to the Internet.

Which of the following should you include in your site survey test equipment? ( Select two.)

A spectrum analyzer A tall ladder

Which of the following best describe a spectrum analyzer?

A tool used to determine the noise floor in the desired frequency range.

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)

AES encryption 802.1x

Which of the following methods helps to detect lost packets? (Select two.)

Acknowledgements Sequencing

If you have multiple IPv6 address prefixes on a single OSPF interface, which of the following statements are true? (Select two.)

All address prefixes on an interface are included by default. Users cannot select some address prefixes to be imported into OSPF for IPv6; either all address prefixes on an interface are imported, or no address prefixes on an interface are imported.

Which of the following is true?

An IPv6 address is made up of 32 hexadecimal numbers organized into eight quartets.

A network administrator is located in a subnet connected to Switch P1 as shown. The administrator is unable to ping Switch A1 connected to the Atlanta router. What is the cause of the problem?

An incorrect default-gateway address is configured on Switch A1.

Match the layers of the TCP/IP model to the corresponding layers of the OSI model. (Each option may be used more than once.)

Application : Application Presentation : Application Session : Application Transport : Transport Network : Internet Data Link : Link Physical : Link

Which of the following allows devices to find a specific access point within an extended service set that has multiple access points?

BSSID

Which of the following mechanisms are used on Ethernet networks to control access to the transmission medium? (Select two.)

Backoff Collision detection

Which VSAT component provides data transmission capabilities over a satellite link?

Block Upconverter (BUC)

Which of the following would cause a TCP/IP connectivity issue between two routers?

Both routers have an IP address of 192.168.1.100.

Match the TCP/IP layers with their function.

Breaks the data into pieces. : Transport Prepares the data to be sent. : Application Adds physical addesses. : Link Adds logical addresses. : Internet

Which of the following statements are true about bridges? (Select two.)

Bridges connect two network segments with the same network address Bridges convert one type of transmission medium into another.

Which of the following are advantages of using bridges to segment LAN traffic? (Select two.)

Bridges create separate collision domains. Bridges can link network segments that use different physical media (as long as they have the same architecture).

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

CSMA/CA

Which of the following is an example of a public WAN?

Cable Internet

Which of the following services are available regardless of whether the telephone company network is available?

Cable Modem

Which of the following are true about Gigabit Ethernet? (Select two.)

Can use both copper and fiber optic Uses CSMA/CD

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is most likely to improve VoIP performance?

Change QoS settings to give VoIP traffic more priority.

You have a small network as shown in the Exhibit. You are unable to ping Wrk2 from Wrk1. What should you do to fix the problem?

Change the IP address assigned to Wrk2.

A technician is installing a new SOHO wireless router. Which of the following is the first thing the technician should do to secure the router?

Change the router's default password.

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take next?

Check for and apply firmware updates.

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Check the MAC addresses of devices connected to your wired switch. Conduct a site survey.

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

Which switching network type allows data connections that can be initiated when needed and terminated when communication is complete?

Circuit

What type of resources offer the following advantages? Flexibility of access Ease of use Self-service provisioning of resources API availability Metering of services Ability to try out software applications

Cloud

Consider the network shown. When you run the show interfaces command on Switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate?

Collisions are occurring.

Which of the following describes route summarization?

Combines a contiguous set of addresses into a single address.

What is Channel bonding?

Combines two non-overlapping channels into a single channel, resulting in slightly more than double the bandwidth.

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)

Configure all wireless access points with client certificates. Configure the RADIUS server with a server certificate.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is most likely to restore internet connectivity?

Configure the SOHO router for NAT.

You have a small network with two switches, SwitchA and SwitchB. MDI-X is not enabled on either switch. Each switch has three client computers connected. IP addresses have been assigned to various devices as follows: WrkA_1, WrkA_2, and WrkA_3 are connected to SwitchA, while WrkB_4, WrkB_5, and WrkB_6 are connected to SwitchB. All of the devices are configured to operate within the same subnet. You need to connect SwitchA and SwitchB so that workstations connected to SwitchA can communicate with workstations connected to SwitchB. What should you do?

Connect SwitchA and SwitchB using a crossover cable.

Each connection in the image is labeled A-G. Drag the cable type from the left that you would use to make each connection type.

Connection A : Ethernet straight-through cable Connection B : Ethernet crossover cable Connection C : Ethernet straight-through cable Connection E : Ethernet crossover cable Connection F : Ethernet straight-through cable Connection G : Ethernet crossover cable

Match each WAN topology to its description. Each topology will only be used once.

Connects multiple network locations to each other via WAN links. Each location has a direct link to all other locations. : Full mesh Connects multiple remote networks via WAN links. One site is the main location. : Hub and spoke A single, pre-established path from one network location, through a carrier network, and to a remote network location. : Point-to-point Provides two separate physical connects to a single ISP. : Dual-homed A network connected to an ISP using a single line. : Single-homed

Drag each leased line component on the left with its corresponding description on the right. Each component may be used once, more than once, or not at all.

Connects the WIC in the router to the telecom equipment. : Serial cable Controls the speed and timing of the router's serial interfaces. : CSU/DSU Provides the clocking function on the link. : CSU/DSU The equipment at the customer site. : CPE Provides a Layer 1 interface between the router and the telecom provider's equipment. : CSU/DSU

Which of the following is the backbone or local area network that connects multiple access points (and basic service sets) together?

DS

Which wireless networking component is used to connect multiple APs together?

DS

Which WAN connection types use digital communications over POTS? (Select two.)

DSL ISDN

At which layer of the OSI model do network switches operate that do not support routing?

Data Link

Cloud resources are implemented in several ways. Match the cloud implementations listed on the left with the appropriate descriptions on the right. (Each implementation type may be used once, more than once, or not at all.)

Designed to be shared by several organizations. : Community cloud Examples: Gmail and Google Docs. : Public cloud Provides resources to a single organization. : Private cloud Accessible to everyone. : Public cloud Accessible only by users within the single organization. : Private cloud

Infrared operates in which of the following modes? (Select two.)

Diffuse Line of sight

Which of the following measures makes your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast.

You have a switch connected to a small network as shown. A hub connects Wrk1 and Wrk5 to the switch. The switch has the following information in its CAM table: Port Device Fa0/1 Wrk1/Wrk5 Fa0/2 -- Fa0/3 Wrk3 Fa0/4 -- Wrk1 sends a frame addressed to Wrk5. What will the switch do with the frame? (Select two.)

Drop the frame. Not record the location of any device.

A 5-port hub is attached to interface fa 0/1 on your switch. Users of the workstations attached to the hub are complaining that their pings are erratic. When you run the show interfaces fa 0/1 command, you receive the following output. FastEthernet0/1 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 0019.e744.7401 (bia 0019.e744.7401) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX What is the problem?

Duplex mismatch

Match each TCP and/or UDP ports to the service that uses it.

Dynamic Host Configuration Protocol (DHCP) UDP ports 67 and 68 Network News Transport Protocol (NNTP) TCP Port 119 Simple Network Management Protocol (SNMP) TCP ports 161 and 162 Domain Name System TCP and UDP port 53 Telnet TCP and UDP port 23 Trivil File Transfer Protocol (TFTP) UDP port 69

Which of the following allow you to disable automatic summarization? (Select two.)

EIGRP RIP2

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes? (Select two.)

EMI, or cross-talk, on the UTP cabling is damaging frames in transit to this interface. Collisions are causing frame contents to arrive at this interface in a corrupted state.

Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.)

Eight MIMO radio streams 160MHz bonded channels

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Enable MAC filtering

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal?

Enable content filtering

Match each OSPFv3 command on the left with the corresponding description on the right. Each command may be used once, more than once, or not at all.

Enables OSPF for IPv6 router configuration. : ipv6 router ospf [process id] Generates a default external route into an OSPF routing domain. : default-information originate Displays the current contents of the IPv6 routing table. : show ipv6 route Enables OSPFv3 for IPv6 on an interface. : ipv6 ospf [process id] area [number]

The process of breaking a message into packets, adding control information and other information, and then transmitting the message through the transmission medium is known as __________?

Encapsulation

Review the IPv6 addressing scheme used in the network shown in the following figure. Click on the IPv6 address that has been configured incorrectly.

FD01:0001:0002:0001::20/64

You are working on a workstation with the following MAC address: 10-01-64-AB-78-96 Which of the following will be the link-local address using the modified EUI-64 format?

FE80::1201:64FF:FEAB:7896

Consider the following IPv6 address: FE80:0000:0000:0055:0000:0000:000A:AB00 Which of the following are valid shortened forms of this address? (Select two.)

FE80::55:0000:0000:A:AB00 FE80:0000:0000:0055::000A:AB00

Which of the following IPv6 addresses is used by a host to contact a DHCP server?

FF02::1:2

Which fiber optic cable requires the exposed fiber tip to be polished as part of the assembly process?

Field terminated epoxy connectors

You have two Cisco 2960 switches with 12 FastEthernet ports and 2 GigabitEthernet ports on each switch. You connect Fa0/1 on SwitchA to Fa0/1 on SwitchB with a crossover cable. A partial configuration for both switches is shown below. hostname SwitchA ! interface FastEthernet0/1 switchport mode dynamic auto spanning-tree link-type point-to-point ! --output omitted ! interface GigabitEthernet0/1 switchport mode dynamic desirable ! --output omitted hostname SwitchB ! interface FastEthernet0/1 switchport mode dynamic auto ! --output omitted ! interface GigabitEthernet0/1 switchport mode dynamic desirable spanning-tree link-type point-to-point ! --output omitted You notice that VLAN traffic for VLAN 2 is not being carried from SwitchA to SwitchB. What should you do?

For Fa0/1 on SwitchA, set the switchport mode to dynamic desirable.

Which frame processing method causes a switch to wait until the first 64 bytes of the frame have been received before forwarding the frame to the destination device?

Fragment-free

Which of the following are true of store-and-forward switches? (Select three.)

Frames with errors are dropped Latency is greater than with cutthrough switches. Frames are checked for errors before being forwarded.

Consider the following IPv6 address: FD01:0001:0001:005::7/64 Drag the component parts of this address on the left to the corresponding descriptions on the right. Not all descriptions on the right have corresponding components on the left.

Global Routing Prefix:(Blank) Subnet ID: (:005) Interface ID: (::7) Prefix Length: (/64) Global ID: (Blank) Unique Local Unicast Prefix: (FD)

Which of the following are assigned by an ISP and are similar to public addresses in IPv4?

Global unicast addresses

You need to design an IPv6 addressing scheme for your network. The following are key requirements for your design: - Infrastructure hosts, such as routers and servers, are assigned static interface IDs, while workstations, notebooks, tablets, and phones are assigned interface IDs dynamically. - Internet access must be available to all hosts through an ISP. - Site-to-site WAN connections are created using leased lines. Which type of IPv6 addressing is most appropriate for hosts in this network?

Global unicast addressing

Which of the following is true of a wireless network SSID?

Groups wireless devices together into the same logical network.

Which is the default Layer 2 encapsulation method for serial interfaces on a Cisco router?

HDLC

An access point that conforms to the IEEE 802.11ac standard handles network traffic similarly to which other networking device?

Hub

Which of the following is true of CSMA/CD? (Select two.)

If collisions are detected, an interrupt jam signal is broadcast to stop all transmissions. A device with data to send first listens to the transmission medium to determine if it is free.

Your wireless network consists of multiple 802.11n access points that are configured as follows: - SSID (hidden): CorpNet - Security: WPA2-PSK using AES - Frequency: 5.75 GHz - Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?

Implement antenna diversity.

What are the main types of cloud services? (Select two.)

Internal cloud services External cloud services

The TCP/IP protocol stack uses port numbers to determine protocol use. Port usage is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). Which of the following are characteristics of registered ports? (Select two.)

Is assigned by ICANN for a network service Has port number ranging from 1024 to 49151

Match each layer of the TCP/IP model to its functions. (Each layer matches with two functions.)

Is responsible for how messages are electrically transmitted. : Link Is responsible for forwarding packets through multiple networks. : Internet Is responsible for describing the physical layout of the network. : Link Is responsible for error checking and reliable delivery. : Transport Is not concerned with reliable delivery of information. : Internet Integrates network functionality into the host operating system. : Application Provides the capability for services to operate on the network. : Application Uses ports to enable application-to-application communications between hosts. : Transport

What is the first step when troubleshooting a serial link?

Isolate the fault domain

In reference to cloud computing, what does the term cloud mean?

It is a metaphor for the internet based on the basic cloud drawing used to represent the telephone network.

Which two of the following statements accurately describe full-duplex Ethernet? (Select two.)

It is collision free. It uses direct point-to-point connections between the sender and receiver.

You are deploying a new 10GB Ethernet network using Cat 6 cabling. Which of the following are true concerning this media? (Select two.)

It supports 10 GB Ethernet connections. PVC insulation surrounds each copper wire.

Which two of the following statements accurately describe half-duplex Ethernet? (Select two.)

It uses collision detection and recovery. It sends both signals along the same wire

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?

Late collisions

A failed ping or traceroute test might indicate a problem on which layers? (Select three.)

Layer 1 Layer 2 Layer 3

A connection or communication problem on the Data Link Layer could be indicated by which interface status?

Line Status up and Protocol Status down

There is a connection or communication problem, such as: - No clock rate provided by the DCE device. - Mismatched encapsulation. - Incorrect authentication parameters for PPP. What would the line and protocol status show?

Line status : Up Protocol status : Down

In OSPFv3, which term is used to define the communication medium used between nodes at the Link layer?

Link

Which of the following is true of Multiprotocol Label Switching? (Select two.)

MPLS can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.

Match each characteristic on the left with the appropriate fiber optic connector on the right.

MT-RJ : Metal guide pins for alignment LC : Half the size of other connectors ST : Bayonet-type connector SC : Push-on, pull-off connector

Match each wireless device on the left with its corresponding characteristics on the right. Each device may be used once, more than once, or not at all.

Manages all of the APs that are connected to it. : Wireless controller Supports 30 to 50 wireless clients per access point. : Wireless controller Provides NAT routing and an Ethernet switch in one device. : Consumer-grade (SOHO) wireless router Supports a maxiumum of 5-10 wireless clients. : Consumer-grade (SOHO) wireless router Pushes wireless configuration settings to connected access points. : Wireless controller

Terry is using the EIGRP routing protocol. Terry wants to use a single route to represent multiple routes to reduce the size of routing tables in the network. Which of the following routing summarization methods is being used?

Manual

Your company has just started contracting with the government. As part of the contract, you have configured a special server for running a custom application. Contract terms dictate that this server use only IPv6. You have several hosts that need to communicate with this server. These hosts only run IPv4 and cannot be configured to run IPv6. Which solution would you use to allow the IPv4 clients to communicate with the IPv6 server?

NAT-PT

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

Near cordless phones Near backup generators

When using the ip summary-address command, which of the following is true?

Neighboring devices only have a summary route in their routing tables.

On which layer of the OSI model does routing occur?

Network

Which of the following describes the function of a dedicated wireless access point on a network?

On a network, a wireless access point only acts as a bridge between the wireless segment and the wired segment on the same subnet.

You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point?

On the top floor

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)

One channel operating at 16 Kbps. Two channels operating at 64 Kbps each.

The following commands have been executed on a router: Router(config-router)#no auto-summary Router(config-router)#exit Router(config)#int fa 0/1 Router(config-if)#ip summary-address rip 172.16.0.0 255.255.0.0 Which interface type is fa 0/1?

Outbound

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings remain configured to the default with the exception of SSIDs. Which of the following might you suspect as the cause of the connectivity problems?

Overlapping channels.

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites?

Packets

Which of the following modes are used for Near Field Communications? (Select three.)

Peer-to-peer Card Emulation Reader/writer

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA2 passphrase. When they do, she uses the password to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? (Select two.)

Pharming Evil twin

Which tool can be used to verify Network layer connectivity?

Ping

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are.

You need to design a network that supports 275 hosts. You want to place all hosts in a single broadcast domain, and you want to make sure you do not waste IP addresses. How should you implement your plan?

Place all hosts on the same subnet. Use a mask of 255.255.254.0

An internet server has a single network interface that has been assigned an IP address. The server is running both the FTP and HTTP services. A client computer initiates a session with the HTTP server. How is the HTTP request from the client routed to the correct service running on the server?

Port or socket number

What term does the OSI model use that is different from the TCP/IP model uses to refer to frame, packet, and segment?

Protocol data unit (PDU)

Cloud resource service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Match each service model listed on the left with the appropriate description on the right. (Each service model may be used once, more than once, or not at all.)

Provider delivers everything a developer needs to build an application. : PaaS Providers deliver processing, storage, networks, and virtualized environment services. : IaaS Clients deploy and run software without purchasing servers, data center space, or network equipment. : IaaS Provider delivers applications to the client either over the internet or on a local area network. : SaaS Client avoids the cost and complexity of buying and managing the underlying hardware and software layers. : PaaS

You want to implement an Ethernet network using the 1000BaseT standard using the minimum hardware specifications possible. Which of the following should you include in your plan? (Select two.)

RJ-45 connectors Cat5e twisted pair cable

You just installed a new router (RTR07) in a field office. As part of the initial setup, you want to configure a description for the eighth gigabit Ethernet interface. Which of the following would set the description to WAN to Main Office?

RTR07(config)#int gi0/8 RTR07(config)#description WAN to Main Office

You administer a network that uses bridges to connect network segments. The network is currently suffering from serious broadcast storms. What can you do to solve the problem?

Replace the bridges with routers.

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?

Replace the omni-directional antenna with a directional antenna.

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point

You are asked to design a LAN segmentation solution for Company AGH. They have three workgroups separated with VLANs: Accounting, Sales, and Service. Most network traffic is localized within the individual workgroups, but some traffic crosses between each group. Company AGH is especially concerned about the security of information within the Accounting department. Which segmentation device meets the functionality requirements and provides the simplest, most economical administration?

Router

You have been put in charge of connecting two company networks that were previously separated. You need to connect a 100BaseTx Ethernet network with an older token ring network. Most traffic will be localized within each network, with only a little traffic crossing between networks. Both networks are using the TCP/IP protocol suite. Which connectivity device would be the best choice in this situation?

Router

During the initial setup of a router, which of the following commands would set the host name as LAS?

Router(config)#hostname LAS

You would like to enable an OSPFv3 routing process on a single interface and begin to use route IPv6 traffic. Which command(s) would you use?

Router(config-if)3ipv6 ospf <process id> area <number>

On your network, you have subnetting the network address 10.0.0.0 into smaller subnets, and it is separated by a network with different classful network addresses, such as 12.0.0.0. Which route summarization command do you need to execute?

Router(config-router)#no auto-summary

Which of the following are general advantages of using routers on your network? (Select three.)

Routers provide multiple links between devices to support load balancing Routers support multiple routing protocols for better flexibility Routers provide more features, such as flow control, error detection, and congestion control, than switches or bridges

Which of the following is used on a wireless network to identify the network name?

SSID

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have concluded that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP?

SSID

You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three.)

SSID AES Preshared Key

Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?

SSID broadcast

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?

Same SSID, different channel

The National Institute of Standards and Technology (NIST) has established five characteristics that a true cloud service must have. Match each characteristic to its description.

Seamlessly increasing and decreasing resources as needed. : Rapid elasticity The service needs to be provided over a network and be available in multiple platforms. : Broad network access Resources can be controlled and optimized automatically. : Measured service On-demand self service users must be able to dynamically obtain resources. : On-demand self service Multiple resources can be used by multiple users and can scale dynamically. : Resource pooling

You want to implement an Ethernet network using the 100Base-FX standard and the minimum hardware specifications possible. You need to support distances of up to 1,000 meters without repeaters. Which of the following should you include in your plan? (Select two.)

Single-mode fiber optic cable SC connectors

Review the IPv6 addressing scheme used in the network shown in the figure below. The goals of this network design include the following: - Infrastructure hosts, such as routers and servers, are assigned static interface IDs, while workstations, notebooks, tablets, and phones are assigned interface IDs dynamically. - Internet access must be available to all hosts through an ISP. - Site-to-site WAN connections are created using leased lines. Click on the LAN subnets and/or WAN subnets in this design that are not addressed correctly.

Site 1: LAN FD01:0001:0001:0001::/64 Site 3: LAN FD01:0001:0001:005::/64

What is the purpose of a network model?

Standardize processes at each layer.

You have a small network with three subnets as shown in the exhibit. IP addresses for each router interface are also indicated in the exhibit. How many IP addresses on each subnet remain that can be assigned to hosts?

SubnetA = 125, SubnetB = 0, SubnetC = 13

You have a single router with three subnets as shown. Each subnet has the number of hosts specified. You need to select a subnet mask for each subnet that provides sufficient host addresses without wasting addresses. Which mask values should you use?

SubnetA = 255.255.255.192 SubnetB = 255.255.255.224 SubnetC = 255.255.255.128

Which of the following are features of multimode fiber cable? (Select three.)

Supports only limited distance cable lengths Transfers data through the core using multiple light rays Has a core diameter around 50 to 100 microns

You are the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, you discover a high number of collisions. Which connectivity device would best reduce the number of collisions and prepare for future growth?

Switch

You want to prevent collisions on your network by creating separate collision domains and defining virtual LANs. Which of the following devices should you choose?

Switch

Which of the following is a type of line supported by a leased line?

T1 T3

How does TCP handle data sequencing?

TCP breaks user data into segments, numbers each segment, places them in the correct sequence, and sends each one in order, waiting for acknowledgement before sending the next segment.

You are troubleshooting connectivity issues. You had a successful ping test, but your Telnet test failed. What does this tell you?

The Network layer has connectivity.

RouterA, RouterB, and RouterC have been configured with IP addresses set as shown. All networks are using the default subnet mask. Users in network 10.1.1.0 claim they cannot access resources in network 192.168.2.0. From network 10.1.1.0, you can successfully ping interface 172.16.32.2, but you cannot ping 172.16.32.1. Another administrator on 192.168.2.0 claims she can ping 192.168.2.1, but not 172.16.32.1. What is most likely the problem?

The S0/1/1 interface on Router C is administratively down.

A user on your network has moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

You have a workstation connected to a small network with one subnet. The subnet is connected to the internet through a local ISP. You are having trouble connecting to one of your favorite websites. You issue a tracert command and see the output shown below: C:\tracert 166.77.11.1 Tracing route to 166.77.11.1 over a maximum of 30 hops 1 2 ms 1 ms 1 ms a.abc.net [209.63.168.50] 2 2 ms 1 ms 1 ms c.xyz.net [209.60.11.1] 3 * * * Request timed out. 4 * * * Request timed out. --additional output omitted Which of the following is the most likely cause of the problem? (Select two.)

The destination network can be reached, but the host does not respond. A router in the path does not have a route to the destination network.

What is the first thing that happens when a collision occurs on an Ethernet network?

The device that detected the collision transmits a jam signal.

You have configured an OSPFv3 router interface as a passive interface. Which of the following is true?

The interface advertises all subnets connected to the interface.

While calculating how many subnets are available for a given IP address and subnet mask, when should you use the 2^n - 2 formula? (Select two.)

The network uses a classful routing protocol, such as RIP version 1 or IGRP The no ip subnet zero command is configured

What is the backoff on an Ethernet network?

The random amount of time a device waits before retransmitting after a collision.

Which of the following is true regarding WAN leased lines?

The speed is symmetric. Each router runs in full-duplex.

Device B sends a frame to Device A on the network shown. The switch has an entry in its CAM table for Device A in its database, but not for Device B. Which of the following best describes what the switch does with the message?

The switch records the address and port for Device B in its database. It sends the frame out port Fa0/1.

An Ethernet frame has just arrived on a switch port. The switch examines the destination MAC address of the frame. It is a unicast address, but no mapping exists in the CAM table for the destination address. Assuming that no VLANs are configured, what happens next?

The switch sends a copy of the frame to all connected devices on all ports.

Which of the following indicate changes between OSPFv2 and OSPFv3?

The term link replaces the terms subnet and network when defining the medium used to communicate between nodes at the Link layer.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: - A wireless television distribution system running at 2.4 GHz. - A wireless phone system running at 5.8 GHz. - A wireless phone system running at 900 MHz. - An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. - An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range. Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system

You have just connected a Windows workstation to the network. The workstation can communicate with all devices on the same subnet, but can't communicate with other devices on other subnets. You use the ipconfig command on the workstation and see the following: C:\ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: IP Address . . . . . . . . . . : 192.168.1.100 Subnet Mask . . . . . . . . : 255.255.255.0 Default Gateway. . . . . : 192.168.1.1 No other devices seem to have an issue. What is the most probable cause of the problem?

The wrong default gateway address has been configured.

When additional resources are needed on a virtual machine, the hypervisor increases available resources up to the maximum set amount. What is this process called?

Thin provisioning

Which is the primary role of a firewall?

To protect networks and workstations by allowing or denying network traffic. The firewall does this using a configured set of rules.

Drag the information type on the left to the appropriate layer of the TCP/IP model it is associated with on the right.

Transport Layer : Segments Link Layer: Frames Application Layer : Data Internet Layer : Packets

Which of the following statements are true regarding OSPFv3 LSAs? (Select two.)

Type 9 is an intra-area prefix to describe the network. Type 8 is a link LSA from link-locals.

Which of the following lists accurately describes TCP and UDP? (Select two.)

UDP: connectionless, unreliable, unsequenced, low overhead TCP: connection-oriented, reliable, sequenced, high overhead

Which of the following is used to communicate within a site or between a limited number of sites?

Unique local unicast addresses

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different channel ID.

Cloud services can also offer virtual network infrastructures, which include a variety of virtual components. Match each virtual component on the left with the appropriate description on the right. (Each component may be used only once.)

Uses Ethernet standards to transmit and receive frames on the network. : Virtual network interface Implemented within the hypervisor to monitor and filter traffic on the virtual network as it flows between virtual machines. : Virtual firewall Can be defined within the virtual switch and associated with specific hosts. : Virtual VLAN Can support multiple networks on each of its interfaces, unlike the physical version. : Virtual router Builds a table that identifies which MAC addresses are connected to each of its ports. : Virtual switch

Match each IPv6 address assignment method on the left with the corresponding description on the right. (Each method may be used once, more than once, or not at all.)

Uses NDP to learn the subnet prefix: Stateless address autoconfiguration Assigns the entire 128-bit IPv6 address to the host: Static full assignment Assigns the prefix. The remainder is derived from the host MAC address: Static partial assignment Can be used in conjunction with SLAAC: Stateless DHCPv6 Provides all IP configuration information except for the default gateway address: Stateful DHCPv6 Relies on Stateless DHCPv6 to provide hosts with the IP address of the DNS server: Stateless address auto-configuration.

Match each wireless signaling method on the left with its definition on the right. (Not all of the signaling methods match a definition.)

Uses a narrow frequency band and hops data signals in a predictable sequence. : FHSS Breaks data into pieces and sends the pieces across multiple frequencies in a defined range. : DSSS Breaks data into very small data streams in order to send the information across long distances. : OFDM

Match the firewall types on the left with the characteristics shown on the right. (Firewall types may be used more than once.)

Usually a software firewall:Host-based firewall Most robust and secure firewall:Network-based firewall Considered a hardware firewall:Network-based firewall Installed on a single computer:Host-based firewall Installed on the edge of a network:Network-based firewall Less robust and less customizable:Host-based firewall

Which of the following problems could cause IPv6 filtering issues? (Select two.)

VLANs not on the switches. A filter that prevents the route from being added to the routing table.

Which of the following solutions can help with security when you are implementing an external cloud service?

VPN

Which of the following allows multiple virtual machines to exist on the same physical machine and share its underlying physical resources?

Virtualization

What is the removable card that contains the serial interface on a router called?

WIC

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network.

You need to connect several network devices together using twisted pair Ethernet cables. Assuming Auto-MDIX is not enabled on these devices, drag the appropriate type of cabling on the left to each connection type on the right.

Workstation to switch : Straight-through Ethernet cable router to switch : Straight-through Ethernet cable Workstation to router : Crossover Ethernet Cable switch to switch : Crossover Ethernet Cable router to router : Crossover Ethernet Cable

You have a small network with three subnets as shown. IP addresses for each router interface are also indicated. You need to connect Wrk1_A to SubnetA and Wrk5_C to SubnetC. Which IP addresses should you use? (Select two.)

Wrk1_A = 192.168.111.62 Wrk5_C = 10.155.64.97

Which of the following is true about address prefixes for OSPFv3 interfaces? (Select two.)

You cannot choose which address prefixes to import into OSPF for IPv6. All address prefixes are included by default.

Which of the following commands lists a workstation's ARP cache?

arp -a

You have a network with two routers as shown. Router A currently has a single static route to network 10.0.155.80/28. You need to add another subnet to router B. This subnet should also use a 28-bit mask. You would like to replace the existing static route to network 10.0.155.80/28 with a single summarized static route that includes the old network and the new network. You want to minimize wasted addresses. What should you do? (Select two.)

configure the static route to use a network of 10.0.155.64 and a mask of 255.255.255.224 use 10.0.155.64/28 for the new subnet

Which of the following are characteristics of 6-to-4 tunneling? (Select three.)

dual stack routers works through NAT Tunnel endpoints configured on routers

Wrk1 is connected to port Fa0/16 on your Cisco 2960 switch. A cable has been plugged in to the port and is connected to a device. The port should be using full-duplex communication at 100 Mbps. You press the Mode button to select Stat, Duplex, and Speed. The results are: - Stat = Solid green - Duplex = Off - Speed = Solid green Which command(s) should you use for the interface to configure the appropriate settings?

duplex full

You have a network with two routers as shown. You would like to configure a single static route on RouterA that summarizes the routes accessible through RouterB. Which static route would you configure?

ip route 192.168.100.64 255.255.255.192 192.168.100.34

You have a Windows workstation connected to a small network. Match each function on the left with its associated utility on the right.

ipconfig : View the configured IP address, subnet mask, and default gateway ping : Test Layer 3 functionality tracert : Test Layer 3 functionality ssh : Test Layer 7 functionality telnet : Test Layer 7 functionality arp : Clear the MAC address table

Your organization has decided to implement unique local unicast IPv6 addressing. A global ID of FD01:A001:0001::/48 has been selected for the organization's IPv6 addressing scheme. The next 16 bits beyond the global ID have been used to define the following subnets: - FD01:A001:0001:0001::/64 - FD01:A001:0001:0002::/64 - FD01:A001:0001:0003::/64 - FD01:A001:0001:0004::/64 You need to statically assign an interface ID to a router interface connected to the FD01:A001:0001:0003::/64 subnet. To ensure uniqueness, the interface ID should be constructed using the MAC address of the router interface. Which interface configuration command would you use to do this?

ipv6 address FD01:A001:0001:0003::/64 eui-64

Which of the following commands can be used to enable IPv6 routing on Cisco equipment?

ipv6 unicast-routing

Which command is used to enable OSPFv3 on a router?

router ospfv3 [process ID]

After OSPFv3 has been enabled on a router. You need to set the router ID. Which command will accomplish this task?

router-id [ID number]

You need to view the type of serial cable that has been used on the s0/0/1 interface and which end of the cable is connected to the DCE or DTE. Which command should you use to do this?

show controllers s0/0/1

Which of the following commands will show you the most information about each interface?

show interfaces

You are troubleshooting Physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?

show interfaces gi0/1

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You suspect that a duplex mismatch error has occurred, and you need to determine the duplex settings configured on the interface. Which commands could you use? (Select two. Each response is a complete solution.)

show interfaces gi0/1 show interfaces gi0/1 status

When troubleshooting IPv6 networks, which command can be used to display the route an IPv6 router would use to send packets to a specified destination address?

show ipv6 route

You want to verify that interface FastEthernet 0/2 is a member of VLAN0002. Which command displays the output shown here? VLAN Name Status Ports ---- --------------------- --------- ------------------------------- 1 default active Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Gi0/1, Gi0/2 2 VLAN0002 active Fa0/2 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active 1005 trnet-default active...(remaining output suppressed)

show vlan brief

Which of the following utilities gives you the most information about the operational status of a router?

telnet


संबंधित स्टडी सेट्स

Chapter 9: The Inheritance of Personality

View Set

AP Chemistry Possible Questions Bank

View Set

Psychology of Drugs and Behaviour Final Content

View Set

Physiology Exam 3 Week 7 (Questions)

View Set

CHAPTER 3: INTERESTS AND ESTATES

View Set

VIVA 1 MODULE 5 5.En la cafetería

View Set