CIS 103 Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which three settings must match in order for switch ports to form an EtherChannel? (Choose three.) Answers: The switch port numbers that will be combined to form the EtherChannel must match. Non-trunk ports must belong to the same VLAN. The SNMP community strings must be configured the same. The interfaces must be configured to the same speed. The duplex settings of the switch ports on both sides of the physical link must match. Port security settings on the connected physical interfaces must be configured to the same violation mode

Non-trunk ports must belong to the same VLAN. The interfaces must be configured to the same speed. The duplex settings of the switch ports on both sides of the physical link must match.

What routing table descriptor is used to identify OSPF summary networks that originate from an ABR? Answers: O O AI O E1 O E2

O AI

Why do OSPF serial interfaces usually require manual bandwidth configuration? Answers: OSPF uses the bandwidth value to compute routes for its routing table. Each side of an OSPF serial link should be configured with a unique value. All serial interfaces default to a value of 1.544 Mb/s. Bandwidth value affects the actual speed of the link.

OSPF uses the bandwidth value to compute routes for its routing table.

If all router Ethernet interfaces in an EIGRP network are configured with the default EIGRP timers, how long will a router wait by default in seconds to receive an EIGRP packet from its neighbor before declaring the neighbor unreachable? Answers: 10 15 20 30

15

Which administrative distance is used to advertise routes learned from other protocols that are redistributed into EIGRP? Answers: 170 90 115 5

170

Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4 gateway address should be configured on the host? Answers: 192.168.2.0 192.168.2.1 192.168.2.2 192.168.2.100

192.168.2.100

Refer to the exhibit. R3 has two possible paths to the 172.16.99.0 network. What is the reported distance of the feasible successor route? Answers: 2340608 2169856 10512128 2816

2816

Which IEEE wireless standard is known as WiGig and operates using a tri-band solution in the 2.4, 5, and 60 GHz ranges? Answers: 802.11g 802.11n 802.11ac 802.11ad

802.11ad

Which two protocols are link aggregation protocols? (Choose two.) Answers: 802.3ad PAgP STP EtherChannel RSTP

802.3ad PAgP

Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power? Answers: S4 and PC_2 PC_3 and AP_2 AP_2 and AP_1 PC_3 and PC_2 S1 and S4

PC_3 and AP_2 Response Feedback: A failure domain is the area of a network that is impacted when a critical device such as switch S3 has a failure or experiences problems.

What is an advantage of PVST+? Answers: PVST+ requires fewer CPU cycles for all the switches in the network. PVST+ reduces bandwidth consumption compared to traditional implementations of STP that use CST. PVST+ optimizes performance on the network through autoselection of the root bridge. PVST+ optimizes performance on the network through load sharing.

PVST+ optimizes performance on the network through load sharing.

EIGRP uses the protocol __________________ to deliver EIGRP packets to neighbors.​

RTP

A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design? Answers: Multiple physical interfaces can be combined into a single EtherChannel interface. Redundant paths can be available without causing logical Layer 2 loops. Network access can be expanded to support both wired and wireless devices. Faster convergence is available for advanced routing protocols.

Redundant paths can be available without causing logical Layer 2 loops. Response Feedback: With the implementation of redundant devices and links, redundant paths will exist in the network. This may cause a Layer 2 loop, and Spanning Tree Protocol (STP) is used to eliminate switching loops while maintaining reliability. STP is not required to combine multiple physical interfaces into a single EtherChannel interface. STP does not provide faster convergence or an expanded network that uses wired or wireless connectivity.

What could be the effect of duplicate unicast frames arriving at a destination device due to multiple active alternative physical paths? Answers: Frame collisions increase. The number of broadcast domains increases. Application protocols malfunction. The number of collision domains increases.

Application protocols malfunction.

Refer to the exhibit. Router R3 is receiving multiple routes through the EIGRP routing protocol. Which statement is true about the implementation of summarization in this network? Answers: Automatic summarization has been enabled only for the 172.21.100.0/24 network. Automatic summarization is disabled on R3. Automatic summarization is enabled on neighboring routers​. Automatic summarization is disabled on a per-interface basis.

Automatic summarization is disabled on R3.

Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete? Answers: Trunk 1 Trunk 2 Trunk 3 Trunk 4

Trunk 2

When OSPFv2 neighbors are establishing adjacencies, in which state do they elect a DR and BDR router? E Answers: Exchange state Init state Two-way state Loading state

Two-way state

Which two statements correctly describe OSPF type 3 LSAs? (Choose two.) Type 3 LSAs are generated without requiring a full SPF calculation.​ Type 3 LSAs are used to update routes between OSPF areas. Type 3 LSAs are generated without requiring a full SPF calculation.​ Type 3 LSAs are used for routes to networks outside the OSPF autonomous system​. Type 3 LSAs are known as router link entries​. Type 3 LSAs are used to update routes between OSPF areas.

Type 3 LSAs are generated without requiring a full SPF calculation.​ Type 3 LSAs are used to update routes between OSPF areas.

What additional information is contained in the 12-bit extended system ID of a BPDU? Answers: MAC address VLAN ID IP address port ID

VLAN ID

A network engineer is troubleshooting OSPFv2 routing issues on two connected routers. Which two requirements to form an adjacency need to be verified? (Choose two.) Answers: Verify that one of the interfaces that connects the two routers is active and the other passive. Verify that one of the routers is the DR or BDR and the other router a DRother. Verify that the interfaces that connect the two routers are in the same subnet. Verify that the interfaces that connect the two routers are in the same area. Verify that both routers are using the same OSPFv2 process ID.

Verify that the interfaces that connect the two routers are in the same subnet. Verify that the interfaces that connect the two routers are in the same area.

In the Cisco Enterprise Architecture, which two functional parts of the network are combined to form a collapsed core design? (Choose two.) Answers: core layer access layer enterprise edge provider edge distribution layer

distribution layer Response Feedback: The Cisco Enterprise Architecture consists of a hierarchical design. The network is divided into three functional layers; core, distribution and access. In smaller networks this three layer division of functional layers is collapsed into two layers with the core and distribution layers combined to form a collapsed core.

Which three components are combined to form a bridge ID? Answers: port ID IP address extended system ID MAC address bridge priority cost

extended system ID MAC address bridge priority

In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.) Answers: blocking disabled forwarding learning listening

forwarding learning

Which command will initiate EtherChannel interface configuration mode? Answers: channel-group group-identifier interface port-channel interface-identifier interface interface-identifier interface range interface-identifier

interface port-channel interface-identifier

Which command would limit the amount of bandwidth that is used by EIGRP for protocol control traffic to approximately 128 Kb/s on a 1.544 Mb/s link? Answers: ip bandwidth-percent eigrp 100 8 maximum-paths 8 variance 8 traffic-share balanced

ip bandwidth-percent eigrp 100 8

A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point? Answers: beacon frame control frame data frame management frame

management frame

Refer to the exhibit. Which command should be used to configure EIGRP to only advertise the network that is attached to the gigabit Ethernet 0/1 interface? Answers: network 172.16.23.64 0.0.0.63 network 172.16.23.0 255.255.255.192 network 172.16.23.64 0.0.0.127 network 172.16.23.0 255.255.255.128

network 172.16.23.64 0.0.0.63

Which command or commands must be entered on a serial interface of a Cisco router to restore the bandwidth to the default value of that specific router interface? Answers: bandwidth 1500 shutdown no shutdown copy start run reload no bandwidth

no bandwidth

What information does EIGRP maintain within the routing table? Answers: only successors both successors and feasible successors only feasible successors adjacent neighbors

only successors

Refer to the exhibit. Which conclusion can be drawn from this OSPF multiaccess network?​ Answers: When a DR is elected all other non-DR routers become DROTHER. All DROTHER routers will send LSAs to the DR and BDR to multicast 224.0.0.5. If the DR stops producing Hello packets, a BDR will be elected, and then it promotes itself to assume the role of DR.​ With an election of the DR, the number of adjacencies is reduced from 6 to 3.

With an election of the DR, the number of adjacencies is reduced from 6 to 3.

Refer to the exhibit. A network administrator has been asked to summarize the networks shown in the exhibit as part of a multiarea OSPF implementation. All addresses are using a subnet mask of 255.255.255.0. What is the correct summarization for these eight networks? 10.0.4.0 255.255.0.0 Answers: 10.0.4.0 255.255.0.0 10.0.0.0 255.255.240.0 10.0.4.0 255.255.248.0 10.0.8.0 255.255.248.0

10.0.0.0 255.255.240.0

Refer to the exhibit. Which two routes will be advertised to the router ISP if autosummarization is disabled? (Choose two.) Answers: 10.1.0.0/16 10.1.2.0/24 10.1.4.0/24 10.1.4.0/28 10.1.4.0/30

10.1.2.0/24 10.1.4.0/30

Which destination MAC address is used when a multicast EIGRP packet is encapsulated into an Ethernet frame? Answers: 01-00-5E-00-00-09 01-00-5E-00-00-10 01-00-5E-00-00-0A 01-00-5E-00-00-0B

01-00-5E-00-00-0A

Refer to the exhibit. Four routers are connected to an Ethernet LAN segment and are configured to run OSPFv3. However, none of the routers are receiving routing updates. What is the cause of the problem? Answers: The routers are using IPv4 addresses for router IDs. All of the routers have an OSPFv3 interface priority of 0. The network type has been set to BROADCAST instead of NBMA. The routers are using IPv6 link local addresses to communicate.

All of the routers have an OSPFv3 interface priority of 0.

What is an advantage of SSID cloaking?​ Answers: It provides free Internet access in public locations where knowing the SSID is of no concern. Clients will have to manually identify the SSID to connect to the network.​ SSIDs are very difficult to discover because APs do not broadcast them.​ It is the best way to secure a wireless network.

Clients will have to manually identify the SSID to connect to the network.​

The trunk link between two 2960 switches has reached its capacity. How can this be addressed in the most economical way? Answers: Increase the speed of the ports Decrease the size of the inter-switch collision domain by configuring additional VLANs. Combine physical ports into a high-speed logical link by configuring EtherChannel. Create additional broadcast domains by inserting a router between the switches.

Combine physical ports into a high-speed logical link by configuring EtherChannel.

What two statements are correct regarding EIGRP authentication? (Choose two.) Answers: EIGRP authentication uses the MD5 algorithm. EIGRP authentication uses a pre-shared key. EIGRP authentication requires that both routers have the same key chain name. EIGRP authentication uses varying levels of WEP to encrypt data exchanged between routers. EIGRP authentication can be configured on one router and updates from this router are protected; whereas a neighbor router can be without the authentication configuration and its updates are unprotected.

EIGRP authentication uses the MD5 algorithm. EIGRP authentication uses a pre-shared key.

Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet? Answers: BSS Wifi Direct ESS ad hoc WLAN

ESS

What is the multicast address used by an EIGRP-enabled router operating with IPv6? Answers: FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF FF02::A FF02::B FF02::1

FF02::A

Which statement describes a multiarea OSPF network? Answers: It consists of multiple network areas that are daisy-chained together. It requires a three-layer hierarchical network design approach. It has a core backbone area with other areas connected to the backbone area. It has multiple routers that run multiple routing protocols simultaneously, and each protocol consists of an area.

It has a core backbone area with other areas connected to the backbone area.

Which statement describes a characteristic of EtherChannel? Answers: It can combine up to a maximum of 4 physical links. It can bundle mixed types of 100 Mb/s and 1Gb/s Ethernet links. It consists of multiple parallel links between a switch and a router. It is made by combining multiple physical links that are seen as one link between two switches.

It is made by combining multiple physical links that are seen as one link between two switches.

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? Answers: ad hoc BESS ESS SSID

SSID

What is a best practice to use before beginning an EtherChannel implementation? Answers: Assign affected interfaces to VLAN 1. Shut down each of the affected interfaces. Enable each of the affected interfaces. Assign affected interfaces to an unused VLAN. Assign affected interfaces to the management VLAN.

Shut down each of the affected interfaces.

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network? Answers: Replace the wireless NICs on the computers that are experiencing slow connections. Split the traffic between the 2.4 GHz and 5 GHz frequency bands. Disable DHCP on the access point and assign static addresses to the wireless clients. Upgrade the firmware on the wireless access point.

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table? Answers: The network was learned from a router within the same area as R2. The network was learned through summary LSAs from an ABR. The network can be reached through the GigabitEthernet0/0 interface. This network should be used to forward traffic toward external networks.

The network was learned from a router within the same area as R2.

Which configuration is necessary to ensure successful operation of EIGRP for IPv6? Answers: The eigrp router-id command requires an IPv6 address within the router configuration mode. The network command is required within the router configuration mode.​ The no shutdown command is required within the router configuration mode.​ The router eigrp autonomous-system command is required within the router configuration mode.

The no shutdown command is required within the router configuration mode.​

In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.) Answers: The root bridge BID. The role of the ports in all VLANs. The status of native VLAN ports. The number of broadcasts received on each root port. The IP address of the management VLAN interface.

The role of the ports in all VLANs.

To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.) Answers: The root bridge BID. The role of the ports in all VLANs. The status of native VLAN ports. The number of broadcasts received on each root port. The IP address of the management VLAN interface.

The root bridge BID.

What is indicated when an EIGRP route is in the passive state? Answers: The route has the highest path cost of all routes to that destination network. The route must be confirmed by neighboring routers before it is put in the active state. The route is a feasible successor and will be used if the active route fails. There is no activity on the route to that network. The route is viable and can be used to forward traffic.

The route is viable and can be used to forward traffic.

A network engineer is troubleshooting an OSPFv2 network and discovers that two routers connected by a point-to-point WAN serial link are not establishing an adjacency. The OSPF routing process, network commands and area ID are all confirmed as correct, and the interfaces are not passive. Testing shows that the cabling is correct, that the link is up, and pings between the interfaces are successful. What is most likely the problem? Answers: The subnet masks on the two connected serial interfaces do not match. A clock rate has not been set on the DCE interface of the serial link. The OSPFv2 process IDs on each router do not match. A DR election has not taken place.

The subnet masks on the two connected serial interfaces do not match.

Refer to the exhibit. R1 and R2 are connected to the same LAN segment and are configured to run OSPFv3. They are not forming a neighbor adjacency. What is the cause of the problem? Answers: The IPv6 addresses of R1 and R2 are not in the same subnet. The OSPFv3 process IDs of R1 and R2 are different. The timer intervals of R1 and R2 do not match. The priority value of both R1 and R2 is 1.

The timer intervals of R1 and R2 do not match.

When checking a routing table, a network technician notices the following entry: O*E2 0.0.0.0/0 [110/1] via 192.168.16.3, 00:20:22, Serial0/0/0 What information can be gathered from this output? Answers: This route is a propagated default route. The route is located two hops away. The metric for this route is 110. The edge of the OSPF area 0 is the interface that is addressed 192.168.16.3.

This route is a propagated default route.

Refer to the exhibit. The administrator tried to create an EtherChannel between S1 and the other two switches via the commands that are shown, but was unsuccessful. What is the problem? Answers: Traffic can only be sent to two different switches if EtherChannel is implemented on Gigabit Ethernet interfaces.​ Traffic can only be sent to two different switches if EtherChannel is implemented on Layer 3 switches.​ Traffic cannot be sent to two different switches through the same EtherChannel link. Traffic cannot be sent to two different switches, but only to two different devices like an EtherChannel-enabled server and a switch.​

Traffic cannot be sent to two different switches through the same EtherChannel link.

A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as a​​ replacement? Answers: a Layer 3 switch a modular router a PoE device another fixed configuration router

a modular router Modular routers provide multiple slots that allow a network designer to change or increase the interfaces that exist on the router. A Layer 3 switch may increase the number of ports available on a router, but will not provide WAN connectivity. The PoE capability of a device is not related to the number of ports it has. Using another fixed configuration router will not provide the flexibility to adapt to future growth that using a modular router will provide.

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) Answers: repeater access point WLAN Controller Ethernet Switch Radius Authentication Server

access point Ethernet Switch

In an EIGRP topology table, a route that is in a/an _____________________ state will cause the Diffusing Update Algorithm to send EIGRP queries that ask other routers for a path to this network.

active

What are two advantages of using LACP? (Choose two.) Answers: increases redundancy to Layer 3 devices eliminates the need for the spanning-tree protocol

allows automatic formation of EtherChannel links allows use of multivendor devices

What is the function of PoE pass-through? allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing the CPU allows multiple physical switch ports to be aggregated together and act as a single logical link to increase bandwidth on trunk links.

allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch PoE or Power over Ethernet allows devices such as wireless access-points and IP phones to receive power from PoE enabled switch ports. PoE pass-through allows a switch to receive power from an upstream switch and pass it through to PoE devices.

Two routers, R1 and R2, have established an EIGRP neighbor relationship, but there is still a connectivity problem. Which issue could be causing this problem?​ Answers: an authentication mismatch an access list that is blocking advertisements from other networks automatic summarization that is disabled on both routers a process ID mismatch

an access list that is blocking advertisements from other networks

The network administrator has been asked to summarize the routes for a new OSPF area. The networks to be summarized are 172.16.8.0, 172.16.10.0, and 172.16.12.0 with subnet masks of 255.255.255.0 for each network. Which command should the administrator use to forward the summary route for area 15 into area 0? Answers: area 0 range 172.16.8.0 255.255.255.248 area 0 range 172.16.8.0 255.255.248.0 area 15 range 172.16.8.0 255.255.248.0 area 15 range 172.16.8.0 255.255.255.248

area 15 range 172.16.8.0 255.255.248.0

An administrator issues the router eigrp 100 command on a router. What is the number 100 used for? Answers: as the autonomous system number as the length of time this router will wait to hear hello packets from a neighbor as the maximum bandwidth of the fastest interface on the router as the number of neighbors supported by this router

as the autonomous system number

During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP? Answers: discovery probing association authentication

association

Which EIGRP parameter must match between all routers forming an EIGRP adjacency? Answers: hello timer variance autonomous system number hold timer administrative distance

autonomous system number

A new network administrator has been asked to verify the metrics that are used by EIGRP on a Cisco device. Which two EIGRP metrics are measured by using static values on a Cisco device? (Choose two.) Answers: bandwith load reliability delay MTU

bandwith

How do EIGRP routers establish and maintain neighbor relationships? Answers: by exchanging neighbor tables with directly attached routers by comparing known routes to information received in updates by exchanging hello packets with neighboring routers by dynamically learning new routes from neighbors by inviting them over for dinner

by exchanging hello packets with neighboring routers

How can an enterprise network be designed to optimize bandwidth? Answers: by installing devices with failover capabilities by limiting the size of failure domains by deploying a collapsed core model by organizing the network to control traffic patterns

by organizing the network to control traffic patterns Response Feedback: It is best to organize the network so that traffic stays local and is not propagated unnecessarily to other portions of the network. Installing devices with failover capabilities and deploying a collapsed core model does not optimize bandwidth. Limiting the of failure domains may limit the amount of traffic that occurs in these areas but it is not the best way to optimize bandwidth.

A network administrator is implementing OSPF in a portion of the network and must ensure that only specific routes are advertised via OSPF. Which network statement would configure the OSPF process for networks 192.168.4.0, 192.168.5.0, 192.168.6.0, and 192.168.7.0, now located in the backbone area, and inject them into the OSPF domain? Answers: r1(config-router)# network 192.168.0.0 0.0.0.255 area 1 r1(config-router)# network 192.168.4.0 0.0.3.255 area 1 r1(config-router)# network 192.168.4.0 0.0.15.255 area 1 r1(config-router)# network 192.168.0.0 0.0.3.255 area 0 r1(config-router)# network 192.168.4.0 0.0.3.255 area 0 r1(config-router)# network 192.168.4.0 0.0.255.255 area 0

r1(config-router)# network 192.168.4.0 0.0.3.255 area 0

What term is used to express the thickness or height of a switch? Answers: rack unit port density module size domain size

rack unit Response Feedback: The thickness of a switch determines how much space on the rack it will take up and is measured in rack units.

What is a characteristic of manual route summarization? Answers: requires high bandwidth utilization for the routing updates reduces total number of routes in routing tables cannot include supernet routes​ has to be configured globally on the router

reduces total number of routes in routing tables

Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.) Answers: static default routes implementing VLANs to contain broadcasts redundant links between Layer 2 switches link-state dynamic routing that provides redundant routes removing single points of failure with multiple Layer 2 switches

redundant links between Layer 2 switches removing single points of failure with multiple Layer 2 switches

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation? Answers: cracking denial of service rogue access point spoofing

rogue access point

Which two pieces of information are used by the OSPF MD5 algorithm to generate a signature? (Choose two.) Answers: secret key OSPF message router hostname OSPF router ID interface IP address

secret key OSPF message

Which command is used to display the bandwidth of an interface on an EIGRP-enabled router? Answers: show ip route show interfaces show ip protocols show ip interfaces brief

show interfaces

Which command can be used to verify the contents of the LSDB in an OSPF area? Answers: show ip ospf database show ip ospf interface show ip ospf neighbor show ip route ospf

show ip ospf database

When IPv4 and OSPFv2 are being used, the command ___________________ is used to verify that a router has formed an adjacency with its neighboring routers.

show ip ospf neighbor

Which command can be issued on a router to verify that automatic summarization is enabled? Answers: show ip eigrp interfaces show ip protocols show ip interface brief show ip eigrp neighbors

show ip protocols

Which command is used to verify that OSPF is enabled and also provides a list of the networks that are being advertised by the network?​ Answers: show ip protocols show ip ospf interface show ip interface brief show ip route ospf

show ip protocols

Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.) Answers: show flash show NVRAM show startup-config show running-config show version

show startup-config show running-config

Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.) Answers: destination MAC to destination IP destination IP to destination MAC source MAC to destination MAC source IP to destination IP destination MAC to source MAC destination IP to source IP

source MAC to destination MAC source IP to destination IP

Which STP priority configuration would ensure that a switch would always be the root switch? spanning-tree vlan 10 priority 0 spanning-tree vlan 10 priority 61440 spanning-tree vlan 10 root primary spanning-tree vlan 10 priority 4096

spanning-tree vlan 10 priority 0

Which PAgP mode combination will establish an EtherChannel? Answers: switch 1 set to on; switch 2 set to desirable. switch 1 set to desirable; switch 2 set to desirable.​ switch 1 set to auto; switch 2 set to auto.​ switch 1 set to auto; switch 2 set to on.​

switch 1 set to desirable; switch 2 set to desirable.​

What are two functions of a router? (Choose two.) Answers: It connects multiple IP networks. It controls the flow of data via the use of Layer 2 addresses. It determines the best path to send packets It manages the VLAN database. It increases the size of the broadcast domain.

t connects multiple IP networks. It determines the best path to send packets

Ad hoc wireless topologies sometimes can use a feature called ____________ to enable a smartphone to create a personal hotspot.

tethering

What is identified within the opcode of an EIGRP packet header? Answers: the EIGRP message type that is being sent or received from a neighbor the EIGRP autonomous system metrics the EIGRP hold timer agreed upon with a neighbor the EIGRP sum of delays from source to destination

the EIGRP message type that is being sent or received from a neighbor

What network design would contain the scope of disruptions on a network should a failure occur? Answers: the installation of only enterprise class equipment throughout the network the configuration of all access layer devices to share a single gateway the reduction in the number of redundant devices and connections in the network core the deployment of distribution layer switches in pairs and the division of access layer switch connections between them

the deployment of distribution layer switches in pairs and the division of access layer switch connections between them Response Feedback: One way to contain the impact of a failure on the network is to implement redundancy. One way this is accomplished is by deploying redundant distribution layer switches and dividing the access layer switch connections between the redundant distribution layer switches. This creates what is called a switch block. Failures in a switch block are contained to that block and do not bring down the whole network.

Which table is used by EIGRP to store all routes that are learned from EIGRP neighbors? Answers: the routing table the neighbor table the topology table the adjacency table

the topology table

What is the purpose of using protocol-dependent modules in EIGRP? Answers: to describe different routing processes to identify different application layer protocols to use different transport protocols for different packets to accommodate routing of different network layer protocols

to accommodate routing of different network layer protocols

Why would a network administrator use a wildcard mask in the network command when configuring a router to use EIGRP? Answers: to lower the router overhead to send a manual summarization to exclude some interfaces from the EIGRP process to subnet at the time of the configuration

to exclude some interfaces from the EIGRP process

What is the purpose of a Null0 route in the routing table? Answers: to redistribute external routes into EIGRP to prevent routing loops to act as a gateway of last resort to prevent the router from sending EIGRP packets

to prevent routing loops

What OSPF LSA type is used to inform routers of the router ID of the DR in each multiaccess network in an OSPF area? Answers: type 1 type 2 type 3 type 4

type 2

Which two EIGRP packet types are sent with reliable delivery? (Choose two.)​ Answers: update query hello reply shut up acknowledgement

update query


संबंधित स्टडी सेट्स

2023 Nissan ARIYA Reservation eLearning Certification

View Set

Real Estate Chapter 1-5 principles

View Set

Psalm 73 - Flashcard MC questions - Ted Hildebrandt

View Set

Administration of IV fluids, blood and blood products

View Set