ICND1 - "Do I Know This Already?"

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following masks, when used as the only mask within a Class B network, would supply enough subnet bits to support 100 subnets? (Choose two.) a. /24 b. 255.255.255.252 c. /20 d. 255.255.252.0

a. /24 b. 255.255.255.252

Which of the following are private IP networks? (Choose two answers.) a. 172.31.0.0 b. 172.32.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 11.0.0.0

a. 172.31.0.0 c. 192.168.255.0

Which of the following are public IP networks? (Choose three answers.) a. 9.0.0.0 b. 172.30.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 1.0.0.0

a. 9.0.0.0 d. 192.1.168.0 e. 1.0.0.0

On a Cisco Catalyst switch, you issue a show mac address-table command. Which of the following answers list information you would likely see in most lines of output? (Choose two answers.) a. A MAC address b. An IP address c. A VLAN ID d. Type (broadcast, multicast, or unicast)

a. A MAC address c. A VLAN ID

An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious co-workers from logging into the lab switches from their desktop PCs. Which of the following commands would be a useful part of that configuration? a. A login vty mode subcommand b. A password password console subcommand c. A login local vty subcommand d. A transport input ssh vty subcommand

a. A login vty mode subcommand

Which of the following are functions of a routing protocol? (Choose two answers.) a. Advertising known routes to neighboring routers b. Learning routes for subnets directly connected to the router c. Learning routes, and putting those routes into the routing table, for routes adver- tised to the router by its neighboring routers d. Forwarding IP packets based on a packet's destination IP address

a. Advertising known routes to neighboring routers c. Learning routes, and putting those routes into the routing table, for routes adver- tised to the router by its neighboring routers

The process of a web server adding a TCP header to the contents of a web page, fol- lowed by adding an IP header and then adding a data link header and trailer, is an example of what? a. Data encapsulation b. Same-layer interaction c. OSI model d. All of these answers are correct.

a. Data encapsulation

Which of the following protocols are examples of TCP/IP data link layer protocols? (Choose two answers.) a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP g. PPP

a. Ethernet & g. PPP

2. Which of the following are typical functions of TCP? (Choose four answers.) a. Flow control (windowing) b. Error recovery c. Multiplexing using port numbers d. Routing e. Encryption f. Ordered data transfer

a. Flow control (windowing) b. Error recovery c. Multiplexing using port numbers f. Ordered data transfer

A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user's PC. The end user, thinking the user is helping, manually sets the PC's OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of autonegotiation. The switch's G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.) a. Full duplex b. Half duplex c. 10 Mbps d. 1000 Mbps

a. Full duplex d. 1000 Mbps

Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

a. It compares the unicast destination address to the bridging, or MAC address, table.

Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? a. It forwards out all interfaces in the same VLAN except for the incoming interface. b. It forwards the frame out the one interface identified by the matching entry in the MAC address table. c. It compares the destination IP address to the destination MAC address. d. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

a. It forwards out all interfaces in the same VLAN except for the incoming interface.

Which OSI layer defines the standards for cabling and connectors? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 e. Layer 5, 6, or 7

a. Layer 1

Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.) a. Logical addressing b. Physical addressing c. Path selection d. Arbitration e. Error recovery

a. Logical addressing c. Path selection

Working at the help desk, you receive a call and learn a user's PC IP address and mask (192.168.9.1/27). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the following is true in this case? a. N=24 b. S=24 c. H=8 d. H=7

a. N=24

Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size? (Choose two answers.) a. Network b. Subnet c. Host d. Broadcast

a. Network c. Host

In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? a. Only the devices that use cables are using Ethernet. b. Only the devices that use wireless are using Ethernet. c. Both the devices using cables and those using wireless are using Ethernet. d. None of the devices are using Ethernet.

a. Only the devices that use cables are using Ethernet.

Which of the following devices would be in the same collision domain as PC1? a. PC2, which is separated from PC1 by an Ethernet hub b. PC3, which is separated from PC1 by a transparent bridge c. PC4, which is separated from PC1 by an Ethernet switch d. PC5, which is separated from PC1 by a router

a. PC2, which is separated from PC1 by an Ethernet hub

Which of the following devices would be in the same broadcast domain as PC1? (Choose three answers.) a. PC2, which is separated from PC1 by an Ethernet hub b. PC3, which is separated from PC1 by a transparent bridge c. PC4, which is separated from PC1 by an Ethernet switch d. PC5, which is separated from PC1 by a router

a. PC2, which is separated from PC1 by an Ethernet hub b. PC3, which is separated from PC1 by a transparent bridge c. PC4, which is separated from PC1 by an Ethernet switch

What type of switch memory is used to store the configuration used by the switch when it is up and working? a. RAM b. ROM c. Flash d. NVRAM e. Bubble

a. RAM

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2. c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC2. d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.

a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.

In a three-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.) a. The design uses a partial mesh of links between access and distribution switches b. The design uses a full mesh of links between access and distribution switches c. The design uses a partial mesh of links between the distribution and core switches d. The end user and server devices connect directly to distribution layer switches

a. The design uses a partial mesh of links between access and distribution switches c. The design uses a partial mesh of links between the distribution and core switches

The output of the show interfaces status command on a 2960 switch shows interface Fa0/1 in a "disabled" state. Which of the following is true about interface Fa0/1? (Choose three answers.) a. The interface is configured with the shutdown command. b. The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down. c. The show interfaces fa0/1 command will list the interface with two status codes of up and down. d. The interface cannot currently be used to forward frames. e. The interface can currently be used to forward frames.

a. The interface is configured with the shutdown command. b. The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down. d. The interface cannot currently be used to forward frames.

An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to tel- net to the branch office switches? (Choose three answers.) a. The ip address command in interface configuration mode b. The ip address command in global configuration mode c. The ip default-gateway command in VLAN configuration mode d. The ip default-gateway command in global configuration mode e. The password command in console line configuration mode f. The password command in vty line configuration mode

a. The ip address command in interface configuration mode d. The ip default-gateway command in global configuration mode f. The password command in vty line configuration mode

Switch SW1 uses its Gigabit 0/1 interface to connect to switch SW2's Gigabit 0/2 interface. SW2's Gi0/2 interface is configured with the speed 1000 and duplex full commands. SW1 uses all defaults for interface configuration commands on its Gi0/1 interface. Which of the following are true about the link after it comes up? (Choose two answers.) a. The link works at 1000 Mbps (1 Gbps). b. SW1 attempts to run at 10 Mbps because SW2 has effectively disabled IEEE standard autonegotiation. c. The link runs at 1 Gbps, but SW1 uses half-duplex and SW2 uses full duplex. d. Both switches use full duplex.

a. The link works at 1000 Mbps (1 Gbps). d. Both switches use full duplex.

Which of the following are true about IP address 192.168.6.7's IP network? (Choose two answers.) a. The network ID is 192.168.6.0. b. The network is a Class B network. c. The default mask for the network is 255.255.255.0. d. The number of host bits in the unsubnetted network is 16.

a. The network ID is 192.168.6.0. c. The default mask for the network is 255.255.255.0.

In what modes can you type the command 'show mac address-table' and expect to get a response with MAC table entries? (Choose two answers.) a. User mode b. Enable mode c. Global configuration mode d. Interface configuration mode

a. User mode b. Enable mode

A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An engineer gets into configuration mode and issues the vlan 22 command, followed by the name Hannahs-VLAN command. Which of the following are true? (Choose two answers.) a. VLAN 22 is listed in the output of the show vlan brief command. b. VLAN 22 is listed in the output of the show running-config command. c. VLAN 22 is not created by this process. d. VLAN 22 does not exist in that switch until at least one interface is assigned to that VLAN.

a. VLAN 22 is listed in the output of the show vlan brief command. b. VLAN 22 is listed in the output of the show running-config command.

Which of the following line subcommands tells a switch to wait until a show command's output has completed before displaying log messages on the screen? a. logging synchronous b. no ip domain-lookup c. exec-timeout 0 0 d. history size 15

a. logging synchronous

Imagine that you are told that switch 1 is configured with the dynamic auto param- eter for trunking on its Fa0/5 interface, which is connected to switch 2. You have to configure switch 2. Which of the following settings for trunking could allow trunking to work? (Choose two answers.) a. on b. dynamic auto c. dynamic desirable d. access e. None of the other answers are correct.

a. on c. dynamic desirable

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.255.240? a. /26 b. /28 c. /27 d. /30 e. /29

b. /28

Which of the following Ethernet standards support a maximum cable length of longer than 100 meters? (Choose two answers.) a. 100BASE-T b. 1000BASE-SX c. 1000BASE-T d. 1000BASE-LX

b. 1000BASE-SX d. 1000BASE-LX

Which of the following are not valid Class A network IDs? (Choose two answers.) a. 1.0.0.0 b. 130.0.0.0 c. 127.0.0.0 d. 9.0.0.0

b. 130.0.0.0 c. 127.0.0.0

Which of the following is a valid Class C IP address that can be assigned to a host? a. 1.1.1.1 b. 200.1.1.1 c. 128.128.128.128 d. 224.1.1.1

b. 200.1.1.1

Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /30? a. 255.255.255.192 b. 255.255.255.252 c. 255.255.255.240 d. 255.255.254.0 e. 255.255.255.0

b. 255.255.255.252

An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? (Choose two answers.) a. A username name secret password vty mode subcommand b. A username name secret password global configuration command c. A login local vty mode subcommand d. A transport input ssh global configuration command

b. A username name secret password global configuration command c. A login local vty mode subcommand

The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? a. Same-layer interaction b. Adjacent-layer interaction c. OSI model d. All of these answers are correct.

b. Adjacent-layer interaction

In a LAN, which of the following terms best equates to the term VLAN? a. Collision domain b. Broadcast domain c. Subnet d. Single switch e. Trunk

b. Broadcast domain

In the cabling for a leased line, which of the following typically connects to a four- wire line provided by a telco? a. Router serial interface without internal CSU/DSU b. CSU/DSU c. Router serial interface with internal transceiver d. Switch serial interface

b. CSU/DSU

Which of the following is true about the CSMA/CD algorithm? a. The algorithm never allows collisions to occur. b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. c. The algorithm works with only two devices on the same Ethernet. d. None of the other answers is correct.

b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover.

Which of the following Internet access technologies, used to connect a site to an ISP, offers asymmetric speeds? (Choose two answers.) a. Leased lines b. DSL c. Cable Internet d. BGP

b. DSL c. Cable Internet

Which of the following are true about the format of Ethernet addresses? (Choose three answers.) a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address. b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. c. Each manufacturer puts a unique OUI code into the first half of the address. d. The part of the address that holds this manufacturer's code is called the MAC. e. The part of the address that holds this manufacturer's code is called the OUI. f. The part of the address that holds this manufacturer's code has no specific name.

b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. c. Each manufacturer puts a unique OUI code into the first half of the address. e. The part of the address that holds this manufacturer's code is called the OUI.

In which of the following modes of the CLI could you type the command reload and expect the switch to reboot? a. User mode b. Enable mode c. Global configuration mode d. Interface configuration mode

b. Enable mode

Which of the following is required when configuring port security with sticky learning? a. Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand. b. Enabling port security with the switchport port-security interface subcommand. c. Defining the specific allowed MAC addresses using the switchport port-security mac-address interface subcommand. d. All the other answers list required commands.

b. Enabling port security with the switchport port-security interface subcommand.

A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows: interface range gigabitethernet 0/1 - 24 switchport mode access switchport port-security switchport port-security mac-address sticky Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.) a. Prevents unknown devices with unknown MAC addresses from sending data through the switch ports. b. If a user connects a switch to the cable, prevents multiple devices from sending data through the port. c. Will allow any one device to connect to each port, and will save that device's MAC address into the startup-config. d. Will allow any one device to connect to each port, but will not save that device's MAC address into the startup-config.

b. If a user connects a switch to the cable, prevents multiple devices from sending data through the port. d. Will allow any one device to connect to each port, but will not save that device's MAC address into the startup-config.

Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2? a. Inserts a 4-byte header and does change the MAC addresses b. Inserts a 4-byte header and does not change the MAC addresses c. Encapsulates the original frame behind an entirely new Ethernet header d. None of the other answers are correct

b. Inserts a 4-byte header and does not change the MAC addresses

Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It compares the VLAN ID to the bridging, or MAC address, table. d. It compares the destination IP address's ARP cache entry to the bridging, or MAC address, table.

b. It compares the unicast source address to the bridging, or MAC address, table.

A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/subnet. Which of the following answers list a workable combination for the number of network, subnet, and host bits? (Choose two answers.) a. Network = 16, subnet = 7, host = 7 b. Network = 16, subnet = 8, host = 8 c. Network = 16, subnet = 9, host = 7 d. Network = 8, subnet = 7, host = 17

b. Network = 16, subnet = 8, host = 8 c. Network = 16, subnet = 9, host = 7

Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? (Choose three answers.) a. PC and router b. PC and switch c. Hub and switch d. Router and hub e. Wireless access point (Ethernet port) and switch

b. PC and switch d. Router and hub e. Wireless access point (Ethernet port) and switch

Which of the following is true about Ethernet crossover cables for Fast Ethernet? a. Pins 1 and 2 are reversed on the other end of the cable. b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable. c. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable. d. The cable can be up to 1000 meters long to cross over between buildings. e. None of the other answers is correct.

b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.

Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? (Choose two answers.) a. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2. b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence. c. R1 will forward data-link frames to R2 using an HDLC header/trailer. d. R1 will forward data-link frames to R2 using an Ethernet header/trailer.

b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence. d. R1 will forward data-link frames to R2 using an Ethernet header/trailer.

Which of the following is a difference between Telnet and SSH as supported by a Cisco switch? a. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing. b. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing. c. Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems. d. Telnet encrypts only password exchanges; SSH encrypts all data exchanges.

b. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing.

The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? a. Data encapsulation b. Same-layer interaction c. Adjacent-layer interaction d. OSI model e. All of these answers are correct.

b. Same-layer interaction

In a two-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.) a. The design uses a full mesh of links between access and distribution switches b. The design uses a partial mesh of links between access and distribution switches c. The design uses a partial mesh of links between the distribution and core switches d. The end user and server devices connect directly to access layer switches

b. The design uses a partial mesh of links between access and distribution switches d. The end user and server devices connect directly to access layer switches

A network engineer spends time thinking about the entire Class B network 172.16.0.0, and how to subnet that network. He then chooses how to subnet this Class B net- work and creates an addressing and subnetting plan, on paper, showing his choices. If you compare his thoughts about this network before subnetting the network, to his thoughts about this network after mentally subnetting the network, which of the fol- lowing occurred to the parts of the structure of addresses in this network? a. The subnet part got smaller. b. The host part got smaller. c. The network part got smaller. d. The host part was removed. e. The network part was removed.

b. The host part got smaller.

Which of the following are true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? (Choose two answers.) a. The host always sends packets to its default gateway. b. The host sends packets to its default gateway if the destination IP address is in a different class of IP network than the host. c. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host. d. The host sends packets to its default gateway if the destination IP address is in the same subnet as the host.

b. The host sends packets to its default gateway if the destination IP address is in a different class of IP network than the host. c. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host.

A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch, and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.) a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode. b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 con- figuration mode. c. The ip default-gateway 172.16.2.254 command in global configuration mode. d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1.

b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 con- figuration mode. c. The ip default-gateway 172.16.2.254 command in global configuration mode.

Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the fol- lowing are typically assigned an IP address in the same subnet as host A? (Choose two answers.) a. The local router's WAN interface b. The local router's LAN interface c. All other hosts attached to the same switch d. Other hosts attached to the same switch and also in VLAN 1

b. The local router's LAN interface d. Other hosts attached to the same switch and also in VLAN 1

Which of the following are true about IP address 172.16.99.45's IP network? (Choose two answers.) a. The network ID is 172.0.0.0. b. The network is a Class B network. c. The default mask for the network is 255.255.255.0. d. The number of host bits in the unsubnetted network is 16.

b. The network is a Class B network. d. The number of host bits in the unsubnetted network is 16.

The show port-security interface f0/1 command lists a port status of secure-down. Which one of the following answers must be true about this interface at this time? a. The show interface status command lists the interface status as connected. b. The show interface status command lists the interface status as err-disabled. c. The show port-security interface command could list a mode of shutdown or restrict, but not protect. d. The show port-security interface command could list a violation counter value of 10.

b. The show interface status command lists the interface status as err-disabled.

In the following line taken from a show interfaces fa0/1 command, which of the fol- lowing are true about the interface? (Choose two answers.) Full-duplex, 100Mbps, media type is 10/100BaseTX a. The speed was definitely configured with the speed 100 interface subcommand. b. The speed might have been configured with the speed 100 interface subcommand. c. The duplex was definitely configured with the duplex full interface subcommand. d. The duplex might have been configured with the duplex full interface subcommand.

b. The speed might have been configured with the speed 100 interface d. The duplex might have been configured with the duplex full interface subcommand.

A switch's port Gi0/1 has been correctly enabled with port security. The configura- tion sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.) a. The switch puts the interface into an err-disabled state when the first frame arrives. b. The switch generates syslog messages about the violating traffic for the first frame. c. The switch increments the violation counter for Gi0/1 by 1. d. The switch discards both the first and second frame.

b. The switch generates syslog messages about the violating traffic for the first frame. c. The switch increments the violation counter for Gi0/1 by 1.

Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO standard HDLC? a. Flag b. Type c. Address d. FCS

b. Type

A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? (Choose two answers.) a. Using the exit command once b. Using the end command once c. Pressing the Ctrl+Z key sequence once d. Using the quit command

b. Using the end command once c. Pressing the Ctrl+Z key sequence once

Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? a. enable password b. enable secret c. Neither d. The password command, if it is configured

b. enable secret

Which of the following commands identify switch interfaces as being trunking inter- faces: interfaces that currently operate as VLAN trunks? (Choose two answers.) a. show interfaces b. show interfaces switchport c. show interfaces trunk d. show trunks

b. show interfaces switchport c. show interfaces trunk

Which of the following commands list the MAC address table entries for MAC addresses configured by port security? (Choose two answers.) a. show mac address-table dynamic b. show mac address-table c. show mac address-table static d. show mac address-table port-security

b. show mac address-table c. show mac address-table static

In the URI http://www.certskills.com/ICND1, which part identifies the web server? a. http b. www.certskills.com c. certskills.com d. http://www.certskills.com e. The file name.html includes the hostname.

b. www.certskills.com

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0? a. /19 b. /20 c. /23 d. /24 e. /25

c. /23

Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling? a. 10GBASE-T b. 100BASE-T c. 1000BASE-T d. None of the other answers is correct.

c. 1000BASE-T

Which of the following is an accurate speed at which a leased line can operate in the United States? a. 100 Mbps b. 100 Kbps c. 256 Kbps d. 6.4 Mbps

c. 256 Kbps

Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.) a. Burned-in address b. Unicast address c. Broadcast address d. Multicast address

c. Broadcast address d. Multicast address

A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information from some other server device? a. ARP b. ping c. DNS d. None of these answers is correct.

c. DNS

Which of the following does a router normally use when making a decision about routing TCP/IP packets? a. Destination MAC address b. Source MAC address c. Destination IP address d. Source IP address e. Destination MAC and IP addresses

c. Destination IP address

Working at the help desk, you receive a call and learn a user's PC IP address and mask (10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the follow- ing is true in this case? a. N=12 b. S=12 c. H=8 d. S=8 e. N=24

c. H=8

Fred has just added DSL service at his home, with a separate DSL modem and consumer-grade router with four Ethernet ports. Fred wants to use the same old phone he was using before the installation of DSL. Which is most likely true about the phone cabling and phone used with his new DSL installation? a. He uses the old phone, cabled to one of the router/switch device's Ethernet ports. b. He uses the old phone, cabled to the DSL modem's ports. c. He uses the old phone, cabled to an existing telephone port and not to any new device. d. The old phone must be replaced with a digital phone.

c. He uses the old phone, cabled to an existing telephone port and not to any new device.

Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.

Which of the following is true about the Ethernet FCS field? a. Ethernet uses FCS for error recovery. b. It is 2 bytes long. c. It resides in the Ethernet trailer, not the Ethernet header. d. It is used for encryption.

c. It resides in the Ethernet trailer, not the Ethernet header.

Which OSI layer defines the functions of logical network-wide addressing and routing? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4 e. Layer 5, 6, or 7

c. Layer 3

Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what happens between Fred's web browser and the web server? (Choose two answers.) a. Messages flowing toward the server use UDP destination port 80. b. Messages flowing from the server typically use RTP. c. Messages flowing to the client typically use a source TCP port number of 80. d. Messages flowing to the server typically use TCP.

c. Messages flowing to the client typically use a source TCP port number of 80. d. Messages flowing to the server typically use TCP.

Which of the following functions is performed by both TCP and UDP? a. Windowing b. Error recovery c. Multiplexing using port numbers d. Routing e. Encryption f. Ordered data transfer

c. Multiplexing using port numbers

A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the ten lowest numbered port, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the fol- lowing answers lists facts displayed by the show interfaces status command? a. Port Ethernet 0/1 is in a connected state. b. Port Fast Ethernet 0/11 is in a connected state. c. Port Fast Ethernet 0/5 is in a connected state. d. Port Ethernet 0/15 is in a notconnected state.

c. Port Fast Ethernet 0/5 is in a connected state.

What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3? (Choose two answers.) a. L3PDU b. Chunk c. Segment d. Packet e. Frame f. L4PDU

c. Segment f. L4PDU

Which answers describe a good practice in applying good troubleshooting method- ologies? (Choose two answers.) a. Perform problem isolation as fast as possible, including not slowing down to document your findings. b. The last step in a good troubleshooting process should be to take action to resolve the root cause of the problem. c. The last step in a good troubleshooting process should include monitoring the status to ensure that the problem is indeed solved and does not recur. d. Each worker should know and use the escalation process when they cannot resolve a particular problem.

c. The last step in a good troubleshooting process should include monitoring the status to ensure that the problem is indeed solved and does not recur. d. Each worker should know and use the escalation process when they cannot resolve a particular problem.

What is the assignable range of values for the first octet for Class A IP networks? a. 0 to 127 b. 0 to 126 c. 1 to 127 d. 1 to 126 e. 128 to 191 f. 128 to 192

d. 1 to 126

Which of the following is a network broadcast address? a. 10.1.255.255 b. 192.168.255.1 c. 224.1.1.255 d. 172.30.255.255

d. 172.30.255.255

Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use TCP/IP? a. 0 b. 1 c. 2 d. 3 e. You cannot tell from the information provided.

d. 3

PC1 and PC2 are on two different Ethernet LANs that are separated by an IP router. PC1's IP address is 10.1.1.1, and no subnetting is used. Which of the following addresses could be used for PC2? (Choose two answers.) a. 10.1.1.2 b. 10.2.2.2 c. 10.200.200.1 d. 9.1.1.1 e. 225.1.1.1 f. 1.1.1.1

d. 9.1.1.1 f. 1.1.1.1

Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers? a. Data b. Chunk c. Segment d. Frame e. Packet

d. Frame

Which of the following statements is true about classless IP addressing concepts? a. Uses a 128-bit IP address b. Applies only for Class A and B networks c. Separates IP addresses into network, subnet, and host parts d. Ignores Class A, B, and C network rules

d. Ignores Class A, B, and C network rules

When thinking about an IP address using classful addressing rules, an address can have three parts: network, subnet, and host. If you examined all the addresses in one subnet, in binary, which of the following answers correctly states which of the three parts of the addresses will be equal among all addresses? (Choose the best answer.) a. Network part only b. Subnet part only c. Host part only d. Network and subnet parts e. Subnet and host parts

d. Network and subnet parts

The show interfaces g0/1 switchport command on SW1 shows the trunking status on a link connected to switch SW2. Based on the output, which of the following must be true on SW2's port connected to this link? SW1# show interfaces gigabit0/1 switchport Name: Gi0/1 Switchport: Enabled Administrative Mode: trunk Operational Mode: trunk a. The operational state per show interfaces switchport must be "trunk." b. The administrative state per show interfaces switchport must be "trunk." c. SW2 must use the switchport mode trunk configuration command on G0/2, or the link will not use trunking. d. SW2 can use the switchport mode dynamic auto configuration command as one option to make the link use trunking.

d. SW2 can use the switchport mode dynamic auto configuration command as one option to make the link use trunking.

Which of the following header fields identify which TCP/IP application gets data received by the computer? (Choose two answers.) a. Ethernet Type b. SNAP Protocol Type c. IP Protocol d. TCP Port Number e. UDP Port Number

d. TCP Port Number e. UDP Port Number

Which one answer gives the strongest match between one part of a typical three-tier design with the idea behind the listed generic topology design term? a. The access layer looks like a partial mesh. b. The distribution layer looks like a full mesh. c. The distribution layer looks like a hybrid design. d. The access layer looks like a star design.

d. The access layer looks like a star design.

Why does the formula for the number of hosts per subnet (2^H - 2) require the sub- traction of two hosts? a. To reserve two addresses for redundant default gateways (routers) b. To reserve the two addresses required for DHCP operation c. To reserve addresses for the subnet ID and default gateway (router) d. To reserve addresses for the subnet broadcast address and subnet ID

d. To reserve addresses for the subnet broadcast address and subnet ID

Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP

d. UDP f. TCP

Which of the following are not valid Class B network IDs? a. 130.0.0.0 b. 191.255.0.0 c. 128.0.0.0 d. 150.255.0.0 e. All are valid Class B network IDs.

e. All are valid Class B network IDs.

In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5? a. User mode b. Enable mode c. Global configuration mode d. VLAN mode e. Interface configuration mode

e. Interface configuration mode

Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? a. Configure the negotiate disable interface subcommand b. Configure the no negotiate interface subcommand c. Configure the speed 100 interface subcommand d. Configure the duplex half interface subcommand e. Configure the duplex full interface subcommand f. Configure the speed 100 and duplex full interface subcommands

f. Configure the speed 100 and duplex full interface subcommands

What command copies the configuration from RAM into NVRAM? a. copy running-config tftp b. copy tftp running-config c. copy running-config start-up-config d. copy start-up-config running-config e. copy startup-config running-config f. copy running-config startup-config

f. copy running-config startup-config


संबंधित स्टडी सेट्स

T/F: Body Planes, Directions and Cavities

View Set

Advanced Skills For Healthcare Providers Final Review Chapter 1-17

View Set

Mental Health Exam 2 Recommended NCLEX Qs.

View Set

unit 11 testing and individual differences

View Set