ICND1 Exam Practice Review - (Cisco 1 & 2)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements? 9 subnets of 126 hosts with a 255.255.255.128 mask 3 subnets of 126 hosts with a 255.255.255.128 mask & 6 subnets of 30 hosts with a 255.255.255.224 mask 3 subnets of 126 hosts with a 255.255.255.192 mask & 6 subnets of 30 hosts with a 255.255.255.240 mask 1 subnet of 126 hosts with a 255.255.255.192 mask & 2 subnets of 80 hosts with a 255.255.255.224 mask & 6 subnets of 30 hosts with a 255.255.255.240 mask

3 subnets of 126 hosts with a 255.255.255.128 mask & 6 subnets of 30 hosts with a 255.255.255.224 mask

How many /30 subnets can be created from one /27 subnet? 2 4 6 8

8

How many /30 subnets can be created from one /27 subnet? 2 4 6 8

8

Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.) B = 209.165.201.7 A = 10.1.0.13 B = 10.0.254.5 B = 209.165.201.1 A = 209.165.201.2

A = 10.1.0.13 B = 10.0.254.5

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor? RTP TCP CDP UDP

CDP

What is the purpose of using SSH to connect to a router? It allows a router to be configured using a graphical interface. It allows a secure remote connection to the router command line interface. It allows the router to be monitored through a network management application. It allows secure transfer of the IOS software image from an unsecure workstation or server.

It allows a secure remote connection to the router command line interface.

What are two common TCP applications? (Choose two.) TFTP SMTP SNMP FTP DNS

SMTP FTP

What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.) Static routing is more scalable. Static routing is easier to maintain in large networks. Static routing uses less router processing and bandwidth. Static routing is more secure. Static routing does not require complete knowledge of the whole network.

Static routing uses less router processing and bandwidth. Static routing is more secure.

Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output. There is a native VLAN mismatch between the switches. There is no media connected to the interfaces. They are administratively shut down. They are configured as trunk interfaces

They are configured as trunk interfaces

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? FastEthernet0/1 VLAN 1 vty 0 console 0

VLAN 1

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? vty 0 FastEthernet0/1 VLAN 1 console 0

VLAN 1

Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.) damaged cable connector using the incorrect cable type native VLAN mismatch a malfunctioning NIC excessive collisions incorrectly configured auto-MDIX feature

a malfunctioning NIC excessive collisions

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router a worm that is attempting to access another part of the network an unidentified individual who is trying to access the network equipment room a device that is trying to inspect the traffic on a link

a user who is trying to guess a password to access the router

Which address type is not supported by IPv6 multicast private unicast broadcast

broadcast

Which address type is not supported in IPv6? private multicast unicast broadcast

broadcast

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) layer 3 support port security redundant components VLANs PoE

port security VLANs

Which device connects a local LAN to a geographically separate network? switch hub router bridge

router

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices? show ip route show interfaces show version show cdp neighbors detail

show cdp neighbors detail

When port security is enabled, a switch port uses the default violation mode of ______ until specifically configured to use a different violation mode.

shutdown

A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet 10.10.250.1 10.10.249.1 10.10.248.17 10.10.255.17

10.10.249.1

Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet? 198.51.100.3 10.6.15.2 209.165.200.225 209.165.202.141

10.6.15.2

Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.) 128.107.0.0/16 192.168.1.0/24 64.100.0.0/16 192.168.2.0/24 172.16.40.0/24 10.0.0.0/8

192.168.2.0/24 10.0.0.0/8

What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001? 2001:0:abcd::1 2001:0:0:abcd::1 2001::abcd::1 2001:0000:abcd::1 2001::abcd:0:1

2001:0:0:abcd::1

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52? 2001:db8:0:f00::/52 2001:db8:0:8000::/52 2001:db8:0:f::/52 2001:db8:0:f000::/52

2001:db8:0:f000::/52

Which address prefix range is reserved for IPv4 multicast? 224.0.0.0 - 239.255.255.255 240.0.0.0 - 254.255.255.255 169.254.0.0 - 169.25.255.255 127.0.0.0- 127.255.255.255

224.0.0.0 - 239.255.255.255

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements 9 subnets of 126 hosts with a 255.255.255.128 mask 3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask 3 subnets of 126 hosts with a 255.255.255.192 mask 6 subnets of 30 hosts with a 255.255.255.240 mask 1 subnet of 126 hosts with a 255.255.255.192 mask 2 subnets of 80 hosts with a 255.255.255.224 mask 6 subnets of 30 hosts with a 255.255.255.240 mask

3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask

Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement? 5 deny 172.23.16.0 0.0.15.255 5 deny 172.23.16.0 0.0.255.255 15 deny 172.23.16.0 0.0.15.255 30 deny 172.23.16.0 0.0.15.25

5 deny 172.23.16.0 0.0.15.255

What is the purpose of setting the native VLAN separate from data VLANs? The native VLAN is for routers and switches to exchange their management information, so it should be different from data VLANs. A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs. The security of management frames that are carried in the native VLAN can be enhanced. The native VLAN is for carrying VLAN management traffic only.

A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs.*

What type of installation is needed to view syslog messages? A syslog client must be installed on a workstation. Because any network equipment can interpret syslog messages, nothing special is needed to view them. A syslog server must be installed on a router. A syslog server must be installed on a workstation.

A syslog server must be installed on a workstation.

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server? HTTP DNS DHCP RARP ARP

ARP

What are three characteristics of the CSMA/CD process? (Choose three.) The device with the electronic token is the only one that can transmit after a collision. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium. Devices can be configured with a higher transmission priority. A device listens and waits until the media is not busy before transmitting. A jam signal indicates that the collision has cleared and the media is not busy.

After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium. A device listens and waits until the media is not busy before transmitting.

16. Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts? Single location Any cast Link-local Global unicast

Any cast

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts? Single location Any cast Link-local Global unicast

Any cast

What effect does the default-information originate command have on a Cisco router that is configured for RIP? Any dynamic route that is learned from a neighboring router will propagate to other adjacent routers. Any default static route that is configured on the router will propagate to other adjacent routers. Any static route that is learned from a neighboring router will propagate to other adjacent routers. Any routes that are learned from a neighboring router will propagate to other adjacent routers.

Any default static route that is configured on the router will propagate to other adjacent routers.

What effect does the default-information originate command have on a Cisco router that is configured for RIP? Any dynamic route that is learned from a neighboring router will propagate to other adjacent routers. Any default static route that is configured on the router will propagate to other adjacent routers. Any static route that is learned from a neighboring router will propagate to other adjacent routers. Any routes that are learned from a neighboring router will propagate to other adjacent routers.

Any default static route that is configured on the router will propagate to other adjacent routers.

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.) Application Data Link Transport Session Presentation network

Application, Session, Presentation

Which statements accurately describe CDP? (Choose three.) CDP is an IEEE standard protocol. CDP is a Cisco proprietary protocol. CDP is a datalink layer protocol. CDP is a network layer protocol. CDP can discover directly connected neighboring Cisco devices. CDP can discover Cisco devices that are not directly connected.

CDP is a Cisco proprietary protocol. CDP is a datalink layer protocol. CDP can discover directly connected neighboring Cisco devices.

A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router Configure it as a trunk port and allow only untagged traffic. Configure the port as an access port and a member of VLAN1. Configure the port as an 802.1q trunk port. Configure the port as a trunk port and assign it to VLAN1.

Configure the port as an 802.1q trunk port.

A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router? Configure the port as an access port and a member of VLAN1. Configure the port as an 802.1q trunk port. Configure the port as a trunk port and assign it to VLAN1. Configure it as a trunk port and allow only untagged traffic.

Configure the port as an 802.1q trunk port.

Refer to the exhibit. A network administrator issues the show lldp neighbors command to display information about neighboring devices. What can be determined based on the information? Device C1 is a switch. Device A1 is connected to the port Fa0/5 on device B1. Device C1 is a switch. Device B1 is a WLAN access point. Device C1 is connected to device B1 through the port Fa0/3

Device C1 is a switch.

What is the purpose of deploying dual stack devices? Dual stack allows companies to migrate to IPv6 over time. It provides globally unique IPv6 addresses to end devices. It permits multiple devices to share a single IPv6 address. It creates redundancy in the network by eliminating a single point of failure.

Dual stack allows companies to migrate to IPv6 over time.

How will a router handle static routing differently if Cisco Express Forwarding is disabled Static routes that use an exit interface will be unnecessary. Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies. It will not perform recursive lookups. Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

How will a router handle static routing differently if Cisco Express Forwarding is disabled? It will not perform recursive lookups. Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies. Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies. Static routes that use an exit interface will be unnecessary.

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

How will a router handle static routing differently if Cisco Express Forwarding is disabled? Static routes that use an exit interface will be unnecessary. Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies. It will not perform recursive lookups. Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Which IPv6 prefix is reserved for communication between devices on the same link? 2001::/32 FC00::/7 FDFF::/7 FE80::/10

FE80::/10

Refer to the exhibit. A network technician issues the command show vlan to verify the VLAN configuration. Based on the output, which port should be assigned with native VLAN? Fa0/12 Gig0/1 Fa0/24 Fa0/20

Fa0/20

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? Host A sends an ARP request to the MAC address of host D. Host D responds with its IP address. Host D sends an ARP request to host A. Host A responds with its MAC address. Host A sends out the packet to the switch. The switch adds the MAC address for host D to the frame and forwards it to the network. Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

Which two characteristics apply to Layer 2 switches? (Choose two.) Increases the number of collision domains Decreases the number of collision domains Implements VLAN Decreases the number of broadcast domains Uses the IP address to make decisions for forwarding data packets

Increases the number of collision domains Implements VLAN

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation? Reboot the switch. Issue the no switchport port-security violation shutdown command on the interface. Issue the no switchport port-security command, then re-enable port security. Issue the no shutdown command on the interface.

Issue the no shutdown command on the interface.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command? It allows many inside hosts to share one or a few inside global addresses. It allows a pool of inside global addresses to be used by internal hosts. It allows external hosts to initiate sessions with internal hosts. It allows a list of internal hosts to communicate with a specific group of external hosts.

It allows many inside hosts to share one or a few inside global addresses.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command? It allows many inside hosts to share one or a few inside global addresses. It allows a pool of inside global addresses to be used by internal hosts. It allows external hosts to initiate sessions with internal hosts. It allows a list of internal hosts to communicate with a specific group of external hosts.

It allows many inside hosts to share one or a few inside global addresses.

Which statement describes the Cisco License Manager? It is a free, standalone software application for deploying Cisco software licenses across the network. It is a web-based portal for getting and registering individual software licenses. It is a centralized TFTP server that enables control of the number and revision level of Cisco IOS images. It is an organized collection of processes and components used to activate Cisco IOS software feature sets by obtaining and validating Cisco software licenses.

It is a free, standalone software application for deploying Cisco software licenses across the network.

Which statement describes the Cisco License Manager? It is a free, standalone software application for deploying Cisco software licenses across the network. It is a web-based portal for getting and registering individual software licenses. It is a centralized TFTP server that enables control of the number and revision level of Cisco IOS images. It is an organized collection of processes and components used to activate Cisco IOS software feature sets by obtaining and validating Cisco software licenses.

It is a free, standalone software application for deploying Cisco software licenses across the network.

Which two devices allow hosts on different VLANs to communicate with each other (Choose two.) Layer 3 switch repeater router hub Layer 2 switch

Layer 3 switch router

Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.) R1(config-if)# ip helper-address 10.2.0.250 R1(config)# interface G0/1 R1(config)# interface G0/0 R2(config-if)# ip helper-address 10.2.0.250 R2(config)# interface G0/0 R1(config-if)# ip helper-address 10.1.0.254

R1(config)# interface G0/0 R1(config-if)# ip helper-address 10.2.0.250*

A network administrator has enabled single-area OSPFv3 on a router via the ipv6 router ospf 100 command. Which command will enable this OSPFv3 process on an interface of that router? R1(config-router)# network 192.168.10.0 0.0.0.255 area 0 R1(config-if)# ipv6 ospf 0 area 100 R1(config-if)# ipv6 ospf 100 area 0 R1(config-router)# network 192.168.10.0 0.0.0.255 area 100

R1(config-if)# ipv6 ospf 100 area 0

A network administrator has recently implemented OSPFv2 across the entire network topology. Which command can be implemented to prevent the forwarding of OSPF messages to Layer 2 switches and hosts on interface Fast Ethernet 0/1, while maintaining network connectivity? R1(config-if)# no ipv6 ospf 10 R1(config-if)# no cdp enable R1(config-if)# no cdp run R1(config-router)# passive-interface FastEthernet 0/1

R1(config-router)# passive-interface FastEthernet 0/1

After a license has been purchased and installed, what is the next step that is required before it is activated? Copy the running configuration to flash. Reboot the router. Issue the license boot module technology-package command. Copy the running configuration to NVRAM.

Reboot the router.

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2 (Choose two.) Router R1 is the master, and R2 is the client. The IP address of R2 is 192.168.1.2. The IP address of R1 is 192.168.1.2. Both routers are configured to use NTPv2. Router R2 is the master, and R1 is the client.

Router R1 is the master, and R2 is the client. The IP address of R2 is 192.168.1.2. The IP address of R1 is 192.168.1.2.

Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two) Router R1 will de-encapsulate the packet and encapsulate it in a PPP frame. Router R1 will forward the packet out Gig0/1. Router R1 will forward the packet out Gig0/0. Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame. Router R1 will forward the packet out S0/0/0.

Router R1 will forward the packet out Gig0/1. Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame.

To what type of port would a cable with a DB-60 connector attach? Serial port Console port Ethernet port Fibre optic port

Serial port

A network technician is configuring port security on a LAN switch interface. The security policy requires host MAC addresses to be learned dynamically, stored in the address table, and saved to the switch running configuration. Which command does the technician need to add to the following configuration to implement this policy? Switch(config)# interface fa0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 40 Switch(config-if)# switchport port-security mac-address Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security mac-address 000B.FCFF.E880

Switch(config-if)# switchport port-security mac-address sticky

A network technician is configuring port security on a LAN switch interface. The security policy requires host MAC addresses to be learned dynamically, stored in the address table, and saved to the switch running configuration. Which command does the technician need to add to the following configuration to implement this policy? Switch(config)# interface fa0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport portsecurity Switch(config-if)# switchport port-security maximum 40 Switch(config-if)# switchport port-security macaddress Switch(config-if)# switchport port-security macaddress sticky Switch(config-if)# switchport port-security macaddress 000B.FCFF.E880

Switch(config-if)# switchport port-security macaddress sticky

An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.) TFTP server IP address name of the configuration file that is currently stored on the router router IP address configuration register value name of the configuration file that is stored on the TFTP server The name of the configuration file that is currently stored on the TFTP server The name of the configuration file that is currently stored on the router

TFTP server IP address name of the configuration file that is stored on the TFTP server

Refer to the exhibit. What would happen after the IT administrator enters the new static route? The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route. The 172.16.1.0 static route is added to the existing routes in the routing table. The 172.16.1.0 static route would be entered into the running-config but not shown in the routing table. The 0.0.0.0 default route would be replaced with the 172.16.1.0 static route.

The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.

What will be the result of adding the command ip dhcp excluded-address 172.16.4.1 172.16.4.5 to the configuration of a local router that has been configured as a DHCP server? Traffic that is destined for 172.16.4.1 and 172.16.4.5 will be dropped by the router. Traffic will not be routed from clients with addresses between 172.16.4.1 and 172.16.4.5. The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive. The router will ignore all traffic that comes from the DHCP servers with addresses 172.16.4.1 and 172.16.4.5.

The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive.

What is the purpose of the SVI on a Cisco switch? The SVI provides a physical interface for remote access to the switch. The SVI provides a faster method for switching traffic between ports on the switch. The SVI adds Layer 4 connectivity between VLANs. The SVI provides a virtual interface for remote access to the switch.

The SVI provides a virtual interface for remote access to the switch.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. UDP segments are encapsulated within IP packets for transport across the network. The source port field identifies the running application or service that will handle data returning to the PC. The TCP source port number identifies the sending host on the network. The TCP process running on the PC randomly selects the destination port when establishing a session with the server.

The UDP destination port number identifies the application or service on the server which will handle the data. UDP segments are encapsulated within IP packets for transport across the network. The source port field identifies the running application or service that will handle data returning to the PC.

Which three statements describe a DHCP Discover message? (Choose three.) The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). The destination IP address is 255.255.255.255. The message comes from a server offering an IP address. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies. Only the DHCP server receives the message.

The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.

Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table? The route was automatically installed when an IP address was configured on an active interface. The route was dynamically created by router R1. The route was manually entered by an administrator. The route was dynamically learned from another router.

The route was manually entered by an administrator.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation (Choose three.) TCP is the preferred protocol when a function requires lower network overhead. The source port field identifies the running application or service that will handle data returning to the PC. The UDP destination port number identifies the application or service on the server which will handle the data. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The TCP source port number identifies the sending host on the network.

The source port field identifies the running application or service that will handle data returning to the PC. The UDP destination port number identifies the application or service on the server which will handle the data. UDP segments are encapsulated within IP packets for transport across the network.

Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem? The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.​ The access interfaces do not have IP addresses and each should be configured with an IP address. The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface. The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.​

The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.

Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.) Only traffic that originates from the GigabitEthernet 0/1 interface will be monitored. The syslog messages will contain the IP address the GigabitEthernet 0/1 interface. Messages that are sent to the syslog server will be limited to levels 3 or lower. Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address. For multiple occurrences of the same error, only the first three messages will be sent to the server. Messages that are sent to the syslog server will be limited to levels 3 and higher.

The syslog messages will contain the IP address the GigabitEthernet 0/1 interface. Messages that are sent to the syslog server will be limited to levels 3 or lower. Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address.

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? The workstation NIC has malfunctioned. The subnet mask was configured incorrectly. The DNS server IP address needs to be configured. The workstation is unable to obtain an IP address from a DHCP server.

The workstation is unable to obtain an IP address from a DHCP server.

28. Which three statements characterize UDP (Choose three.) UDP provides sophisticated flow control mechanisms. UDP relies on IP for error detection and recovery. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP provides connection-oriented, fast transport of data at Layer 3.

UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection.

Which three statements characterize UDP (Choose three.) UDP provides sophisticated flow control mechanisms. UDP relies on IP for error detection and recovery. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP provides connection-oriented, fast transport of data at Layer 3.

UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection.

Which WAN connectivity method would be used in a remote location where there are no service provider networks? WiMax cable VPN VSAT

VSAT

Which layer of the OSI model handles the process of identifying and discarding damaged frames? presentation session transport network data link physical

data link

Which combination of DTP modes will form a link to allow multiple VLANs? dynamic auto-dynamic auto dynamic auto-dynamic desirable trunk-access access-access

dynamic auto-dynamic desirable

Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1? forward the packet out GigabitEthernet0/1 drop the packet forward the packet out Serial0/0/0 forward the packet out GigabitEthernet0/0

forward the packet out Serial0/0/0

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route route source next-hop outgoing interface gateway of last resort

gateway of last resort

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? next-hop gateway of last resort route source outgoing interface

gateway of last resort

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? route source next-hop outgoing interface gateway of last resort

gateway of last resort

Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails? ip route 172.16.1.0 255.255.255.0 s0/0/0 ip route 172.16.1.0 255.255.255.0 s0/0/0 111 ip route 172.16.1.0 255.255.255.0 s0/0/0 91 ip route 172.16.1.0 255.255.255.0 s0/0/0 121

ip route 172.16.1.0 255.255.255.0 s0/0/0 121

Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port? PC0, PC1, and PC2 MAC addresses just the PC1 MAC address just PC0 and PC1 MAC addresses just the PC2 MAC address​ just the PC0 MAC address

just PC0 and PC1 MAC addresses

Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B origin: af:3:c:dc:4c:55:66, destination: a0:4c:51:21:33:77, origin 172.16.1.10, destination: 172.16.2.10

origin: af:3:c:dc:4c:55:66, destination: a0:4c:51:21:33:77, origin 172.16.1.10, destination: 172.16.2.10

Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet? permit 192.168.8.0 0.0.3.255 permit 192.168.0.0 0.0.15.255 permit 192.168.8.0 255.255.248.0 permit 192.168.8.0 0.0.7.255

permit 192.168.8.0 0.0.3.255

When port security is enabled, a switch port uses the default violation mode of __________ until specifically configured to use a different violation mode.

shutdown

What information can be verified through the show ip dhcp binding command? that DHCPv4 discover messages are still being received by the DHCP server the number of IP addresses remaining in the DHCP pool the IPv4 addresses that are assigned to hosts by the DHCP server the IPv4 addresses that have been excluded from the DHCPv4 pool

the IPv4 addresses that are assigned to hosts by the DHCP server

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the MAC address of the default gateway the network domain of the destination host the IP address of the default gateway the MAC address of the destination host

the MAC address of the default gateway

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.) the configuration register value the NVRAM file system system ROM the system image file the startup configuration file

the configuration register value the startup configuration file

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.) the configuration register value the NVRAM file system system ROM the system image file the startup configuration file

the configuration register value the startup configuration file

What is defined by the ip nat pool command when configuring dynamic NAT? the pool of global address the range of external IP addresses that internal hosts are permitted to access the pool of available NAT servers the range of internal IP addresses that are translated

the pool of global address

What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.) system ROM the startup configuration file the system image file the configuration register value the NVRAM file system

the startup configuration file the configuration register value

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified when CEF is enabled when the static route is a default route when the next hop is a link-local address when the exit interface is a point-to-point interface

when the next hop is a link-local address

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified ___________. when CEF is enabled when the static route is a default route when the next hop is a link-local address when the exit interface is a point-to-point interface

when the next hop is a link-local address

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified? when CEF is enabled when the static route is a default route when the next hop is a link-local address when the exit interface is a point-to-point interface

when the next hop is a link-local address


संबंधित स्टडी सेट्स

Econ 111A Accounting MC Practice Problems

View Set

EESC 101 Chapter 3: Earth Systems & Ecosystems

View Set