NWC401
Consider the following range of addresses:2001:0DB8:BC15:0600:0000:: to 2001:0DB8:BC15:0FFF:0000::The prefix for the range of addresses is "_______".
/52
What two IPv6 prefixes are valid when nibble aligned subnet masks are used
/64/68
Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the site subsection to represent multiple geographical sites of the company, the sub-site section to represent multiple campuses at each site, and the subnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achieved per sub-site?
16
The network portion of the address 172.16.30.5/16 is "_______".
172.16
Which of the following is the valid host range for the subnet on which the IP addess 192.168.1.100 255.255.255.192 resides?
192.168.1.65-126
An Internet browser works at which of the following OSI layers
Application
What layer of cloud computing have?
Client, application, platform, infrastucture, server
Which of the following is true for coaxial cables?
Coaxial cables provide effective protection against EMI during data transmissions.
Which cable connects the followinng? Workstation to Workstation, Switch to Switch and Router to PC?
Crossover
Where is a switch can specified in the OSI model?
Data Link(mostly) + Network
Which of the following is a classful routing protocol?
IGRP
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
RM-3-Switch-2A4\SwBranch799
A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?
The PC was preconfigured to use DHCP
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
ToS field
Which interface is the default SVI on a Cisco switch?
VLAN 1
Which of the following is standard ip ACL?
access list 50 deny 192.168.1.1 0.0.0.255
1. A computer device manufacturer owns four buildings in downtown Raleigh, North Carolina, and the LANs in each building are connected together for integrated communications and resource sharing. This type of network is an example of which of the following? a. LAN-NET b. TAN c. CAN d. WAN e. none of the above
c. CAN
What is the main reason that a network administrator would use VLSM?
efficient use of address space
Which command or key combination allows a user to return to the previous level in the command hierarchy?
exit
What is the maximum hop count for RIP?
15
An IPv6 address block with a /48 prefix has a/an "________" bit field for the subnet ID.
16
What is the difference between virus and worm in computer?
A worm spreads, but a virus doesn't spread.
What is the name of the SPF algorithm link-state routing protocols apply?
Dijkstra's Algorithm
What is an advantage of subnetting a network?
It contains broadcast traffic within its subnet.
What protocol does IPv6 use to discover the physical addresses of nodes on a network?
Neighbor Discovery (ND) Protocol
Beaconing occurs on which type of network
Token Ring
____ is the ability to subnet a subnet and use different subnet masks with the same classful network
VLSM
Ip address 192.168.1.15/29 is represent?
broadcast address
What piece of hardware is usually at the centre of a star network?
hub
You are given the IP Address of 193.103.20.0 /24 and need 50 Subnets. How many hosts per network, and total networks do you get once subnetted.
2 Hosts and 64 Subnets
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?
255.255.255.224
Your network needs 2^8 host identifiers for 256 nodes. Which of the following formulas help you calculate the number of bits needed for the network identifier?
32 - 8 = 24
How many host addresses are available on the 192.168.10.128/26 network?
62
Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?
802.11n
Which of the following is an IEEE standard for Ethernet?
802.3
In IPv4 we have the loopback address of 127.0.0.1 where as in IPv6 we have ____ as loopback addess.
::1 or 0:0:0:0:0:0:0:1
OSPF routes packets within a single
Autonomous System (AS)
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
Which of the following is true about the core layer?
It's the backbone of the network.
Which cable is used to configure a router by connecting to the serial port of a computer?
Rollover
Which of these commands can allow you enable the OSPF in Cisco router?
Router(config-router)# network 10.1.1.1 0.0.0.255 area 0 + Router(config)# Router ospf 1
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSH
If a computer in a star network fails, the network will?
Still work un affected
What are two characteristics of RAM on a Cisco device? (Choose two.)
The configuration that is actively running on the device is stored in RAM.\The contents of RAM are lost during a power cycle.
Which of the following is true of signature based IpSes?
They scan network traffic or packets to identify matches with attack-definition files.
What protocol does dns use at the transport layer?
UDP
Which protocol should be used for an audio streaming server, where some loss is acceptable?
UDP
Which one of the following is true regarding VLANs?
VTP is used to send VLAN information to switches in a configured VTP domain.
5. Your company's network segment that is used by the Research Department experiences many broadcasts from various devices. What can you, as network administrator, do to control the broadcasts so that they are not sent to other network segments? a. Configure the router that connects the Research Department segment so that broadcasts are not forwarded to other network segments. b. Configure the Research Department devices so that broadcasts are sent only using the 272.0.0.0 IPv4 address so that they are ignored by workstations. c. Configure the devices to send broadcasts to a DNS server and configure a pointer record at the DNS server to drop the broadcasts. d. Configure the devices to use only IPv4 instead of IPv6, because IPv4 does not support broadcasts
a. Configure the router that connects the Research Department segment so that broadcasts are not forwarded to other network segments.
4. What advice might a new network designer receive when just starting out? (Choose all that apply.) a. Learn how networks work in terms of protocols, access methods, and topologies. b. Avoid the risks of implementing fault tolerance. c. Start with the safe mesh design in which information is continuously sent around the network ensuring that if a computer misses it the first time there are many other chances to obtain the same information without data loss. d. Understand the physical equipment used in LANs and WANs.
a. Learn how networks work in terms of protocols, access methods, and topologies. d. Understand the physical equipment used in LANs and WANs.
12. Which of the following are examples of network nodes? (Choose all that apply.) a. a computer attached to a network b. a DVD/CD-ROM array attached to a server c. a printer attached to a network computer d. a network switch
a. a computer attached to a network d. a network switch
5. Which of the following are reasons why you might have a network in your home of two adults and three teenagers? (Choose all that apply.) a. accessing the Internet b. sharing a printer c. accessing entertainment resources, such as streaming movies d. sharing files between computers
a. accessing the Internet b. sharing a printer c. accessing entertainment resources, such as streaming movies
7. A large company has many computer resources including computers, servers, mainframes, network devices, computer development labs, computer databases, shared disk arrays, and so on. This is an example of which of the following? a. an enterprise network b. an extended client network c. a radiating network d. network concentration
a. an enterprise network
1. Which of the following are properties of a LAN protocol? (Choose all that apply.) a. handles source and destination node addressing b. follows standards, such as the IEEE 802 standards c. has the ability to transport data in 8 GB packets or larger for network efficiency d. enables reliable network links
a. handles source and destination node addressing b. follows standards, such as the IEEE 802 standards d. enables reliable network links
15. High-speed WANs that use the ring topology may use which of the following? a. two loops for redundant data transmission b. ring connectors that work like terminators c. baseband optics d. overflow NICs to regulate the speed of transmission
a. two loops for redundant data transmission
Which of the following is allow only traffic from 185.64.0.0 to enter interface s0?
access-list 25 permit 185.64.0.0 255.255.0.0 int s0: ip access-group in
16. You are researching the possible benefits of a LAN for an advertising firm. Which of the following are benefits that you might include in your report to the firm's partners? (Choose all that apply.) a. A LAN would enable the firm to use a DVD/CD-ROM array for sharing commonly accessed DVDs and CDs. b. A LAN would eliminate the need for laptop computers (plus laptop computers are not compatible with LAN communications). c. Printer expenditures could be reduced. d. Centralized backups of client files would be possible.
b. A LAN would eliminate the need for laptop computers (plus laptop computers are not compatible with LAN communications). d. Centralized backups of client files would be possible.
2. Which of the following are ways to share a printer among computer users? (Choose all that apply.) a. Create a joint area network. b. Connect the printer to a Windows 7 workstation and share it on a network. c. Purchase a printer that has a built-in NIC. d. Use a print server device that connects to a network.
b. Connect the printer to a Windows 7 workstation and share it on a network. c. Purchase a printer that has a built-in NIC. d. Use a print server device that connects to a network.
20. Internet Connection Sharing (ICS) in Windows 7 and Windows Server 2008 R2 can be configured through which of the following? a. Network Control icon in the taskbar b. Network and Sharing Center c. Wide Network Configuration option from the Start button d. Office Features menu
b. Network and Sharing Center
3. Since it has lower overhead, why is UDP not used for all communications along with IP? a. Unlike TCP, UDP is chatty. b. TCP has a higher level of reliability for times when important data is transmitted. c. UDP is only supported for WAN communications. d. UDP does not work with IPv6.
b. TCP has a higher level of reliability for times when important data is transmitted.
17. Your company in New York City wants to open a branch office in Richmond, Virginia, and connect the branch office through the Internet. What type of network should be considered for enhanced security? a. a closed transmission network b. a VPN c. a top-down security network d. a star-secure network e. none of the above
b. a VPN
3. A bus topology must have which of the following at each end of the bus? (Choose all that apply.) a. a router junction b. a terminator c. a capacitor d. an amplification connector
b. a terminator
6. In your new building, the contractor is including secure wiring closets, cable, and cable pathways installed in the building as well as backbone cabling into a specialized server room. All of this cabling is part of the __________. a. network data zone b. cable plant c. traffic zone d. throughput byway
b. cable plant
19. You are setting up a network for your small business of four employees, each of whom has a computer and needs to periodically share files with other employees. Instead of having a server, the files are shared through each computer's operating system. This is an example of a(n) __________ network. a. equality b. peer-to-peer c. jelly-based d. open
b. peer-to-peer
18. Which of the following devices might be used to connect computers in a star topology? (Choose all that apply.) a. conjunction box b. switch c. terminator d. router
b. switch d. router
4. The subnet mask is used for which of the following? (Choose all that apply.) a. to disguise servers so they appear to be workstations b. to create subnetworks c. to bridge AppleTalk with TCP/IP d. to show the class of addressing
b. to create subnetworks d. to show the class of addressing
10. Assume you have been hired to design a network for a bank. When you determine the factors that affect the network design, you should look at which of the following? (Choose all that apply.) a. software applications to be used b. work patterns in the bank c. the computers and operating systems to be connected to the network d. the security required by the bank and bank regulators
b. work patterns in the bank c. the computers and operating systems to be connected to the network d. the security required by the bank and bank regulators
What does the IP address 192.168.1.15/29 represent?
broadcast address
Which of the following network topologies contains a backbone which runs the length of the network?
bus
How is a collision determined on an Ethernet network
by signal strength
2. The workstation used by the marketing director in your company has been successfully hacked through the open Telnet port, even though she does not use Telnet. What step should be taken to thwart future attacks? a. Close all TCP ports. b. Reduce the Telnet port's bandwidth. c. Close TCP and UDP port 23. d. Configure Telnet so that it cannot be used in the background mode.
c. Close TCP and UDP port 23.
13. When you design a network that has a bus or star-bus hybrid design, what organization's specifications should you check to make sure you follow the bus segment length requirements? a. Microsoft b. Red Hat c. Institute of Electrical and Electronics Engineers d. National Electrical Contractors Association
c. Institute of Electrical and Electronics Engineers
8. Which of the following are disadvantages of the traditional bus topology? (Choose all that apply.) a. It cannot be connected to the Internet. b. It allows only for a maximum of 16 computers per bus. c. It is subject to network congestion, requiring additional network devices to control traffic flow. d. One defective node or cable segment can take down a network.
c. It is subject to network congestion, requiring additional network devices to control traffic flow. d. One defective node or cable segment can take down a network.
9. Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread throughout a city. You want to tell the company president that this WAN will use a design for maximum uptime to all locations. Which of the following designs should you use? a. bus b. star-ring hybrid c. mesh d. traditional ring
c. mesh
11. Which network topology is no longer used much in modern LANs? a. star b. star-bus hybrid c. ring d. All of the above are commonly used in modern LANs.
c. ring
What command is used to create a backup configuration?
copy running-config startup-config
14. Your organization has a network that uses the star-bus hybrid topology. A new network associate is in the process of ordering spare network parts and has included 20 terminators in the order. Which of the following is your advice? a. Increase the order, because terminators burn out quickly on busy star-bus networks. b. Be certain to order terminators that contain LEDs to ensure communications can go only one way on the network. c. Order 200 ohm terminators, because the network contains over 50 connections requiring a high overall resistance. d. Omit the portion of the order for terminators, because terminators are built into the devices
d. Omit the portion of the order for terminators, because terminators are built into the devices
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
displaying a list of all available commands within the current mode\determining which option, keyword, or argument is available for the entered command
Which two devices do not require an IP address in order to operate on a network?
hubs\switches
Which option shows a correctly configured IPv4 default static route?
ip route 0.0.0.0 0.0.0.0 S0/0/0
Which of the following commands correctly configures a static route?
ip route 10.1.3.0 255.255.255.0 10.1.130.253
What command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
How does 802.11n handle the use of ack?
it uses block ack, it make communication faster
Which of the following are advantages of coding a vitual server?
lower costs and reduction in the number of computer need
On your network there is a NIC that is malfunctioning by transmitting many extra frames each time it communicates. Which of the following might help you identify which NIC is having problems so that you can replace it?
physical address of the NIC
What are common cloud computing model?
private, public
A combination of the bus and star topologies is called a?
star bus
An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
subnetwork 192.168.1.64 subnet mask 255.255.255.192
Which command will put 0/4 port in vlan 77?
switchport access vlan 77
Which information does the show startup-config command display
the contents of the saved configuration file in the NVRAM
Which of the following have been facilitated by the OSI model?
the development of network hardware that uses common interfaces, - enabling users to retain their investment in network devices by helping to ensure old equipment communicates with new equipment, and - enabling different types of LANs and MANs to communicate
Which interface allows remote management of a Layer 2 switch?
the switch virtual interface
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
to display a message when a user accesses the switch
Why would a Layer 2 switch need an IP address?
to enable the switch to be managed remotely
Why is it important to configure a hostname on a device?
to identify the device during remote access (SSH or telnet)
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
Which two types of device are typically assigned with static IP addresses?
web servers\printers
Which of the following is advantages of setting a DMZ with two firewall?
you can control where traffic goes in the three network
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment
|Use the console port to locally access the switch from a serial or USB interface of the PC.