Testout Chapter 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185

Which of the following BEST describes an ARP spoofing attack?

An attack that associates an attacker's MAC address with the IP address of a victim's device.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?

Configure a priority number of 4096 for switch C.

What does the ip address dhcp command allow you to do?

Configure a switch to obtain an IP address from a DHCP server.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet.

Configure port security on the switch.

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch.

Which of the following allows incoming traffic addressed to a specific port to move through the firewall and be transparently forwarded to a specific host on the private network?

DNAT

Which level of the OSI model does a Layer 2 switch operate at?

Data Link layer

Which of the following is a device that can send and receive data simultaneously?

Full-duplex

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?

If the network is connected to the internet using multiple ISPs.

Which of the following is true about an unmanaged switch?

It can connect to all devices in a small area.

Which of the following are true of the IS-IS routing protocol? (Select two.)

It divides large networks into areas. It supports IPv6 routing.

As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs?

Layer 3 switch

On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs?

Layer 3 switch

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls?

Port mirroring

Which of the following switch features allows you to configure how the switch's MAC address table is filled?

Port security

Which of the following NAT implementations maps a single private IP address to a single public IP address on the NAT router?

Static NAT

Which of the following has the least default administrative distance?

Static route to an IP address

You have only one physical interface but want to connect two IP networks. Which of the following would allow you to do so?

Subinterfaces

In which type of device is a MAC address table stored?

Switch

Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN?

Switch

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN?

Switch spoofing

Which of the following can cause broadcast storms?

Switching loops

In which of the following tables does a NAT router store port numbers and their associated private IP addresses?

Translation table

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports.

Trunking

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network?

Two

Which of the following scenarios would cause a problem in asymmetric routing?

Using two stateful firewalls in the traffic flow.

For which of the following devices does a voice VLAN prioritize traffic?

VoIP phone

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Which of the following best describes DHCP scope exhaustion?

A denial of service from a lack of IP addresses in a DHCP server's pool.

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms

Enable Spanning Tree on the switches.

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6?

NDP

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4

Which statements accurately describe the port states of both bridges and switches? (Select two.)

Ports in a blocked state still receive BPDUs\ In the learning state, the MAC address table can be populated, but frames are not forwarded.

Which of the following is NOT one of the IP address ranges defined in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1 to 169.254.255.254

Which of the following is the open standard for tagging Layer 2 frames?

802.1q

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation?

9,000

Which of the following utilities would you use to view the routing table?

route

A workstation's network board is currently configured as follows: Network Speed = Auto Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is incorrectly detecting the network speed and duplex settings

show running-config interface show interface

Which of the following do hosts on a private network share if the network utilizes a NAT router?

A physical IP address

Drag each description on the left to the appropriate switch attack type on the right. ARP spoofing/poisoning

ARP spoofing/poisoning The source device sends frames to the attacker's MAC address instead of to the correct device. Dynamic Trunking Protocol Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network. MAC flooding Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. MAC spoofing Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Commonly sold at retail stores. Unmanaged switch Provides port security features. Managed switch Supports VLANs. Managed switch Provides very few configuration options. Unmanaged switch Can be configured over a network connection. Managed switch Can be configured over a dedicated communication channel. Managed switch

Match each switch management method on the left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

Competes with normal network traffic for bandwidth: In-band management Uses a dedicated communication channel: Out-of-band management Must be encrypted to protect communications from sniffing: In-band management Does not compete with normal network traffic for bandwidth: Out-of-band management Affected by network outages.: In-band management

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B.

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having issues. Which of the following configuration values would you MOST likely need to change?

Default gateway

Which device is NAT typically implemented on?

Default gateway router

Which of the following is a method of VLAN hopping?

Double tagging

Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay

EIGRP

Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable?

Exterior dynamic routing protocols

Which of the following is true about Network Address Translation?

It supports up to 5,000 concurrent connections.

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform?

MAC spoofing attack

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port.

Which of the following is a method that allows you to connect a private network to the internet without obtaining registered addresses for every host?

NAT

You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work?

No. The no shutdown command needs to be entered.

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not.

Which of the following is required to establish a new network switch and configure its IP address for the first time?

Out-of-band management

Which of the following methods is best to have when a network goes down?

Out-of-band management

What is the main difference between RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol.

Which of the following BEST describes dynamic routing?

Routers learn about networks by sharing routing information with each other.

You are unsure if the gateway address is correct for one of your subnetworks because traffic is not leaving the network.

Routing table

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves.

Spanning Tree

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.

Static

A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next?

The frame is replicated and sent to every active port on the switch except the source port.

Kate, a network administrator, has been tasked with staying within the company budget. She has a large network and doesn't want to spend more than she needs to on purchasing and registering multiple public IP addresses for each of the hosts on her network. Which of the following methods could help her provide internet access but also keep costs low and limit the number of registered IP addresses her organization needs to purchase?

Use Network Address Translation.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network

VLAN

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network?

VLAN spoofing

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?

Wait for convergence to take place.


संबंधित स्टडी सेट्स

Anatomy & Physiology Part 2 Exam 1

View Set

Formation and Elimination of Synapses

View Set

Respiratory (PrepU Ch17+19, Saunders, uWorld)

View Set

VOICE OVER INTERNET PROTOCOL (VoIP) FUNDAMENTALS BCOC D10

View Set

Trigonometry - Solving Trig Equations

View Set

Chapter 27: Life in Two City-States (Athens and Sparta)

View Set

Chapter 18: Intraoperative Nursing Management

View Set