Bcs 209 final pt. 3
What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?
the MAC address of the IPv6 enabled interface
Which highlighted value represents a specific destination network in the routing table?
172.16.100.64
A company has an internal network of 172.16.25.0/24 for their employee workstations and a DMZ network of 172.16.12.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT?
172.16.25.35
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?
172.16.36.255
Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H3?
2
NAT is configured on RT1 and RT2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between RT2 and the web server?
209.165.200.245
A network engineer is preparing to upgrade the IOS system image on a Cisco 2901 router. Based on the output shown, how much space is available for the new image?
221896413 bytes
A small business uses VLANs 2, 3, 4, and 5 between two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?
5
Which characteristic describes cut-through switching?
Frames are forwarded without any error checking
Which two characteristics describe the native VLAN? (Choose two.)
1. The native VLAN traffic will be untagged across the trunk link 2. The native VLAN provides a common identifier to both ends of a trunk
Based on the exhibited configuration and output, what are two reasons VLAN 99 missing? (Choose two.)
1. because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface 2. because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command
On which two routers would a default static route be configured? (Choose two.)
1. stub router connection to the rest of the corporate or campus network 2. edge router connection to the ISP
An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?
Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted
Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/0/1 100 was issued on R1 and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?
Change the administrative distance to 120
R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?
Change the destination network and mask to 0.0.0.0 0.0.0.0
A host on the 10.10.100.0/24 LAN is not being assigned an IPv4 address by an enterprise DHCP server with the address 10.10.200.10/24. What is the best way for the network engineer to resolve this problem?
Issue the command ip helper-address 10.10.200.10 on the router interface that is the 10.10.100.0/24 gateway
What is the purpose of the Cisco PAK?
It is a key for enabling an IOS feature set
What caused the following error message to appear?01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down 01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down
Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8
The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?
R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1
All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem?
RIPv2 is misconfigured on router R2
Order the DHCP process steps. (Not all options are used.)
Step 3 N/A Step 4 Step 2 Step 1
A network administrator is using the router-on-a-stick method to configure inter-VLAN routing. Switch port Gi1/1 is used to connect to the router. Which command should be entered to prepare this port for the task?
Switch(config)# interface gigabitethernet 1/1 * Switch(config-if)# switchport mode trunk
A network administrator is verifying a configuration that involves network monitoring. What is the purpose of the global configuration command logging trap 4?
System messages that match logging levels 0-4 will be forwarded to a specified logging device
What will be the result of adding the command ip dhcp excluded-address 172.16.4.1 172.16.4.5 to the configuration of a local router that has been configured as a DHCP server?
The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive
A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
The NAT pool has been exhausted
What is a result of connecting two or more switches together?
The size of the broadcast domain is increased
Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface
Which statement describes a characteristic of the extended range VLANs that are created on a Cisco 2960 switch?
They are not stored in the vlan.dat file
What is indicated by the M in the Cisco IOS image name c1900-universalk9-mz.SPA.153-3.M.bin?
an extended maintenance release
Which advantage does the store-and-forward switching method have compared with the cut-through switching method?
frame error checking
Which commands are used to re-enable a port that has been disabled as a result of a port security violation?
shutdown no shutdown
As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?
sticky secure MAC addresses
Which information does a switch use to keep the MAC address table information current?
the source MAC address and the incoming port
Which type of traffic is designed for a native VLAN?
untagged