CCNA

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Data Layer - Layer #? - Responsibilities? - What devices work on this layer?

- Layer 2 - Responsible for encapsulating data for the physical layer and handling error notification, network topology, and flow control. - Switches

Network Layer - Layer #? - Responsibilities? - What devices work on this layer?

- Layer 3 - Manages device addressing, tracks location of devices on a network and determines the best way to move data. - Routers & Layer 3 switches

Transport Layer - Layer #? - Responsibilities?

- Layer 4 - Responsible for segmenting/assembling data. - This is the layer TCP/UDP operates at.

Session Layer - Layer #? - Responsibilities?

- Layer 5 - Responsible for setting up, managing, and dismantling sessions. - Also manages dialog between devices (Ex. Duplex speed)

Presentation Layer - Layer #? - Responsibilities?

- Layer 6 - Responsible for data translation and code formatting.

Application Layer - Layer #? - Responsibilities?

- Layer 7 - Email, File, Print, database, Etc.

Which protocol allows VLANs to be dynamically configured between multiple switches? A. IGMP B. STP C. VTP D. 802.1Q

C. VTP VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. To do this, VTP carries VLAN information to all the switches in a VTP domain. https://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/10558-21.html

If a switch received a frame while forwarding others, how frame would be handled? A. It will interrupt the frames B. The switch will put the frame in a queue C. Will be forwarded at the same time with the current frame D. The new frame will forward first

C. Will be forwarded at the same time with the current frame

The ip helper-address command does what? A. assigns an IP address to a host B. resolves an IP address from a DNS server C. relays a DHCP request across networks D. resolves an IP address overlapping issue

C. relays a DHCP request across networks

Which statement about native VLAN traffic over 802.1Q trunk is true? A. It is discarded by STP B. It is placed is a high-priority queue C. It is tagged with a value of 1 D. It is untagged

D. It is untagged

What is the bit length and expression form of a MAC address?

48-bit Hexadecimal

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) A. In an inbound access list, packets are filtered as they enter an interface. B. In an inbound access list, packets are filtered before they exit an interface. C. Extended access lists are used to filter protocol-specific packets. D. You must specify a deny statement at the end of each access list to filter unwanted traffic. E. When a line is added to an existing access list, it is inserted at the beginning of the access list.

A. In an inbound access list, packets are filtered as they enter an interface. C. Extended access lists are used to filter protocol-specific packets.

Which address are OSPF hello packets addressed to on point-to-point networks? A. 224.0.0.5 B. 172.16.0.1 C. 192.168.0.5 D. 223.0.0.1 E. 254.255.255.255

A. 224.0.0.5 Point-to-Point networks use the AllSPFRouters address (224.0.0.5) for all OSPF messages. https://technet.microsoft.com/en-us/library/cc957908.aspx

Which destination IP address can a host use to send one message to multiple devices across ...? A. 239.255.0.1 B. 172.20.1.0 C. 192.168.0.119 D. 127.0.0.1

A. 239.255.0.1 Multicast Addresses: 224.0.0.0 - 239.255.255.255

Which of the following are two local host characters? A. 32/prefix B. 255.255.255.0 C. The administrative distance is 0 D. Dynamically learned E. ?

A. 32/prefix C. The administrative distance is 0

3. Which six-byte field in a basic ethernet frame must be an individual address? A. FCS B. SOF C. Sa D. Da

A. FCS

Which IPv6 address type is a public address? A. Global unicast B. Multicast C. Link local D. Unique-local

A. Global unicast

What does RIPv2 use to elect of route? A. Hop count B. Administrative distance C. Bandwidth

A. Hop count The Routing Information Protocol (RIP) is a distance-vector,interior gateway (IGP) routing protocol used by routers to exchange routing information.RIP uses the hop count as a routing metric.

Which of the following connections would you need to use a crossover cable? A. Host to host B. Host to switch/hub C. Router to host D. Switch to switch E. Router to switch/hub F. Hub to hub G. Hub to switch

A. Host to host C. Router to host D. Switch to switch F. Hub to hub G. Hub to switch

Which of the following is true about port security? A. In stick, port retrain dynamically learned B. Configure spanning destination C. The default configuration with max 10 D. Not supported by VLAN

A. In stick, port retrain dynamically learned

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two) A. It is locally significant. B. It is globally significant. C. It is needed to identify a unique instance of an OSPF database. D. It is an optional parameter required only if multiple OSPF processes are running on the router. E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

A. It is locally significant. C. It is needed to identify a unique instance of an OSPF database.

Which statements describe the routing protocol OSPF? (Choose three.) A. It supports VLSM B. It is used to route between autonomous systems. C. It confines network instability to one area of the network. D. It increases routing overhead on the network. E. It allows extensive control of routing updates. F. It is simpler to configure than RIP v2.

A. It supports VLSM C. It confines network instability to one area of the network E. It allows extensive control of routing updates

ROUTER# show ip route 192.168.12.0/24 is variably subnetted, 9 subnets, 3 masks C 192.168.12.64 /28 is directly connected, Loopback1 C 192.168.12.32 /28 is directly connected, Ethernet0 C 192.168.12.48 /28 is directly connected, Loopback0 O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0 C 192.168.12.232 /30 is directly connected, Serial0 O 192.168.12.245 /30 [110/782] via 192.168.12.233, 00:35:36, Serial0 O 192.168.12.240 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0 O 192.168.12.253 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0 O 192.168.12.249 /30 [110/782] via 192.168.12.233, 00:35:37, Serial0 O 192.168.12.240/30 [110/128] via 192.168.12.233, 00:35:36, Serial 0 To what does the 128 refer to in the router output above? A. OSPF cost B. OSPF priority C. OSPF hop count D. OSPF ID number E. OSPF administrative distance

A. OSPF Cost The first parameter is the Administrative Distance of OSPF (110) while the second parameter is the cost of OSPF.

On a live network, which commands will verify the operational status of router interfaces? (Choose two.) A. Router# show interfaces B. Router# show ip protocols C. Router# debug interface D. Router# show ip interface brief E. Router# show start

A. Router# show interfaces D. Router# show ip interface brief

What information can be used by a router running a link-state protocol to build and maintain its topological database? (Choose two.) A. hello packets B. SAP messages sent by other routers C. LSAs from other routers D. beacons received on point-to-point links E. routing tables received from other link-state routers F. TTL packets from designated routers

A. hello packets C. LSAs from other routers

Which characteristics are representative of a link-state routing protocol? (Choose three.) A. provides common view of entire topology B. exchanges routing tables with neighbors C. calculates shortest path D. utilizes event-triggered updates E. utilizes frequent periodic updates

A. provides common view of entire topology C. calculates shortest path D. utilizes event-triggered updates

Which destination IP address can a host use to send one message to multiple devices across ...? A. 239.255.0.1 B. 172.20.1.0 C. 192.168.0.119 D. 127.0.0.1

Answer: A (multicast address)

Which two VLANs are reserved for system use only? (Choose two.) A. 1 B. 4095 C. 4096 D. 0 E. 1001

Answer: BD The VLANs 0 and 4095 are reserved by the IEEE 802.1Q standard and you cannot create, delete, or modify them so they are the correct answers. Note: - VLAN 0 and 4095 are reserved for system use only. You cannot see or use these VLANs. - VLAN 1 and VLANs 1002-1005 are default VLANs. Default VLANs are created automatically and cannot be configured or deleted by users. - VLAN 2 to 1001 are normal VLANs. You can create, use and delete them. - VLAN 1002 to 1005 are normal VLANs too but Cisco reserved for FDDI an Token Ring.

Which protocol allows VLANs to be dynamically configured between multiple switches? A. IGMP B. STP C. VTP D. 802.1Q

Answer: C

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP does not require dedicated gateway tunnels, and can pass through existing IPV4 NAT gateways? A. dual stack XX B. dynamic C. Teredo D. Manual 6 to 4

Answer: C Teredo operates using a platform independent tunneling protocol that provides IPv6 (Internet Protocol version 6) connectivity by encapsulating IPv6 datagram packets within IPv4 User Datagram Protocol (UDP) packets. Teredo routes these datagrams on the IPv4 Internet and through NAT devices. Teredo nodes elsewhere on the IPv6 network (called Teredo relays) receive the packets, un-encapsulate them, and pass them on.

Which layer chooses and determines the availability of communication partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?

Application layer.

Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.) A. Router(config)# router ospf 0 B. Router(config)# router ospf 1 C. Router(config)# router ospf area 0 D. Router(config-router)# network 192.168.16.0 0.0.0.255 0 E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0 F. Router(config-router)# network 192.168.16.0 255.255.255.0 area 0

B. Router(config)# router ospf 1 E. Router(config-router)# network 192.168.16.0 0.0.0.255 area 0

Which network configuration allows a switch to send traffic from multiple VLANS over a single link to a router that routes between the VLANs? A. Port channel B. Router-on-a-stick C. Virtual trunking D. Spanning-tree

B. Router-on-a-stick

Which sequence begins a unique local IPv6 Unicast address in binary notation? A. 00000000 B. 1111110 C. 1111100 D. 1111111

B. 1111110

What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router? A. 2 B. 8 C. 16 D. unlimited

B. 8

Which metric or metrics does RIP use to determine the routing table metric for a route? A. Bandwidth and delay B. Hop count C. Bandwidth and hop count D. Bandwidth

B. Hop count

Which of the following connections would you need to use a straight-through cable? A. Host to host B. Host to switch/hub C. Router to host D. Switch to switch E. Router to switch/hub F. Hub to hub G. Hub to switch

B. Host to switch/hub E. Router to switch/hub

Which statement describes the process ID that is used to run OSPF on a router? A. It is globally significant and is used to represent the AS number. B. It is locally significant and is used to identify an instance of the OSPF database. C. It is globally significant and is used to identify OSPF stub areas. D. It is locally significant and must be the same throughout an area.

B. It is locally significant and is used to identify an instance of the OSPF database.

What are two benefits of using a single OSPF area network design? (Choose two.) A. It is less CPU intensive for routers in the single area. B. It reduces the types of LSAs that are generated. C. It removes the need for virtual links. D. It increases LSA response times. E. It reduces the number of required OSPF neighbor adjacencies.

B. It reduces the types of LSAs that are generated. C. It removes the need for virtual links.

Which three statements are correct about RIP version 2? (Choose three) A. It uses broadcast for its routing updates. B. It supports authentication. C. It is a classless routing protocol. D. It has a lower default administrative distance then RIP version 1. E. It has the same maximum hop count as RIP version 1. F. It does not send the subnet mask any updates.

B. It supports authentication. C. It is a classless routing protocol. E. It has the same maximum hop count as RIP version 1.

Which two of these functions do routers perform on packets? (Choose two.) A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations

B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. router#show interfaces Serial0/1/0 is up, line protocol is down At which OSI layer should the administrator begin troubleshooting? A. physical B. data link C. network D. transport

B. data link

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.) A. router#show version B. router#show ip interface C. router#show protocols D. router#show controllers E. router#show running-config

B. router#show ip interface C. router#show protocols

The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose of the last command entered? A. to require the user to enter an encrypted password during the login process B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files C. to encrypt the enable secret password D. to provide login encryption services between hosts attached to the router

B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

Why do large OSPF networks use a hierarchical design? (Choose three.) A. to decrease latency by increasing bandwidth B. to reduce routing overhead C. to speed up convergence D. to confine network instability to single areas of the network E. to reduce the complexity of router configuration F. to lower costs by replacing routers with distribution layer switches

B. to reduce routing overhead C. to speed up convergence D. to confine network instability to single areas of the network

A network administrator is trying to add a new router into an established OSPF network. The networks attached to the new router do not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below, what configuration error is causing this problem? Router(config)# router ospf 1 Router(config-router)# network 10.0.0.0 255.0.0.0 area 0 A. The process id is configured improperly. B. The OSPF area is configured improperly. C. The network wildcard mask is configured improperly. D. The network number is configured improperly. E. The AS is configured improperly. F. The network subnet mask is configured improperly.

C. The network wildcard mask is configured improperly.

What is the default administrative distance of the OSPF routing protocol? A. 90 B. 100 C. 110 D. 120 E. 130 F. 170

C. 110

Which of the following symbols is used to indicate unknown packet type while pinging? A. . B. * C. ? D. U

C. ?

Assume all the routing protocol have the same length prefix, what would the router prefer? A. OSPF B. EIGRP C. CONNECTED D. BGP

C. CONNECTED

Which two statements describe the process identifier that is used in the command to configure OSPF on a router? (Choose two.) Router(config)# router ospf 1 A. All OSPF routers in an area must have the same process ID. B. Only one process number can be used on the same router. C. Different process identifiers can be used to run multiple OSPF processes D. The process number can be any number from 1 to 65,535. E. Hello packets are sent to each neighbor to determine the processor identifier.

C. Different process identifiers can be used to run multiple OSPF processes D. The process number can be any number from 1 to 65,535.

When a router makes a routing decision for a packet that is received from one network and destined to another, which portion of the packet does it replace? A. Layer 4 protocol B. Layer 3 IP address C. Layer 2 frame header and trailer D. Layer 5 session

C. Layer 2 frame header and trailer

In the configuration of NAT, what does the keyword overload signify? A. When bandwidth is insufficient, some hosts will not be allowed to access network translation. B. The pool of IP addresses has been exhausted. C. Multiple internal hosts will use one IP address to access external network resources. D. If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.

C. Multiple internal hosts will use one IP address to access external network resources.

Which of the following used to identify immediate destination? A. Administrative distance B. Metric C. Next hop D. Destination network

C. Next hop

What are the five ranges of IPv4.

Class A: 1.0.0.1 to 126.255.255.254 Class B: 128.1.0.1 to 191.255.255.254 Class C: 192.0.1.1 to 223.255.255.254 Class D: 224.0.0.1 to 239.255.255.254 Class E: 240.0.0.1 to 254.255.255.254

Which of the following IPv6 prefixes is used for unique local unicase addresses? A. 2000::/3 B. FF00::/8 C. FE80::/10 D. FC00::/7

D. FC00::/7

Which MTU size can cause a baby giant error? A. 9216 B. 1500 C. 1600 D. 1518

D. 1518

What is the maximum size of an Ethernet frame that uses 802.1Q tagging? A. 1514 bytes B. 128 bytes C. 68 bytes D. 1522 bytes

D. 1522 bytes

What is the best practice when assigning IP addresses in a small office of six hosts? A. Use a DHCP server that is located at the headquarters. B. Use a DHCP server that is located at the branch office. C. Assign the addresses by using the local CDP protocol. D. Assign the addresses statically on each node.

D. Assign the addresses statically on each node.

Which of the following options could be used on router to prevent reassign IP address statically? A. Pool B. Lease C. Client ID D. Exclude address

D. Exclude address

What does the "Inside Global" address represent in the configuration of NAT? A. the summarized address for all of the internal subnetted addresses B. the MAC address of the router used by inside hosts to connect to the Internet C. a globally unique, private IP address assigned to a host on the inside network D. a registered address that represents an inside host to an outside network

D. a registered address that represents an inside host to an outside network

Which command is used to display the collection of OSPF link states? A. show ip ospf link-state B. show ip ospf lsa database C. show ip ospf neighbors D. show ip ospf database

D. show ip ospf database

Does DTE or DCE set the clock rate for a serial connection?

DCE

Which Layer is represented by frames?

Data (Layer 2)

Which layer combines bits into bytes and bytes into frames, uses MAC addressing, and provides error detection?

Data Layer

Why would you see ignored AND no buffer counters incrementing?

Most likely a broadcast storm. This can be caused by a bad NIC or even bad network design.

Which layer is represented by packets?

Network (Layer 3)

Which layer is represented by bits?

Physical (Layer 1)

Which route option can be used to back-up in case of fail?

floating static route A floating static route is used as a backup route.

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits; transport-fault detection, and recovery; and controlling the flow of information.

Transport

Which layer is represented by segments?

Transport (Layer 4)

Which layer segments and reassembles data into data streams?

Transport (Layer 4)


Set pelajaran terkait

Market Research Exam 3 Sample Questions

View Set

Chapter 2 - Life Basics Life, Health, Annuities

View Set

Disinfectant - Hydrogen Peroxide

View Set

Chapter 39: Normal Anatomy and Physiology of the Female Pelvis

View Set

M.23-1: Dynamic Study Module Alzheimer Disease

View Set

Chapter 14: Environmental Health and Safety

View Set

Nationalist Diplomacy History Test

View Set

atomai, izotopai, ryšiai, periodinė lentelė

View Set