CIS270A - Mid-term
1- In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? A. Only the devices that use cables are using Ethernet. B. Only the devices that use wireless are using Ethernet. C. Both the devices using cables and those using wireless are using Ethernet. D. None of the devices are using Ethernet.
A
2. After configuring a working router interface with IP address/mask 10.1.1.100/26, which of the following routes would you expect to see in the output of the show ip routecommand? A. connected route for subnet 10.1.1.64 255.255.255.192 B. connected route for subnet 10.1.1.0 255.255.2550 C. ocal route for host 10.1.1.100 255.255.255.192
A
A LAN design uses a Layer 3 EtherChannel between two switches SW1 and SW2,with port-channel interface 1 used on both switches. SW1 uses ports G0/1, G0/2, andGO/3 in the channel. Which of the following are true about SW1's configuration tomake the channel be able to route IPV4 packets correctly? A. The ip address command must be on the port-channel 1 interface. B. The ip address command must be on interface G0/1 (lowest numbered port) C. Interface G0/1 must be configured with the routedport command.
A
A Layer 3 switch has been configured to route IP packets between VLANS 1, 2, and 3using SVIs, which connect to subnets 172.20.1.0/25, 172.20.2.0/25, and 172.20.3.0/25,respectively. The engineer issues a show ip route connected command on the Layer3 switch, listing the connected routes. Which of the following answers lists a piece of894 CCNA 200-301 Official Cert Guide, Volume 1information that should be in at least one of the routes? A. Interface VLAN2 B. Next-hop router 172.20.2.1 C. Interface Gigabit Ethernet 0/0.3
A
A network engineer configures the ip route 10.1.1.0 255.255.255.0 s0/0/0 commandon a router and then issues a show ip route command from enable mode. No routesfor subnet 10.1.1.0/24 appear in the output. Which of the following could be true? A. Interface s0/0/0 is down. B. The ip route command has incorrect syntax and was rejected in config mode. C. The ip route command is missing a next-hop router IP address.
A
A router has bcen configured with the ipv6 address 3111:1:1:1:1/64 command on itsG/1 interface and ipv6 address 3222:2:2:2:1/64 on its GO/2 interface. Both interfacesare working. Which of the following routes would you expect to see in the output ofthe show ipv6 route connected command? A. A route for 3111:1:1:1:/64 B. A route for 3111:1:1:1:1/64 C. A route for 3222:2:2:2:2/128
A
A router receives an Ethernet frame that holds an IPV6 packet. The router then makes adecision to route the packet out a serial link. Which of the following statements is trueabout how a router forwards an IPV6 packet? A. The router discards the Ethernet data-link header and trailer of the received frame. B. The router makes the forwarding decision based on the packet's source IPV6 C. The router keeps the Ethernet header, encapsulating the entire frame inside a new IPv6 packet before sending it over the serial link, D. The router uses the IPV4 routing table when choosing where to forward the packet.
A
An engineer configures a static IPv4 route on Router R1. Which of the followingpieces of information should not be listed as a parameter in the configurationcommand that creates this static IPv4 route? A. The next-hop router's neighboring interface B. The destination subnet's subnet ID C. The next-hop router's IP address
A
An engineer connects routers R11 and R12 to the same Ethernet LAN and configuresthem to use OSPFV2. Which answers describe a combination of settings that wouldprevent the two routers from becoming OSPF neighbors? A. R11's interface uses area 11 while R12's interface uses area 12. B. R11s OSPF process uses process ID 11 while R12 uses process ID 12. C. R11's interface uses OSPF priority 11 while R12's uses OSPF priority 12
A
An engineer connects routers R13 and R14 to the same Ethernet LAN and configuresthem to use OSPFV2. Which answers describe a combination of settings that wouldprevent the two routers from becoming OSPF neighbors? A. Both routers' OSPF process uses process ID 13. B. Both routers' interface IP addresses reside in the same subnet. C. Both routers' OSPF process uses router ID 13.13.13.13.
A
An engineer has successfully configured a Layer 3 switch with SVIS for VLANS 2 and3. Hosts in the subnets using VLANS 2 and 3 can ping each other with the Layer 3switch routing the packets. The next week, the network engineer receives a call thatthose same users can no longer ping cach other. If the problem is with the Layer 3switching function, which of the following could have caused the problem? A. VTP on the switch removing VLAN 3 from the switch's VLAN list B. Six (or more) out of 10 working VLAN 2 access ports tailing due to physical C. A shutdown command issued
A
An engineer migrates froma more traditional OSPFV2 contiguration that uses net-work commands in OSPF configuration mode to instead use OSPFV2 interface con-figuration. Which of the following commands contigures the area number assigned toan interface in this new configuration? A. The ip ospf command in interface configuration mode B. The area command in interface configuration mode C. The router ospf command in interface configuration mode
A
An engineer needs to add a static IPV6 route for prefix 2000:1:2:3:/64 to Router R5 inthe figure shown with question 1. Which of the following answers shows a valid staticIPV6 route for that subnet on Router R5? A. ipv6 route 2000:1:2:3::/64 2000:1:2:56:6 B. ipv6 route 2000:1:2:3:/64 FE80:FF:FE00:5 C. ipv6 route 2000:1:2:3:/64 FE80:FF:FE00:6
A
An engineer needs to add a static IPV6 route for prefix 2000:1:2:3:/64 to Router R5'sconfiguration, in the figure shown with question 1. Which of the following answersshows a valid static IPV6 route for that subnet, on Router R5? A. ipv6 route 2000:1:2:3:/64 S0/1/1 B. ipv6 route 2000:1:2:3:/64 S0/1/0 C. ip route 2000:1:2:3:/64 S0/1/1
A
An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious coworkers from logging in to the lab switches from their desktop PCs. Which of the following commands would be a useful part of that configuration? A. A login vty mode subcommand B. A password password console subcommand C. A login local vty subcommand D. A transport input ssh vty subcommand
A
For the IPV6 address FD00:1234:5678:9ABC:DEF1:2345:6789:ABCD, which part ofthe address is considered the global ID of the unique local address? A. 00:1234:5678 B. DEF1:2345:6789:ABCD C. 00:1234:5678:9ABC D. None; this address has no global ID
A
Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? A. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. B. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2. C. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC2. D. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
A
In what modes can you type the command show mac-address-table and expect to get a response with MAC table entries? A. User mode B. Enable mode C. Global configuration mode D. Interface configuration mode
A
PC1, PC2, and Router R1 all connect to the same VLAN and IPV6 subnet. PC1 wantsto send its first IPV6 packet to PC2. What protocol or message will PC1 use to discov-er the MAC address to which PC1 should send the Ethernet frame that encapsulatesthis IPV6 packet? A. NDP NS B. ARP C. SLAAC
A
Router 1 has a Fast Ethernet interface 0/0 with IP address 10.1.1.1. The interface is connected to a switch. This connection is then migrated to use 802.1Q trunking. Whichof the following commands could be part of a valid configuration for Router 1's Fa0/0interface? A. interface fastethernet 0/0.4 B. dotlq enable C. trunking enable
A
Router R1 currently supports IPV4, routing packets in and out all its interfaces. Rl'sconfiguration needs to be migrated to support dual-stack operation, routing both IPV4and IPV6. Which of the following tasks must be performed before the router can alsosupport routing IPV6 packets? A. Enable IPV6 on each interface using an ipv6 address interface subcommand. B. nable support for both versions with the ip versions 4 6 global command. Additionally enable IPV6 routing using the ipv6 unicast-routing global command. C. Migrate to dual-stack routing using the ip routing dual-stack global command.
A
Router R1 has a router-on-a-stick (RCOAS) configuration with two subinterfaces ofinterface G0/1: G0/1.1 and G0/1.2. Physical interface G0/1 is currently in a down/downState. The network engineer then configures a shutdown command when in interfaceconfiguration mode for GO/1.1 and a no shutdown command when in interface con-figuration mode for G0/1.2. Which answers are correct about the interface state for thesubinterfaces? A. GO/1.2 will be in a down/down state. B. GO/1.1 will be in a down/down state. C. G0/1.2 will be in an up/up state.
A
Router R1 has an interface named Gigabit Ethernet 0/1, whose MAC address has beenset to 0200.0001.000A, Which of the following commands, added in Rl's GigabitEthernet 0/1 configuration mode, gives this router's GO/1 interface a unicast IPV6address of 2001:1:1:1:1:200:1:A, with a /64 prefix length? A. ipv6 address 2001:1:1:1:1:200:1:A/64 B. ipv6 address 2001:1:1:1:1:200:1:A/64 eui-64 C. ipv6 address 2001:1:1:1:1:200:1:A /64 eui-64 D. ipv6 address 2001:1:1:1:1:200:1:A /64
A
Router R1 has an interface named Gigabit Ethernet 0/1, whose MAC address has beenset to 5055.4444.3333. This interface has been configured with the ipv6 address2000:1:1:1:/64 eui-64 subcommand. What unicast address will this interface use? A. 2000:1:1:1:5255:44FF:FE44:3333 B. 2000:1:1:1:52FF:FE55:4444:3333 C. 2000:1:1:1:5255:4444:33FF:FE33 D. 2000:1:1:1:200:FF:FE00:0
A
Router R1 has an interface named Gigabit Ethernet 0/1, whose MAC address hasbeen set to 0200.0001.000A. The interface is then configured with the ipv6 address2001:1:1:1:200:FF:FE01:B/64 interface subcommand; no other ipv6 address com-mands are configured on the interface. Which of the following answers lists the link-local address used on the interface? A. FE80::FF:FE01:A B. FE80::FF:FE01:B C. FE80::200:FF:FE01:A
A
Router R1 lists a route in its routing table. Which of the following answers list a factfrom a route that the router uses when matching the packet's destination address? A. Mask B. Next-hop router C. Outgoing interface D. VLAN
A
Router R15 has been a working part of a network that uses OSPFV2. An engineer thenissues the shutdown command in OSPF configuration mode on R15. Which of the fol-lowing occurs? A. R15 keeps all OSPF configuration but ceases all OSPF activities (routes, LSDB, neighbors). B. R15 keeps OSPF neighbors open but does not accept new OSPF neighbors. C. R15 empties its LSDB but keeps OSPF neighbor relationships active.
A
Routers R1 and R2, with router IDs 1.1.1.1 and 2.2.2.2, connect over an Ethernet WANlink, The configuration uses all defaults, except giving R1 an interface priority of 11both routers to use OSPF network type point-to-point. If the WAN linkand changinitializes for both routers at the same time, which of the following answers are true? A. Router R1 will dynamically discover the existence of router R2 B. Router R2's show ip ospf neighbor command will list R1 with a state of "FULL/DR. C. Router R1 will become the DR.
A
Routers R1 and R2, with router IDs 1.1.1.1 and 2.2.2.2, connect over an Ethernet WANlink. It using all default OSPF settings, if the WAN link initializes for both routers atthe same time, which of the following answers are true? A. Router R1 will dynamically discover the existence of router R2 B. Router R2 will be neither the DR nor the BDR C. Router R1 will become the DR.
A
Switch SW1 uses its Gigabit 0/1 interface to connect to switch SW2's Gigabit 0/2 interface.SW2's Gi0/2 interface is configured with the speed 1000 and duplex full commands.SW1 uses all defaults for interface configuration commands on its Gi0/1 interface. Which of the following are true about the link after it comes up? (Choose two answers.) A. The link works at 1000 Mbps (1 Gbps) AND Both switches use full-duplex. B. SW1 attempts to run at 10 Mbps because SW2 has effectively disabled IEEE standard auto-negotiation. C. The link runs at 1 Gbps, but SW1 uses half-duplex and SW2 uses full-duplex.
A
The output of the show interfaces status command on a 2960 switch shows interface Fa0/1 in a "disabled" state. Which of the following is true about interface Fa0/1? (Choose three answers.) A. The interface is configured with the shutdown command AND The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down AND The interface cannot currently be used to forward frames. B. The interface can currently be used to forward frames. C. The show interfaces fa0/1 command will list the interface with two status codes of up and down.
A
The output of the show ip interface brief command on R1 lists interface status codesof "down" and "down" for interface GigabitEthernet 0/0. The interface connects to aLAN switch with a UTP straight-through cable. Which of the following could be true? A. The router was never configured with an ip address command on the interface. B. The router was configured with the no ip address command. C. The shutdown command is currently configured for the switch interface on the other end of the cable.
A
The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data-link header and trailer, is an example of what? A. Data encapsulation B. Same-layer interaction C. OSI model D. All of these answers are correct.
A
Two routersS using OSPFV2 have become neighbors and exchanged all L.SAs. As aresult, Router R1 now lists some OSPF-learned routes in its routing table. Which of thefollowing best describes how R1 uses those recently learned LSAS to choose which IProutes to add to its IP routing table? A. Run some SPF math against the LSAS to calculate the routes. B. Each LSA lists a route to be copied to the routing table. C. R1 does not use the LSAS at all when choosing what routes to add.
A
What type of switch memory is used to store the configuration used by the switch when it is up and working? A. RAM B. ROM C. Flash D. NVRAM E. Bubble
A
When subnetting an IPV6 address block, an engineer shows a drawing that breaksthe address structure into three pieces. Assuming that all subnets use the same prefixlength, which of the following answers lists the name of the field on the far right sideof the address? A. interface ID B. Subnet C. Global routing prefix D. Subnet router anycast
A
When subnetting an IPV6 address block, an engineer shows a drawing that breaksthe address structure into three pieces. Comparing this concept to a three-part IPV4address structure, which part of the IPv6 address structure is most like the IPV4 net-work part of the address? A. Global routing prefix B. Subnet router anycast C. Interface ID D. Subnet
A
Which answers list a task that could be helpful in making a router interface G0/0 readyto route packets? A. Configuring the ip address address mask command in G0/0 configuration mode B. Configuring the ip address address and ip mask mask commands in G0/0 con- figuration mode C. Setting the interface description in GO/0 configuration mode
A
Which of the following OSPF neighbor states is expected when the exchange of topol-ogy information is complete between two OSPF neighbors? A. FULL B. UP C. FINAL
A
Which of the following are functions of a routing protocol? A. Correct! Advertising known routes to neighboring routers AND Learning routes and putting those routes into the routing table for routes advertised to the router by its neighboring routers B. Learning routes for subnets directly connected to the router C. Forwarding IP packets based on a packet's destination IP address
A
Which of the following commands correctly configures a static roure? A. ip route 10.1.3.0 255.255.255.0 10.1.130.253 B. ip route 10.1.3.0 serial 0 C. ip route 10.1.3.0 /24 10.1.130.253
A
Which of the following commands do not list the IP address and mask of at least oneinterface? A. show ip interface brief B. show running-config C. show protocols type number
A
Which of the following commands list the OSPF neighbors off interface serial 0/0 A. show ip ospf neighbor B. show ip ospf interface brief C. show ip neighbor
A
Which of the following commands might you see associated with a router CLI, butnot with a switch CLI? A. The show ip route command B. The show running-config command C. The show interfaces status command
A
Which of the following configuration settings on a router does not influence whichIPv4 route a router chooses to add to its IPv4 routing table when using OSPFV2? A. delay B. bandwidth C. ip ospf cost
A
Which of the following installation steps are more likely required on a Cisco router,but not typically required on a Cisco switch? A. Connect serial cables B. Connect to the console port C. Connect the power cable
A
Which of the following interior routing protocols support VLSM? A. OSPF B. RIPv1 C. ESF
A
Which of the following is the shortest valid abbreviation for 2000:0300:0040:0005:6000:0700:0080:0009? A. 2000:300:40:5:6000:700:80:9 B. 2:3:4:5:6:7:8:9 C. 2000:300:4:5:6000:700:8:9 D. 2000:3:4:5:6:7:8:9
A
Which of the following is the shortest valid abbreviation for FE80:0000:0000:0100:0000:0000:0000:0123? A. FE80:0:0:100:123 B. FE80::100:123 C. FE8:1::123 D. FE80::100:0:0:0:123:4567
A
Which of the following is the unabbreviated version of IPV6 address2001:DB8::200:28? A. 2001:0DB8:0000:0000:0000:0000:0200:0028 B. 2001:0DB8::0200:0028 C. 2001:0DB8:0:0:0:0:0200:0028 D. 2001:0DB8:0000:0000:0000:0000:200:0028
A
Which of the following line subcommands tells a switch to wait until a show command's output has completed before displaying log messages on the screen? A. logging synchronous B. no ip domain-lookup C. exec-timeout 0 0 D. history size 15
A
Which of the following multicast addresses is defined as the address for sendingpackets to only the IPV6 routers on the local link? A. FF02:2 B. FF02::5 C. FF02::A
A
Which of the following net work commands, following the command router ospf1, tells this router to start using OSPF on interfaces whose IP addresses are 10.1.1.1,10.1.100.1, and 10.1.120,1? A. network 10.0.0.0 0.255.255.255 area 0 B. network 10.0.0.0 255.0.0.0 area 0 C. network 10.0.0.1 0.0.0.255 area 0 D. network 10.0.0.1 0.0.255.255 area 0
A
Which of the following network commands, following the command router ospf1 tells this router to start using OSPF on interfaces whose IP addresses are 10.1.1.1,10.1.100.1, and 10.1.120.1? A. network 10.1.0.0 0.0.255.255 area 0 B. network 10.0.0.0 0.255.255.0 area 0 C. network 10.1.1.0 0.x.1x.0 area 0
A
Which of the following protocols are examples of TCP/IP data-link layer protocols? A. Ethernet and PPP B. HTTP and IP C. UDP and TCP D. SMTP
A
Which of the following routing protocols is considered to use link-state logic? A. OSPF B. EIGRP C. RIP
A
Which of the following routing protocols use a metric that is, by default, at least par-rially affected by link bandwidth? A. OSPF B. RIPV2 C. RIPV1
A
Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? A. It forwards out all interfaces in the same VLAN except for the incoming interface. B. It forwards the frame out the one interface identified by the matching entry in the MAC address table. C. It compares the destination IP address to the destination MAC address. D. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
A
Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? A. It compares the unicast destination address to the bridging, or MAC address, table. B. It compares the unicast source address to the bridging, or MAC address, table. C. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. D. It compares the destination IP address to the destination MAC address. E. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
A
Which of the following was a short-term solution to the IPV4 address exhaustionproblem? A. NAT/PAT B. IP version 5 C. ipv6 D. ARP
A
Which of the tollowing IPv6 addresses appears to be a global unicast address, basedon its first few hex digits? A. 3123:1:3:5:1 B. FE80::1234:56FF:FE78:9ABC C. FDAD::1 D. FF00::5
A
router has been contigured with the ipv6 address 2000:1:2:3::1/64 command onGO/L interface as shown in the figure, The router creates a link-local address ofkE80:FF:FE00:l as well. The interface is working. Which of the following routes willu puter add to its IPV6 routing table? A. A route for 2000:1:2:3:/64 B. A route for FE80::FF:FE00:1/64 C. A route for FE80::FF:FE00:1/128
A
which of the following IPV6 addresses appears to be a unique local unicast address,based on its first few hex digits? A. FDAD::1 B. FF00:5 C. FES0:1234:56FF:FE78:9ABC D. 3123:1:3:5:1
A
A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? A. Using the exit command once B. Using the end command once AND Pressing the Ctrl+Z key sequence once C. Using the quit command
B
An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engineer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? A. A username name secret password vty mode subcommand B. A username name secret password global configuration command AND A login local vty mode subcommand C. A transport input ssh global configuration command
B
Devices using a wireless LAN must operate in which one of the following modes? A. Round-robin access B. Half duplex C. Full duplex D. None of these answers
B
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? A. enable password B. enable secret C. Neither D. The password command, if it is configured
B
In which of the following modes of the CLI could you type the command reload and expect the switch to reboot? A. User mode B. Enable mode C. Global configuration mode D. Interface configuration mode
B
The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? A. Same-layer interaction B. Adjacent-layer interaction C. OSI model D. All of these answers are correct
B
Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? A. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2. B. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence. AND. R1 will forward data-link frames to R2 using an Ethernet header/trailer. C. R1 will forward data-link frames to R2 using an HDLC header/trailer.
B
Which OSI encapsulation term can be used instead of the term frame? A. Layer 1 PDU B. Layer 2 PDU C. Layer 3 PDU D. Layer 5 PDU E. Layer 7 PDU
B
Which of the following are advantages of using multimode fiber for an Ethernet link instead of UTP or single-mode fiber? A. To achieve the longest distance possible for that single link. B. To extend the link beyond 100 meters while keeping initial costs as low as possible. C. To make use of an existing stock of laser-based SFP/SFP+ modules. D. To make use of an existing stock of LED-based SFP/SFP+ modules.
B
Which of the following are true about the format of Ethernet addresses? A. Each manufacturer puts a unique OUI code into the first 2 bytes of the address. B. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. Each manufacturer puts a unique OUI code into the first half of the address. The part of the address that holds this manufacturer's code is called the OUI. C. The part of the address that holds this manufacturer's code is called the MAC. D. The part of the address that holds this manufacturer's code has no specific name.
B
Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table? A. It compares the unicast destination address to the bridging, or MAC address, table. B. It compares the unicast source address to the bridging, or MAC address, table. C. It compares the VLAN ID to the bridging, or MAC address, table. D. It compares the destination IP address's ARP cache entry to the bridging, or MAC address, table.
B
Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO standard HDLC? A. Flag B. Type C. Address D. FCS
B
Which of the following is a difference between Telnet and SSH as supported by a Cisco switch? A. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing. B. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing. C. Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems. D. Telnet encrypts only password exchanges; SSH encrypts all data exchanges.
B
Which of the following is true about Ethernet crossover cables for Fast Ethernet? A. Pins 1 and 2 are reversed on the other end of the cable. B. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable. C. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable. D. The cable can be up to 1000 meters long to cross over between buildings. E. None of the other answers is correct.
B
Which of the following is true about the CSMA/CD algorithm? A. The algorithm never allows collisions to occur. B. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. C. The algorithm works with only two devices on the same Ethernet. D. None of the other answers is correct.
B
Which one of the following can be used to provide wireless connectivity to a nonwireless device? A. Wireless repeater B. Workgroup bridge C. Transparent bridge D. Adaptive bridge
B
Which one of the following is used to uniquely identify an AP and the basic service set it maintains with its associated wireless clients? A. SSID B. BSSID C. Ethernet MAC address D. Radio MAC address
B
A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the 10 lowest-numbered ports, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the following answers lists facts displayed by the show interfaces status command? A. Port Ethernet 0/1 is in a connected state. B. Port Fast Ethernet 0/11 is in a connected state. C. Port Fast Ethernet 0/5 is in a connected state. D. Port Ethernet 0/15 is in a not connected state.
C
A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP Addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH connections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? A. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode. B. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode. C. The ip default-gateway 172.16.2.254 command in global configuration mode. D. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1.
C
A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information from some other server device? A. ARP B. ping C. DNS D. None of these answers is correct.
C
An access point is set up to offer wireless coverage in an office. Which one of the following is the correct 802.11 term for the resulting standalone network? A. BSA B. BSD C. BSS D. IBSS
C
Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? A. PC and router B. Hub and switch C. PC and switch, Router and hub, Wireless access point (Ethernet port) and switch
C
Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling? A. 10GBASE-T B. 100BASE-T C. 1000BASE-T D. None of the other answers is correct
C
Which of the following are true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? A. The host always sends packets to its default gateway. B. The host never sends packets to its default gateway. C. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host. D. The host sends packets to its default gateway if the destination IP address is in the same subnet as the host.
C
Which of the following does a router normally use when making a decision about routing TCP/IP packets? A. Destination MAC address B. Source MAC address C. Destination IP address D. Source IP address E. Destination MAC and IP addresses
C
Which of the following is true about the Ethernet FCS field? A. Ethernet uses FCS for error recovery. B. It is 2 bytes long. C. It resides in the Ethernet trailer, not the Ethernet header. D. It is used for encryption.
C
Which of the following protocols are examples of TCP/IP transport layer protocols? A. Ethernet and HTTP B. IP and SMTP C. UDP and TCP D. All of the above
C
Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? A. It compares the unicast destination address to the bridging, or MAC address, table. B. It compares the unicast source address to the bridging, or MAC address, table. C. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. D. It compares the destination IP address to the destination MAC address. E. It compares the frame's incoming interface to the source MAC entry in the MAC address table.
C
Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? A. Burned-in address B. Unicast address C. Broadcast address and Multicast address D. None of the above
C
Wired Ethernet and Wi-Fi are based on which two IEEE standards, respectively? A. 802.1, 802.3 B. 802.3, 802.1 C. 802.3, 802.11 D. 802.11, 802.3'
C
An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to telnet to the branch office switches and supply only a password to login? (Choose three answers.) A. The ip address command in global configuration mode B. The ip default-gateway command in VLAN configuration mode C. The password command in console line configuration mode D. The password command in vty line configuration mode AND The ip address command in interface configuration mode AND The ip default-gateway command in global configuration mode
D
Consider the following output from a Cisco Catalyst switch:SW1# show mac address-table dynamicMac Address Table-------------------------------------------Vlan Mac Address Type Ports---- ----------- -------- -----1 02AA.AAAA.AAAA DYNAMIC Gi0/11 02BB.BBBB.BBBB DYNAMIC Gi0/21 02CC.CCCC.CCCC DYNAMIC Gi0/3Total Mac Addresses for this criterion: 3Which of the following answers is true about this switch? A. The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB. B. The switch has learned three MAC addresses since the switch powered on. C. The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch. D. 02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
D
Switch SW1 connects via a cable to switch SW2's G0/1 port. Which of the following conditions is the most likely to cause SW1's late collision counter to continue to increment? A. SW2's G0/1 has been configured with a shutdown interface subcommand. B. The two switches have been configured with different values on the speed interface subcommand. C. A duplex mismatch exists with SW1 set to full-duplex. D. A duplex mismatch exists with SW1 set to half-duplex.
D
Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers? A. DATA B. Chunk C. Segment D. Frame E. Packet
D
In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5? A. User mode B. Enable mode C. Global configuration mode D. VLAN mode E. Interface configuration mode
E
What command copies the configuration from RAM into NVRAM? A. copy running-config tftp B. copy tftp running-config C. copy running-config start-up-config D. copy start-up-config running-config E. copy startup-config running-config F. copy running-config startup-config
F
Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? A. Configure the negotiate disable interface subcommand B. Configure the no negotiate interface subcommand C. Configure the speed 100 interface subcommand D. Configure the duplex half interface subcommand E. Configure the duplex full interface subcommand F. Configure the speed 100 and duplex full interface subcommands
F