EMU IT150/IA150 Networking -- Bemus Final
You have created a named access list called BlockSales. Which of the following is a valid command for applying this to packets trying to enter interface Fo0/0 of your router?
(config-if)# ip access-group BlockSales in
On a VLSM network, which mask should you use on point-to-point WAN Links in order to reduce the wast of IP addresses?
/30
Which mask should you use on Point-to-point links in order to reduce the waste of IP address
/30
Which of the following is the wildcard (inverse) version of a /27 mask?
0.0.0.31
Which of the following network address correctly summarizes the three networks shown below efficiently? 10.0.0.0.16 10.1.0.0/16 10.2.0.0/16
10.0.0.0/14
Which of the following are private IP addresses? (Choose two)
10.0.0.1 192.168.24.43
In the network shown in the diagram, how many computers could be in Network B?
14
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this interface
172.16.112.0
Your router has the following IP address on the LAN interface: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?
172.16.2.255 172.16.3.0
What is the subnetwork address of a host with IP address of 172.16.66.0/21
172.16.64.0
Which of the following is the best summarization of the following networks: 192.168.128.0 through 192.168.159.0
192.168.128.0/19
You need to configure a server that is on the subnet 192.168.19..24/29. The router has the first available host address. which of the following should you assign to the server?
192.168.19.26 255.255.255.248
You have an interface on a router with the IP address of 192.168.192.10/29. what is the broadcast address the hosts will use on this LAN?
192.168.192.15
Which of the following hexadecimal numbers converts to 28 in decimal
1c
What is the subnetwork address for a host with the IP address 200.10.5.68/28
200.10.5.64
Which of the following is an example of a multicast address?
224.0.0.0
You have a network in your data center that needs 310 hosts. Which mask should you use so you wast the least amount of addresses?
255.255.254.0
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
30
You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many host IP address can there be on the LAN attached to the router interface?
6
What protocol is used to find the hardware address of a local device?
ARP
_____________________ on an Ethernet network is the retransmission delay that's enforced when a collision occurs.
Backoff
What issue arises when redundancy exists between switches shown below:
Broadcast storm
Which class of IP address provides a maximum of only 254 host addresses per network ID?
Class C
In the following diagram, in order to have IP address that's as efficient as possible, which network should use a /29 mask?
D
What network service is the most likely problem if you can ping a computer by IP address but not by name?
DNS
When configuring a terminal emulation program, which of the following is an incorrect setting?
Data bit: 1
What is the effect of this single-line access list? access-list 110 deny ip 172.16.10.0 0.0.0.255 host 1.1.1.1
Denies all traffic
what is the most common attack on a network today?
Dos
In the Ethernet II frame shown here, what is the function of the section labeled "FCS"?
Error Detection
What cable type is shown in the following graphic?
Fiber Optic
Which of the following is NOT an issue address by STP?
Gateway redundancy
Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process?
Gratuitous ARP
Which of the following services are ONLY TCP? (Choose two)
HTTP FTP
On which type of device could the situation shown in the diagram occur?
HUB
If a host is configured with an incorrect default gateway and all the other computers and router are known to be configured correctly, which of the following statements is TRUE?
Host A can communicate with other hosts in the same subnet.
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI Model?
Host-to-host
You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do to your network?
Implement IDS/IPS
what does the command confreg 0x2142 provide?
It is used to bypass the configuration in NVRAM.
Which of the following describe the DHCP discover message? (choose two)
It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. It uses UDP as the transport layer protocol.
The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?
NVRAM should be erased and the router restarted.
In the accompanying graphic, what is the name for the section of the MAC address marked as unknown?
OUI
Which of the following is true regarding access lists applied to an interface?
One access list may be configured, per direction, for each layer 3 protocol configured on an interface
you type the following command into the switch and receive the following output: Switch# show fastethernet 0/1
Part of the command is missing
Which of the following troubleshooting steps, if completed successfully, also confirms that the other steps will succeed as well?
Ping a remote computer.
The output of the show running-config command comes from
RAM
What cable type used the pinout arrangement shown below?
Rolled
The cable used to connect to the console port on a router or switch is called a _____________ Cable.
Rollover
Which of the following Application layer protocols sets up a secure session that's similar to Telnet?
SSH
In the diagram shown, what will the switch do if a frame with a destination MAC address of 000a.f467.63b1 is received on fa0/4 (Choose 3)
Send the frame out of Fa0/5 Send the frame out of Fa0/3 Send the frame out of Fa0/6
______________________ is the loop avoidance mechanism used by switches.
Spanning Tree Protocol (STP)
Which of the following prompts indicates that the switch is currently in privileged mode?
Switch#
Which of the following commands will configure all the default VTY port on a switch?
Switch(config)# line vty 0 4
What command do you type to save the configuration stored in RAM to NVRAM?
Swith# copy run start
You have your laptop directly connected to a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?
TFTP server software must be running on your laptop. The laptop must be on the same subnet as the router's ethernet interface. The copy flash tftp command must be supplied the ip address of the laptop.
What is the problem with an interface if you type show interface g0/1 and receive the following message? Gigabit 0/1 is administratively down, line protocol is down
The administrator has the interface shut down
What must happen if a DHCP IP conflict occurs?
The administrator must fix the conflict by hand at the DHCP server.
what will be the effect of executing the following command on port F0/1 switch(config-if)# switchport port-security mac-address 00C0.35F0.8301
The command statically defines the MAC address of 00c0.35f0.8301
You type the following into the router and reload. what will the router do? Router (config)# boot system flash c2800nm-advsecurityk9-mz.151-4.M6.bin Router (config)# config-register 0x2101 Router (config)# do sh ver [output cut] configuration register is 0x2102 (Will be 0x2101 at next reload)
The router will load the mini-IOS from the ROM.
Which of the following statements is FALSE with regard to Ethernet?
There are very few collisions in full-duplex mode.
To use VLSM, what capability must the routing protocols in use possess?
Transmission of subnet mask information
Which of the following statements is FALSE when a packet is being compared to an Access List?
Untill all lines have been analyzed, the comparison is not over
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command would you use?
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
Which access list will permit all HTTP sessions to network 192.168.144.0/24 containing web servers?
access-list 110 permit tcp any 192.168.144.0 0.0.0.255 eq 80
Which command will copy the IOS to a backup host on your network?
copy flash tftp
Which command loads a new version of the Cisco IOS into a router?
copy tftp flash
Which of the following commands sets the privileged mode password to Cisco and encrypts the password?
enable secret Cisco
Which command will delete the contents of NVRAM on a switch?
erase startup-config
On which default interface have you configured an IP address for a switch?
int vlan 1
Which command will show you the IOS version running on your router.
sh version
A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both current and new images?
show flash
what router command allows you to determine whether an IP access list is enabled on a particular interface?
show ip interfaces
Which command determines the licenses that are active on your system along with several status variables?
show license
Which Cisco IOS command is used to verify the port security configuration of a switch port?
show port-security interface
Which command displays the configuration register settings?
show version
Which command is required to disable the port of a security violation occurs?
switchport port-security violation shutdown
You type Switch# show r and receive a % ambiguous command error. Why did you receive this message?
there is more than one show command that starts with the letter r
Which of the following commands displays the networks traversed on a path to a network destination?
traceroute
Which of the following commands are required when configuring SSH on your router? (Choose Two)
username <name> password <password> IP domain-name <name>