ICND1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Answer: A,F

A network administrator is connecting PC hosts A and B directly through their Ethernet interfaces as shown in the graphic. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? (Choose two.) A. A crossover cable should be used in place of the straight-through cable. B. A rollover cable should be used in place of the straight-through cable. C. The subnet masks should be set to 255.255.255.192 D. A default gateway needs to be set on each host. E. The hosts must be reconfigured to use private IP addresses for direct connections of this type. F. The subnet masks should be set to 255.255.255.0

Answer: B Explanation: Explanation/Reference: HELLO messages are used to maintain adjacent neighbors so even when the network is converged, hellos are still exchanged. On broadcast and point-to-point links, the default is 10 seconds, on NBMA the default is 30 seconds. Although OSPF is a link-state protocol the full database from each router is sent every 30 minutes (not seconds) therefore, C and D are not correct.

After the network has converged, what type of messaging, if any, occurs between R3 and R4? A. No messages are exchanged B. Hellos are sent every 10 seconds. C. The full database from each router is sent every 30 seconds. D. The routing table from each router is sent every 60 seconds.

To what type of port would a cable with a DB-60 connector attach? A. Serial port B. Console port C. Ethernet port D. Fibre optic port

Answer: A

Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? (Choose three.) A. An IPv6 address is divided into eight 16-bit groups. B. A double colon (::) can only be used once in a single IPv6 address. C. IPv6 addresses are 196 bits in length. D. Leading zeros cannot be omitted in an IPv6 address. E. Groups with a value of 0 can be represented with a single 0 in IPv6 address.

Answer: A,B,E Explanation: Explanation/Reference: IPv6 addresses are divided into eight 16-bit groups, a double colon (::) can only be used once in an IPv6 address, and groups with a value of 0 can be represented with a single 0 in an IPv6 address. The following statements are also true regarding IPv6 address: -IPv6 addresses are 128 bits in length. -Eight 16-bit groups are divided by a colon (:). -Multiple groups of 16-bit 0s can be represented with double colon (::). -Double colons (::) represent only 0s. -Leading zeros can be omitted in an IPv6 address. -The option stating that IPv6 addresses are 196 bits in length is incorrect. -IPv6 addresses are 128 bits in length. -The option stating that leading zeros cannot be omitted in an IPv6 address is incorrect. Leading zeros can be omitted in an IPv6 address.

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.) A. There are no collisions in full-duplex mode. B. A dedicated switch port is required for each full-duplex node. C. Ethernet hub ports are preconfigured for full-duplex mode. D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting. E. The host network card and the switch port must be capable of operating in full-duplex mode.

Answer: A,B,E Explanation: Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernet—typically 10BaseT—is only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbps—at most. Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you don't need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet.

Identify the four valid IPv6 addresses. (Choose four.) A. :: B. ::192:168:0:1 C. 2000:: D. 2001:3452:4952:2837:: E. 2002:c0a8:101::42 F. 2003:dead:beef:4dad:23:46:bb:101

Answer: A,B,E,F Explanation: Explanation/Reference: http://www.intermapper.com/ipv6validator http://www.ripe.net/lir-services/new-lir/ipv6_reference_card.pdf

What two things does a router do when it forwards a packet? (Choose two.) A. switches the packet to the appropriate outgoing interfaces B. computes the destination host address C. determines the next hop on the path D. updates the destination IP address E. forwards ARP requests

Answer: A,C Explanation: Explanation/Reference: Without following these two processes namely switching the packet to appropriate interface and telling the packet where to go by providing it with a destination IP address, the purpose of the same would not be solved.

Which two characteristics apply to Layer 2 switches? (Choose two.) A. Increases the number of collision domains B. Decreases the number of collision domains C. Implements VLAN D. Decreases the number of broadcast domains E. Uses the IP address to make decisions for forwarding data packets

Answer: A,C Explanation: Layer 2 switches offer a number of benefits to hubs, such as the use of VLANs and each switch port is in its own separate collision domain, thus eliminating collisions on the segment.

Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.) A. 10.1.168.0 B. 10.1.176.1 C. 10.1.174.255 D. 10.1.160.255 E. 10.1.160.0 F. 10.1.175.255

Answer: A,C,D Explanation: Explanation/Reference: All IP address in IP ranges between: 10.1.160.1 and 10.1.175.254 are valid as shown below Address: 10.1.160.0 00001010.00000001.1010 0000.00000000 Netmask: 255.255.240.0 = 20 11111111.11111111.1111 0000.00000000 Wildcard: 0.0.15.255 00000000.00000000.0000 1111.11111111 Which implies that: Network: 10.1.160.0/20 00001010.00000001.1010 0000.00000000 HostMin: 10.1.160.1 00001010.00000001.1010 0000.00000001 HostMax: 10.1.175.254 00001010.00000001.1010 1111.11111110 Broadcast: 10.1.175.255 00001010.00000001.1010 1111.11111111

Which of the following are types of flow control? (Choose three.) A. buffering B. cut-through C. windowing D. congestion avoidance E. load balancing

Answer: A,C,D Explanation: Explanation/Reference: http://www.info-it.net/cisco/ccna/exam-tips/flow-control.php During Transfer of data, a high speed computer is generating data traffic a lot faster than the network device can handle in transferring to destination, so single gateway or destination device cannot handle much amount of traffic that is called "Congestion". Buffering - The technique is used to control the data transfer when we have congestion, when a network device receive a data it stores in memory section and then transfer to next destination this process called "Buffering". Windowing Whereas Windowing is used for flow control by the Transport layer. Say the sender device is sending segments and the receiver device can accommodate only a fixed number of segments before it can accept more, the two devices negotiate the window size during the connection setup. This is done so that the sending device doesn't overflow the receiving device's buffer. Also the receiving device can send a single acknowledgement for the segments it has received instead of sending an acknowledgement after every segment received. Also, this window size is dynamic meaning, the devices can negotiate and change the window size in the middle of a session. So if initially the window size is three and the receiving device thinks that it can accept more number of segments in its buffer it can negotiate with the sending device and it increase it to say 5 for example. Windowing is used only by TCP since UDP doesn't use or allow flow control.

On a live network, which commands will verify the operational status of router interfaces? (Choose two.) A. Router# show interfaces B. Router# show ip protocols C. Router# debug interface D. Router# show ip interface brief E. Router# show start

Answer: A,D Explanation: Explanation/Reference: Both these commands will show the current status of the interfaces, either in show or debug mode both will display the information.

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.) A. Global addresses start with 2000::/3. B. Link-local addresses start with FE00:/12. C. Link-local addresses start with FF00::/10. D. There is only one loopback address and it is ::1. E. If a global address is assigned to an interface, then that is the only allowable address for the interface.

Answer: A,D Explanation:

The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements. Which three items will adequately fulfill the request? (Choose three). A. One IP subnet with a mask of 255.255.254.0 B. Two IP subnets with a mask of 255.255.255.0 C. Seven 48-port hubs D. Seven 48-port switches E. One router interface F. Seven router interfaces

Answer: A,D,E Explanation: Explanation/Reference: of 255.255.254.0 can absorb 510 hosts being 23 bits mask and also 7*48 port switches can handle this much hosts and router interface is required to be minimum to avoid unnecessary wastage hence the answers.

How many addresses will be available for dynamic NAT translation when a router is configured with the following commands? Router(config)#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224 Router(config)#ip nat inside source list 9 pool TAME A. 7 B. 8 C. 9 D. 10 E. 24 F. 32

Answer: B Explanation: Explanation/Reference: 209.165.201.23 to 209.165.201.30 provides for 8 addresses.

Which IOS command is used to initiate a login into a VTY port on a remote router? A. router# login B. router# telnet C. router# trace D. router# ping E. router(config)# line vty 0 5 F. router(config-line)# login

Answer: B Explanation: Explanation/Reference: VTY ports are telnet ports hence command B will initiate login to the telnet port.

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? A. 4, 48 B. 48, 4 C. 48, 1 D. 1, 48 E. 4, 1

Answer: B Explanation: A switch uses a separate collision domain for each port, and each VLAN is a separate broadcast domain.

Which network device functions only at Layer 1 of the OSI model? A. Bridge B. Hub C. NIC D. Router E. Switch

Answer: B Explanation: Most hubs are amplifying the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.

Which statements accurately describe CDP? (Choose three.) A. CDP is an IEEE standard protocol. B. CDP is a Cisco proprietary protocol. C. CDP is a datalink layer protocol. D. CDP is a network layer protocol. E. CDP can discover directly connected neighboring Cisco devices. F. CDP can discover Cisco devices that are not directly connected.

Answer: B,C,E Explanation: CDP (Cisco Discovery Protocol) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices containing useful info for troubleshooting and documenting the network.

How does a switch differ from a hub? A. A switch does not induce any latency into the frame transfer time. B. A switch tracks MAC addresses of directly-connected devices. C. A switch operates at a lower, more efficient layer of the OSI model. D. A switch decreases the number of broadcast domains. E. A switch decreases the number of collision domains.

Answer: B Explanation: Some of the features and functions of a switch include: A switch is essentially a fast, multi-port bridge, which can contain dozens of ports. Rather than creating two collision domains, each port creates its own collision domain. In a network of twenty nodes, twenty collision domains exist if each node is plugged into its own switch port. If an uplink port is included, one switch creates twenty-one single-node collision domains. A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, holding all of the necessary MAC information for each port. For a detailed description of how switches operate, and their key differences to hubs, see the reference link below. ReferencE. http://www.cisco.com/warp/public/473/lan-switch-cisco.shtml

What is the purpose of assigning an IP address to a switch? A. provides local hosts with a default gateway address B. allows remote management of the switch C. allows the switch to respond to ARP requests between two hosts D. ensures that hosts on the same LAN can communicate with each other

Answer: B Explanation: Switch is a layer 2 device and doesn't use network layer for packet forwarding. The IP address may be used only for administrative purposes such as Telnet access or for network management purposes.

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame? A. drop the frame B. forward it out of all ports except the one that received it C. forward it out of all ports D. store it until it learns the correct port

Answer: B Explanation: Understanding this concept is prime for understanding that when switch receives the data frame from the host not having the MAC address already in the MAC table, it will add the MAC address to the source port on the MAC address table and sends the data frame. If the switch already has the MAC address in it's table for the destination, it will forward the frame directly to the destination port. If it was not already in it's MAC table, then they frame would have been flooded out all ports except for the port that it came from.

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? A. 1 B. 2 C. 4 D. 8 E. 252 F. 254

Answer: B Explanation: Explanation/Reference: /30 CIDR corresponds to mask 55.255.255.252 whose binary is 11111100 which means 6 subnet bits and 2 host bits which means 62 subnets and 2 hosts per subnet.

Which command enables IPv6 forwarding on a Cisco router? A. ipv6 host B. ipv6 unicast-routing C. ipv6 local D. ipv6 neighbor

Answer: B Explanation: Explanation/Reference: Enabling IPv6 on Cisco IOS Software Technology http://www.ciscopress.com/articles/article.asp?p=31948&seqNum=4 The first step of enabling IPv6 on a Cisco router is the activation of IPv6 traffic forwarding to forward unicast IPv6 packets between network interfaces. By default, IPv6 traffic forwarding is disabled on Cisco routers. The ipv6 unicast-routing command is used to enable the forwarding of IPv6 packets between interfaces on the router. The syntax for this command is as follows: Router(config)#ipv6 unicast-routing The ipv6 unicast-routing command is enabled on a global basis.

Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224? A. 192.168.2.63 B. 192.168.2.62 C. 192.168.2.61 D. 192.168.2.60 E. 192.168.2.32

Answer: B Explanation: Explanation/Reference: With the 224 there are 8 networks with increments of 32 One of these is 32 33 62 63 where 63 is broadcast so 62 is last valid host out of given choices.

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.) A. router#show version B. router#show ip interface C. router#show protocols D. router#show controllers E. router#show running-config

Answer: B,C

Which two of these functions do routers perform on packets? (Choose two.) A. Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets B. Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops C. Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets D. Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations E. Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops F. Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations

Answer: B,C Explanation: Explanation/Reference: This is the basic function of the router to receive incoming packets and then forward them to their required destination. This is done by reading layer 3 headers of inbound packets and update the info to layer 2 for further hopping.

Which two of these statements are true of IPv6 address representation? (Choose two.) A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast. B. A single interface may be assigned multiple IPv6 addresses of any type. C. Every IPv6 interface contains at least one loopback address. D. The first 64 bits represent the dynamically created interface ID. E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

Answer: B,C Explanation: Explanation/Reference: http://www.cisco.com/en/US/technologies/tk648/tk872/ technologies_white_paper0900aecd802600 3d.pdf A single interface may be assigned multiple addresses of any type (unicast, anycast, multicast). Every IPv6-enabled interface must contain at least one loopback and one link-local address. Optionally, every interface can have multiple unique local and global addresses. IPv6 host addresses can be assigned in multiple ways: Static configuration Stateless autoconfiguration DHCPv6 When IPv6 is used over Ethernet networks, the Ethernet MAC address can be used to generate the 64-bit interface ID for the host. This is called the EUI-64 address.

How does TCP differ from UDP? (Choose two.) A. TCP provides best effort delivery. B. TCP provides synchronized communication. C. TCP segments are essentially datagrams. D. TCP provides sequence numbering of packets. E. TCP uses broadcast delivery.

Answer: B,D

Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.) A. a bridge B. a router C. a hub D. a Layer 3 switch E. an access point

Answer: B,D Explanation: Routers and layer 3 switches will not propagate broadcast traffic beyond the local segment, so the use of these devices is the best method for eliminating broadcast storms.

What are two common TCP applications? (Choose two.) A. TFTP B. SMTP C. SNMP D. FTP E. DNS

Answer: B,D Explanation: SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21. http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/

Which two statements describe the IP address 10.16.3.65/23? (Choose two.) A. The subnet address is 10.16.3.0 255.255.254.0. B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0 D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. E. The network is not subnetted.

Answer: B,D Explanation: Explanation/Reference: The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) A. layer 3 support B. port security C. redundant components D. VLANs E. PoE

Answer: B,D Explanation: http://www.ciscopath.com/content/61/ http://www.mcmcse.com/cisco/guides/hierarchical_model.shtml Access layer The main purpose of the access layer is to provide direct connection to devices on the network and controlling which devices are allowed to communicate over it. The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest of the network. The access layer can include routers, switches, bridges, hubs, and wireless access points (AP). Switch features in the Access layer:

Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three) A. static mapping of IPv4 address to IPv6 addresses B. configuring IPv4 tunnels between IPv6 islands C. use DHCPv6 to map IPv4 addresses to IPv6 addresses D. use proxying and translation (NAT-PT) to translate IPv6 packets into IPv4 packets E. configure IPv6 directly F. enable dual-stack routing

Answer: B,D,F Explanation: Explanation/ Reference: http://www.opus1.com/ipv6/howdoitransitiontoipv6.html Connecting IPv6 islands with tunnels An IPv6 island is a network made of IPv6 links directly connected by IPv6 routers. In the early days of IPv6 deployment, there are many IPv6 islands. IPv6 in IPv4 tunnels are used to connect those islands together. In each island, one (or more) dual stack routers are designated to encapsulate and decapsulate IPv6 packets within IPv4 packets. Different mechanisms have been developed to manage tunnels: automatic tunnels3, configured tunnels3, tunnel brokers3, 6over43, 6to43,... Reference 2: http://www.petri.co.il/ipv6-transition.htm Network Address Translation - Protocol Translation (NAT-PT) The NAT-PT method enables the ability to either statically or dynamically configure a translation of a IPv4 network address into an IPv6 network address and vice versa. For those familiar with more typically NAT implementations, the operation is very similar but includes a protocol translation function. NAT-PT also ties in an Application Layer Gateway (ALG) functionality that converts Domain Name System (DNS) mappings between protocols. Dual Stack The simplest approach when transitioning to IPv6 is to run IPv6 on all of the devices that are currently running IPv4. If this is something that is possible within the organizational network, it is very easy to implement. However, for many organizations, IPv6 is not supported on all of the IPv4 devices; in these situations other methods must be considered.

Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two.) A. 10.6.8.35 B. 133.6.5.4 C. 192.168.5.9 D. 127.0.0.1 E. 190.6.5.4

Answer: B,E Explanation: Explanation/Reference: The IP addresses 133.6.5.4 and 190.6.5.4 are both valid Class B addresses when a default mask is in use. The Class B default mask is 255.255.0.0 and the range of valid addresses is 128.0.0.0- 191.255.255.255. The IP address 10.6.8.35 is a Class A address. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned. The IP address 192.168.5.9 is a Class C address. The Class C default mask is 255.255.255.0 and the range of valid addresses is 192.0.0.0 - 223.255.255.255. The IP address 127.0.0.1 is a Class A address, but it comes from a reserved portion that cannot be assigned. The range 127.0.0.1 - 127.255.255.255 is used for diagnostics, and although any address in the range will work as a diagnostic address, 127.0.0.1 is known as the loopback address. If you can ping this address, or any address in the 127.0.0.1 - 127.255.255.255 range, then the NIC is working and TCP/IP is installed. The Class A default mask is 255.0.0.0 and the range of valid addresses is 1.0.0.0 - 127.255.255.255, with the exception of the range 127.0.0.1 - 127.255.255.255, which is reserved and cannot be assigned.

Which OSI layer header contains the address of a destination host that is on another network? A. application B. session C. transport D. network E. data link F. physical

Answer: D Explanation: Explanation/Reference: Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same.

Which two statements describe the operation of the CSMA/CD access method? (Choose two.) A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method. D. After a collision, the station that detected the collision has first priority to resend the lost data. E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.

Answer: B,E Explanation: Ethernet networking uses Carrier Sense Multiple Access with Collision Detect (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different nodes. And trust me, good collision management is crucial, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and examine that transmission. Only bridges and routers can effectively prevent a transmission from propagating throughout the entire network! So, how does the CSMA/CD protocol work? Like this: when a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. But it doesn't stop there. The transmitting host constantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam signal that causes all nodes on the segment to stop sending data (think, busy signal). The nodes respond to that jam signal by waiting a while before attempting to transmit again. Back off algorithms determine when the colliding stations can retransmit. If collisions keep occurring after 15 tries, the nodes attempting to transmit will then time out.

An administrator must assign static IP addresses to the servers in a network. For network192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server? A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9 B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1 C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25 D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17 E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25

Answer: C

What is the subnet address for the IP address 172.19.20.23/28? A. 172.19.20.0 B. 172.19.20.15 C. 172.19.20.16 D. 172.19.20.20 E. 172.19.20.32

Answer: C

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command? A. The interface with IP address 192.168.10.2 is on this router. B. The command sets a gateway of last resort for the router. C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2. D. The command creates a static route for all IP traffic with the source address 192.168.100.160.

Answer: C Explanation: Explanation/Reference: 160 it's actually network address of /27 so any address within the range of 160 network will be sent to 192.168.10.2

What is the default administrative distance of the OSPF routing protocol? A. 90 B. 100 C. 110 D. 120 E. 130 F. 170

Answer: C Explanation: Explanation/Reference: Default Distance Value Table This table lists the administrative distance default values of the protocols that Cisco supports: If the administrative distance is 255, the router does not believe the source of that route and does not install the route in the routing table.

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration? A. Router# show startup-config B. Router# show current-config C. Router# show running-config D. Router# show memory E. Router# show flash F. Router# show processes

Answer: C Explanation: Explanation/Reference: This command followed by the appropriate parameter will show the running config hence the admin will be able to see what changes have been made, and then they can be saved.

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments? A. Physical B. Data-link C. Transport D. Network

Answer: C Explanation:

Which protocol uses a connection-oriented service to deliver files between end systems? A. TFTP B. DNS C. FTP D. SNMP E. RIP

Answer: C Explanation: FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor? A. RTP B. TCP C. CDP D. UDP

Answer: C Explanation: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/ciscodiscoveryprotocol. html The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details, and Quality of Service (QoS) configuration information with the Cisco Catalyst switch. Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting the network. CDP messages are generated every 60 seconds as multicast messages on each of its active interfaces. The information shared in a CDP packet about a Cisco device includes the following: Name of the device configured with the hostname command IOS software version Hardware capabilities, such as routing, switching, and/or bridging Hardware platform, such as 2600, 2950, or 1900 The layer-3 address(es) of the device the interface the CDP update was generated on.

Which IP address is a private address? A. 12.0.0.1 B. 168.172.19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.169.42.34

Answer: C Explanation: Explanation/Reference:

Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address? A. 192.168.1.8/29 B. 192.168.1.32/27 C. 192.168.1.40/29 D. 192.168.1.16/28 E. 192.168.1.48/29

Answer: C Explanation: Explanation/Reference: 248 mask uses 5 bits (1111 1000) 42 IP in binary is (0010 1010) The base subnet therefore is the lowest binary value that can be written without changing the output of an AND operation of the subnet mask and IP... 1111 1000 AND 0010 1010 equals 0010 1000 - which is .40 /24 is standard class C mask. Adding the 5 bits from the .248 mask gives /29

What is the network address for the host with IP address 192.168.23.61/28? A. 192.168.23.0 B. 192.168.23.32 C. 192.168.23.48 D. 192.168.23.56 E. 192.168.23.60

Answer: C Explanation: Explanation/Reference: Convert bit-length prefix to quad-dotted decimal representation, then from it find the number of bits used for subnetting you can find previously calculated number of subnets by separating subnets each having value of last bit used for subnet masking Find that your IP address is in which subnet, that subnet's first address is network address and last address is broadcast address. Based on above steps the answer is option C

What is the subnet address of 172.16.159.159/22? A. 172.16.0.0 B. 172.16.128.0 C. 172.16.156.0 D. 172.16.159.0 E. 172.16.159.128 F. 172.16.192.0

Answer: C Explanation: Explanation/Reference: Converting to binary format it comes to 11111111.11111111.11111100.00000000 or 255.255.252.0 Starting with 172.16.0.0 and having increment of 4 we get.

If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet? A. 1024 B. 2046 C. 4094 D. 4096 E. 8190

Answer: C Explanation: Explanation/Reference: Each octet represents eight bits. The bits, in turn, represent (from left to right): 128, 64, 32 , 16 , 8, 4, 2, 1 Add them up and you get 255. Add one for the all zeros option, and the total is 256. Now take away one of these for the network address (all zeros) and another for the broadcast address (all ones). Each octet represents 254 possible hosts. Or 254 possible networks. Unless you have subnet zero set on your network gear, in which case you could conceivably have 255. The CIDR addressing format (/20) tells us that 20 bits are used for the network portion, so the maximum number of networks are 2^20 minus one if you have subnet zero enabled, or minus 2 if not. You asked about the number of hosts. That will be 32 minus the number of network bits, minus two. So calculate it as (2^(32-20))-2, or (2^12)-2 = 4094

What is the purpose of flow control? A. To ensure data is retransmitted if an acknowledgement is not received. B. To reassemble segments in the correct order at the destination device. C. To provide a means for the receiver to govern the amount of data sent by the sender. D. To regulate the size of each segment.

Answer: C Explanation: Explanation/Reference: http://whatis.techtarget.com/definition/flow-control Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted. For serial data transmission locally or in a network, the Xon/Xoff protocol can be used. For modem connections, either Xon/Xoff or CTS/RTS (Clear to Send/Ready to Send) commands can be used to control data flow. In a network, flow control can also be applied by refusing additional device connections until the flow of traffic has subsided.

Which statements are true regarding ICMP packets? (Choose two.) A. They acknowledge receipt of TCP segments. B. They guarantee datagram delivery. C. TRACERT uses ICMP packets. D. They are encapsulated within IP datagrams. E. They are encapsulated within UDP datagrams.

Answer: C,D Explanation: Ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol). ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet's Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively. In the ping service, after receiving the ICMP "echo request" packet from the source location, the destination

An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.) A. 192.168.4.61 B. 192.168.4.63 C. 192.168.4.67 D. 192.168.4.125 E. 192.168.4.128 F. 192.168.4.132

Answer: C,D Explanation: Only the values of host with 67 and 125 fall within the range of /26 CIDR subnet mask, all others lie beyond it.

Which command can you use to manually assign a static IPV6 address to a router interface? A. ipv6 address PREFIX_1::1/64 B. ipv6 autoconfig 2001:db8:2222:7272::72/64 C. ipv6 autoconfig D. ipv6 address 2001:db8:2222:7272::72/64

Answer: D

Which router command will configure an interface with the IP address 10.10.80.1/19? A. router(config-if)# ip address 10.10.80.1/19 B. router(config-if)# ip address 10.10.80.1 255.255.0.0 C. router(config-if)# ip address 10.10.80.1 255.255.255.0 D. router(config-if)# ip address 10.10.80.1 255.255.224.0 E. router(config-if)# ip address 10.10.80.1 255.255.240.0 F. router(config-if)# ip address 10.10.80.1 255.255.255.240

Answer: D Explanation: Explanation/Reference: 255.255.224 equal /19 in CIDR format hence the answer

What does administrative distance refer to? A. the cost of a link between two neighboring routers B. the advertised cost to reach a network C. the cost to reach a network that is administratively set D. a measure of the trustworthiness of a routing information source

Answer: D Explanation: Explanation/Reference: http://www.cisco.com/en/US/tech/tk365/ technologies_tech_note09186a0080094195.shtml Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value. Administrative distance is the first criterion that a router uses to determine which routing protocol to use if two protocols provide route information for the same destination. Administrative distance is a measure of the trustworthiness of the source of the routing information. The smaller the administrative distance value, the more reliable the protocol.

What must occur before a workstation can exchange HTTP packets with a web server? A. A UDP connection must be established between the workstation and its default gateway. B. A UDP connection must be established between the workstation and the web server. C. A TCP connection must be established between the workstation and its default gateway. D. A TCP connection must be established between the workstation and the web server. E. An ICMP connection must be established between the workstation and its default gateway. F. An ICMP connection must be established between the workstation and the web server.

Answer: D Explanation: HTTP uses TCP port 80. http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/

What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address? A. Drops the frame B. Sends out a Layer 3 broadcast message C. Sends a message to the router requesting the address D. Sends out an ARP request with the destination IP address

Answer: D Explanation: In this case, it will send out an ARP request for MAC address of the destination IP (assuming it doesn't already have it in its table) and then address it to the destination's MAC address.

Which layer of the TCP/IP stack combines the OSI model physical and data link layers? A. Internet layer B. transport layer C. application layer D. network access layer

Answer: D Explanation: Explanation/Reference: The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD's goal was to bring international standards which could not be met by the OSI model. Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather then the OSI. Below is a side by side comparison of the TCP/IP and OSI models.

Which statement about IPv6 is true? A. Addresses are not hierarchical and are assigned at random. B. Only one IPv6 address can exist on a given interface. C. There are 2.7 billion addresses available. D. Broadcasts have been eliminated and replaced with multicasts.

Answer: D Explanation: Explanation/Reference: http://technet.microsoft.com/en-us/library/cc757359(v=ws.10).aspx IPv6 has three types of addresses, which can be categorized by type and scope: Unicast addresses. A packet is delivered to one interface. Multicast addresses. A packet is delivered to multiple interfaces. Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of routing distance). IPv6 does not use broadcast messages. Unicast and anycast addresses in IPv6 have the following scopes (for multicast addresses, the scope are built into the address structure): Link-local. The scope is the local link (nodes on the same subnet). Site-local. The scope is the organization (private site addressing). Global. The scope is global (IPv6 Internet addresses). In addition, IPv6 has special addresses such as the loopback address. The scope of a special address depends on the type of special address. Much of the IPv6 address space is unassigned.

Which statement is true? A. An IPv6 address is 64 bits long and is represented as hexadecimal characters. B. An IPv6 address is 32 bits long and is represented as decimal digits. C. An IPv6 address is 128 bits long and is represented as decimal digits. D. An IPv6 address is 128 bits long and is represented as hexadecimal characters.

Answer: D Explanation: Explanation/Reference: http://www.cisco.com/en/US/technologies/tk648/tk872/ technologies_white_paper0900aecd802600 3d.pdf One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field The last 64 bits are used for the interface ID

How many bits are contained in each field of an IPv6 address? A. 24 B. 4 C. 8 D. 16

Answer: D Explanation: Explanation/Reference: http://www.cisco.com/en/US/technologies/tk648/tk872/ technologies_white_paper0900aecd8026003d.pdf One of the key advantages IPv6 brings is the exponentially larger address space. The following will outline the basic address architecture of IPv6. 128-bit-long addresses Represented in hexadecimal format: Uses CIDR principles: prefix/prefix length x:x:x:x:x:x:x:x, where x is a 16-bit hex field. The last 64 bits are used for the interface ID

Which option is a valid IPv6 address? A. 2001:0000:130F::099a::12a B. 2002:7654:A1AD:61:81AF:CCC1 C. FEC0:ABCD:WXYZ:0067::2A4 D. 2004:1:25A4:886F::1

Answer: D Explanation: Explanation/Reference: http://www.ipv6.com/articles/general/IPv6-Addressing.htm IPv6 Address Notation IPv6 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them. Following is an example of a valid IPv6 address: 2001:cdba:0000:0000:0000:0000:3257:9652 Any four-digit group of zeroes within an IPv6 address may be reduced to a single zero or altogether omitted. Therefore, the following IPv6 addresses are similar and equally valid: 2001:cdba:0000:0000:0000:0000:3257:9652 2001:cdba:0:0:0:0:3257:9652 2001:cdba::3257:9652 The URL for the above address will be of the form: http://[2001:cdba:0000:0000:0000:0000:3257:9652]/

How many simultaneous Telnet sessions does a Cisco router support by default? A. 1 B. 2 C. 3 D. 4 E. 5 F. 6

Answer: E

Which address type does a switch use to make selective forwarding decisions? A. Source IP address B. Destination IP address C. Source and destination IP address D. Source MAC address E. Destination MAC address

Answer: E Explanation: Switches analyze the destination MAC to make its forwarding decision since it is a layer 2 device. Routers use the destination IP address to make forwarding decisions.

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server? A. HTTP B. DNS C. DHCP D. RARP E. ARP

Answer: E Explanation: The RARP protocol is used to translate hardware interface addresses to protocol addresses. The RARP message format is very similar to the ARP format. When the booting computer sends the broadcast ARP request, it places its own hardware address in both the sending and receiving fields in the encapsulated ARP data packet. The RARP server will fill in the correct sending and receiving IP addresses in its response to the message. This way the booting computer will know its IP address when it gets the message from the RARP server

Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required? A. HTTP B. IP C. TCP D. Telnet E. UDP

Answer: E Explanation: UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services.

At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate? A. application B. transport C. network D. physical E. data link

Answer: E Explanation: http://computernetworkingnotes.com/cisco-devices-administration-and-configuration/ciscodiscoveryprotocol. html CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols. CDP allows devices to share basic configuration information without even configuring any protocol specific information and is enabled by default on all interfaces. CDP is a Datalink Protocol occurring at Layer 2 of the OSI model. CDP is not routable and can only go over to directly connected devices. CDP is enabled, by default, on all Cisco devices. CDP updates are generated as multicasts every 60 seconds with a hold-down period of 180 seconds for a missing neighbor. The no cdp run command globally disables CDP, while the no cdp enable command disables CDP on an interface. Use show cdp neighbors to list out your directly connected Cisco neighboring devices. Adding the detail parameter will display the layer-3 addressing configured on the neighbor.

Answer: A Explanation: Explanation/Reference: The Router ID (RID) is an IP address used to identify the router and is chosen using the following sequencE. + The highest IP address assigned to a loopback (logical) interface. + If a loopback interface is not defined, the highest IP address of all active router's physical interfaces will be chosen. + The router ID can be manually assigned In this case, because a loopback interface is not configured so the highest active IP address 192.168.0.1 is chosen as the router ID.

R1 is configured with the default configuration of OSPF. From the following list of IP addresses configured on R1, which address will the OSPF process select as the router ID? A. 192.168.0.1 B. 172.16.1.1 C. 172.16.2.1 D. 172.16.2.225

Answer: C Explanation: Explanation/Reference: Only a router can terminate a leased line attachment access circuit, and only a router can connect two different IP networks. Here, we will need a router with two interfaces, one serial connection for the line attachment and one Ethernet interface to connect to the switch on the LAN.

Refer to the exhibit. A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation? A. a router with two Ethernet interfaces B. a switch with two Ethernet interfaces C. a router with one Ethernet and one serial interface D. a switch with one Ethernet and one serial interface E. a router with one Ethernet and one modem interface

Answer: A,D,E Explanation: Switches use a separate collision domain for each port, so device A must be a switch. Hubs, however, place all ports in the same collision domain so device B is a hub. Switches reside in layer 2 while hubs are layer 1 devices.

Refer to the exhibit. A network has been planned as shown. Which three statements accurately describe the areas and devices in the network plan? (Choose three.) A. Network Device A is a switch. B. Network Device B is a switch. C. Network Device A is a hub. D. Network Device B is a hub. E. Area 1 contains a Layer 2 device. F. Area 2 contains a Layer 2 device.

Answer: E Explanation: A switch uses a separate collision domain for each port so there are a total of 9 for each device shown. In addition to this, the switch to switch connections (3) are a separate collision domain. Finally, we add the switch to router connections (2) and the router to router connection (1) for a total of 15.

Refer to the exhibit. All devices attached to the network are shown. How many collision domains are present in this network? A. 2 B. 3 C. 6 D. 9 E. 15

Answer: E Explanation: When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing router's interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination router's interface address.

Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B? A. 10.168.10.99 B. 10.168.11.88 C. A1:A1:A1:A1:A1:A1 D. B2:B2:B2:B2:B2:B2 E. C3:C3:C3:C3:C3:C3 F. D4:D4:D4:D4:D4:D4

Answer: B,D,F Explanation: Switches use the destination MAC address information for forwarding traffic, while routers use the destination IP address information. Local Area Networks employ Layer 2 Switches and Bridges to forward and filter network traffic. Switches and Bridges operate at the Data Link Layer of the Open System Interconnect Model (OSI). Since Switches and Bridges operate at the Layer 2 they operate more intelligently than hubs, which work at Layer 1 (Physical Layer) of the OSI. Because the switches and bridges are able to listen to the traffic on the wire to examine the source and destination MAC address. Being able to listen to the traffic also allows the switches and bridges to compile a MAC address table to better filter and forward network traffic. To accomplish the above functions switches and bridges carry out the following tasks: MAC address learning by a switch or a bridge is accomplished by the same method. The switch or bridge listens to each device connected to each of its ports and scan the incoming frame for the source MAC address. This creates a MAC address to port map that is cataloged in the switches/bridge MAC database. Another name for the MAC address table is content addressable memory or CAM table. When a switch or bridge is listening o the network traffic, it receives each frame and compares it to the MAC address table. By checking the MAC table the switch/ bridge are able o determine which port the frame came in on. If the frame is on the MAC table the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is forwarded out to all ports except the incoming port.

Refer to the exhibit. As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.) A. Hub1 B. Switch1 C. Router1 D. Switch2 E. Router2 F. Switch3

Answer: E Reference: http://www.technicalhowto.com/protocols/arp/arp.html For the initial communication, Host A will send a broadcast ARP (all F's) to determine the correct address to use to reach the destination. ARP sends an Ethernet frame called an ARP request to every host on the shared link-layer segment. The Ethernet header includes the source host MAC address and a destination address of all Fs representing a broadcast frame. The ARP request contains the sender's MAC and IP address and the target (destination) IP address. The target's MAC address is set to all 0s.

Refer to the exhibit. Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request? A. 192.168.0.1 B. 172.16.0.50 C. 00-17-94-61-18-b0 D. 00-19-d3-2d-c3-b2 E. ff-ff-ff-ff-ff-ff F. 255.255.255.255

Answer: E Explanation: For packets destined to a host on another IP network, the destination MAC address will be the LAN interface of the router. Since the FTP server lies on a different network, the host will know to send the frame to its default gateway, which is Toronto.

Refer to the exhibit. HostX is transferring a file to the FTP server. Point A represents the frame as it goes toward the Toronto router. What will the Layer 2 destination address be at this point? A. abcd.1123.0045 B. 192.168.7.17 C. aabb.5555.2222 D. 192.168.1.1 E. abcd.2246.0035

Answer: B Explanation: Explanation/Reference: Hubs create single collision and broadcast domains.

Refer to the exhibit. How many collision domains are shown? A. one B. two C. three D. four E. six F.twelve

Answer: C Explanation: Explanation/Reference: A Cisco device enabled with CDP sends out periodic interface updates to a multicast address in order to make itself known to neighbors. Since it is a layer two protocol, these packets are not routed. So the devices detected would be immediate connected neighbors.

Refer to the exhibit. If CDP is enabled on all devices and interfaces, which devices will appear in the output of a show cdp neighbors command issued from R2? A. R2 and R3 B. R1 and R3 C. R3 and S2 D. R1, S1, S2, and R3 E. R1, S1, S2, R3, and S3

Answer: C Explanation: Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.

Refer to the exhibit. If the hubs in the graphic were replaced by switches, what would be virtually eliminated? A. broadcast domains B. repeater domains C. Ethernet collisions D. signal amplification E. Ethernet broadcasts

Answer: C Explanation: Explanation/Reference: After resuming the telnet session by using the Enter key after it has been suspended, it will resume back to the telnet session so it will be back to the router2> prompt.

Refer to the exhibit. If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed? A. Router1> B. Router1# C. Router2> D. Router2#

Answer: B Explanation: The Source and Destination IP address is not going to change. Host 1 IP address will stay as being the source IP and the Host 2 IP address will stay the destination IP address. Those two are not going to change. For the MAC address it is going to change each time it goes from one hope to another. (Except switches... they don't change anything) Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of Router 1. Router 1 is going to strip that info off and then will make the source MAC address of Router1's exiting interface, and making Router2's interface as the destination MAC address. Then the same will happen... Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2's MAC address.

Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? A. Option A B. Option B C. Option C D. Option D E. Option E

Answer: E Explanation: When frame receives the frame, it checks the source address on MAC table if MAC address found in MAC table it tries to forward if not in MAC table adds the Address on MAC table. After checking the source address, it checks the destination address on MAC table, if MAC address found on MAC table it forwards to proper ports otherwise floods on all ports except the source port.

Refer to the exhibit. SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will SwitchA handle this frame? A. It will drop the frame. B. It will forward the frame out port Fa0/6 only. C. It will forward the frame out port Fa0/3 only. D. It will flood the frame out all ports. E. It will flood the frame out all ports except Fa0/3.

Answer: D

Refer to the exhibit. SwitchA receives the frame with the addressing shown. According to the command output also shown in the exhibit, how will SwitchA handle this frame? A. It will drop the frame. B. It will forward the frame out port Fa0/6 only. C. It will flood the frame out all ports. D. It will flood the frame out all ports except Fa0/3.

Answer: B,D Explanation: If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from.

Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.) A. The switch will not forward a frame with this destination MAC address. B. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table. C. The MAC address of ffff.ffff.ffff will be added to the MAC address table. D. The frame will be forwarded out all active switch ports except for port fa0/0. E. The frame will be forwarded out fa0/0 and fa0/1 only. F. The frame will be forwarded out all the ports on the switch.

Answer: A Explanation: Subnet mask A i.e. 255.255.255.192 with CIDR of /26 which means 64 hosts per subnet which are sufficient to accommodate even the largest subnet of 50 hosts.

Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Answer: A Explanation: When switch receives the data frame from the host not having the MAC address already on the MAC table, it will add the MAC address to source port on MAC address table and sends the data frame.

Refer to the exhibit. The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. What will the switch do when it receives the frame from host A? A. The switch will add the source address and port to the MAC address table and forward the frame to host D. B. The switch will discard the frame and send an error message back to host A. C. The switch will flood the frame out of all ports except for port Fa0/3. D. The switch will add the destination address of the frame to the MAC address table and forward the frame to host D.

Answer: E Explanation: Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation (NAT) is being done, which is not the case here.

Refer to the exhibit. The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router? A. 10.1.0.1 B. 10.1.0.5 C. 10.1.0.6 D. 10.1.0.14 E. 10.1.1.16 F. 10.1.2.8

Answer: D Explanation: Explanation/Reference: Subnet mask 255.255.255.224 with CIDR of /27 which results in 32 hosts per. 192.168.1.31 is the broadcast address for subnet '0' 192.168.1.64 is the network address for subnet '2' 192.168.1.127 is the broadcast address for subnet '3' 192.168.1.192 is the network address for subnet '6'

Refer to the exhibit. The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA? A. 192.168.1.31 B. 192.168.1.64 C. 192.168.1.127 D. 192.168.1.190 E. 192.168.1.192

Answer: D

Refer to the exhibit. The output is from a router in a large enterprise. From the output, determine the role of the router. A. A Core router. B. The HQ Internet gateway router. C. The WAN router at the central site. D. Remote stub router at a remote site.

Answer: A,D Explanation: Explanation/Reference: If the switch already has the MAC address in its table for the destination, it will forward the frame directly to the destination port. If it was not already in its MAC table, then they frame would have been flooded out all ports except for the port that it came from. It will also add the MAC address of the source device to its MAC address table

Refer to the exhibit. The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.) A. The MAC address of 0000.00aa.aaaa will be added to the MAC address table. B. The MAC address of 0000.00dd.dddd will be added to the MAC address table. C. The frame will be forwarded out port fa0/3 only. D. The frame will be forwarded out fa0/1, fa0/2, and fa0/3. E. The frame will be forwarded out all the active ports.

Answer: B Explanation: Explanation/Reference: If the shut down commands are not entered, then CDP can exchange information between the two routers, else it would fail.

Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2? A. Configure the router with the cdp enable command. B. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces. C. Configure IP addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces. D. Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces.

Answer: D Explanation: Explanation/Reference: The fourth command makes it possible for all hosts beyond R2 and all hosts beyond R1 to interact with each other, hence it is the most simplest technique.

Refer to the exhibit. What is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network? A. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2 B. router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2 C. router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1 D. router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1

Answer: C Explanation: In order for the switch to reach networks that are not local, such as networks attached to different interfaces of the router, it will need to set its default gateway to be the IP address of the attached router.

Refer to the exhibit. What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A? A. VLAN 1 on RT-A B. IP routing on SW-A C. default gateway on SW-A D. crossover cable connecting SW-A and RT-A

Answer: A,D Explanation: Explanation/Reference: The source and destination addresses are on the same network therefore, a default gateway is not necessary for communication between these two addresses.

Refer to the exhibit. What two things can the technician determine by successfully pinging from this computer to the IP address 172.16.236.1? (Choose two) A. The network card on the computer is functioning correctly. B. The default static route on the gateway router is correctly configured. C. The correct default gateway IP address is configured on the computer. D. The device with the IP address 172.16.236.1 is reachable over the network. E. The default gateway at 172.16.236.1 is able to forward packets to the internet.

Answer: D Explanation: Explanation/Reference: Since it has /24 CIDR and it also has a non default administrative distance, the answer has to be option D.

Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance? A. router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2 B. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1 C. router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2 D. router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5

Answer: B Explanation: Explanation/Reference: It should be one less than the switch IP to which it is connected so it will be B.

Refer to the exhibit. Which default gateway address should be assigned to HostA? A. 192.168.1.1 B. 192.168.1.65 C. 192.168.1.66 D. 192.168.1.129 E. 10.1.1.1 F. 10.1.1.2

Answer: B

Refer to the exhibit. What kind of cable should be used to make each connection that is identified by the numbers shown? A. 1 - Ethernet Crossover cable 2 - Ethernet straight-through cable 3 - Fiber Optic cable 4 - Rollover cable B. 1 - Ethernet straight-through cable 2 - Ethernet straight-through cable 3 - Serial cable 4 - Rollover cable C. 1 - Ethernet rollover cable 2 - Ethernet crossover cable 3 - Serial cable 4 - Null-modem cable D. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Rollover cable E. 1 - Ethernet straight-through cable 2 - Ethernet Crossover cable 3 - Serial cable 4 - Ethernet Straight-through cable

Answer: A,C Explanation: Explanation/Reference: This is obviously the default value for the route which is set between the routers and since it is entered in such a manner that it ensures connectivity between the stub network and any host lying beyond RouterA.

Refer to the exhibit. Which two statements are correct? (Choose two.) A. This is a default route. B. Adding the subnet mask is optional for the ip route command. C. This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA. D. This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address. E. The same command needs

Answer: B

Refer to the output of the corporate router routing table shown in the graphic. The corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. What will the router do with this packet? A. It will encapsulate the packet as Frame Relay and forward it out interface Serial 0/0.117. B. It will discard the packet and send an ICMP Destination Unreachable message out interface FastEthernet 0/0. C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply message out interface serial 0/0.102. D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0.

Answer: B

Refer to the topology and switching table shown in the graphic. Host B sends a frame to Host C. What will the switch do with the frame? A. Drop the frame B. Send the frame out all ports except port 0/2 C. Return the frame to Host B D. Send an ARP request for Host C E. Send an ICMP Host Unreachable message to Host B F. Record the destination MAC address in the switching table and send the frame directly to Host C

Answer: B,C Explanation: Explanation/Reference: http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094e9e.shtml#t6 The cost (also called metric) of an interface in OSPF is an indication of the overhead required to send packets across a certain interface. The cost of an interface is inversely proportional to the bandwidth of that interface. A higher bandwidth indicates a lower cost. There is more overhead (higher cost) and time delays involved in crossing a 56k serial line than crossing a 10M Ethernet line. The formula used to calculate the cost is: Cost = 10000 0000/bandwidth in bps For example, it will cost 10 EXP8/10 EXP7 = 10 to cross a 10M Ethernet line and will cost 10 EXP8/1544000 =64 to cross a T1 line. By default, the cost of an interface is calculated based on the bandwidth; you can force the cost of an interface with the ip ospf cost <value> interface subconfiguration mode command.

To allow or prevent load balancing to network 172.16.3.0/24, which of the following commands could be used in R2? (Choose two.) A. R2(config-if)#clock rate B. R2(config-if)#bandwidth C. R2(config-if)#ip ospf cost D. R2(config-if)#ip ospf priority E. R2(config-router)#distance ospf


Set pelajaran terkait

Physics II - Turning Point Questions Exam 2

View Set

What age is the best to be happy?

View Set

GEOG 1112 TOPHAT Answers Chapters 1-7

View Set

ATI Video Case Study Pediatric Asthma

View Set

Week 4: Network Layer Functions and Protocol

View Set

Texas Principals of Real Estate - Part 2 (part 1)

View Set

Inflammatory Bowel Disease (case study)

View Set

New Close Up B1 Unit Two Vocabulary

View Set

Chapter 21 - Solid and Hazardous Wastes Quiz Questions

View Set

Types of Populations, Services, and Fulfilling Needs (Instruction/Assignment)

View Set