INTW 1425 Review Questions Chapters 1-7
Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address? A. 172.16.16.0 B. 172.16.0.0 C. 172.16.24.0 D. 172.16.28.0
A. For this example, the network range is 172.16.16.1 to 172.16.31.254, the network address is 172.16.16.0, and the broadcast IP address is 172.16.31.255.
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.) A. To uniquely identify devices at layer 2 B. To allow communication with devices on a different network C. To differentiate a layer 2 frame from a layer 3 packet D. To establish a priority system to determine which device gets to transmit first E. To allow communication between different devices on the same network F. To allow detection of a remote device when its physical address is unknown
A and E. Physical addresses or MAC addresses are used to identify devices at layer 2. MAC addresses are only used to communicate on the same network. To communicate on different network, we have to use layer 3 addresses (IP addresses).
Which three commands can be used to check LAN connectivity problems on an enterprise switch? (Choose three.) A. show interfaces B. show ip route C. tracert D. ping E. dns lookups
A, B, D. The tracert command is a Windows command and will not work on a router or switch! IOS uses the traceroute command.
A (blank) is an example of a device that operates only at the physical layer. A. Hub B. Switch C. Router D. Bridge
A. Hubs operate on the Physical Layer as they have no intelligence and send all traffic in all directions.
Which of the following describe the DHCP Discover message? (Choose two.) A. It uses ff:ff:ff:ff:ff:ff as a layer 2 broadcast. B. It uses UDP as the Transport layer protocol. C. It uses TCP as the Transport layer protocol. D. It does not use a layer 2 destination address
A, B. A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.255.255.255, which means any networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.
Which of the following are layers in the TCP/IP model? (Choose three.) A. Application B. Session C. Transport D. Internet E. Data Link F. Physical
A, C, D. The listed answers are from the OSI model and the question asked about the TCP/ IP protocol stack (DoD model). Yes, it is normal for the objectives to have this type of question. However, let's just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD). Remember, the CCENT objectives can list the layers as OSI layers or DoD layers at any time, regardless of what the question is asking.
What information is displayed by the show hosts command? (Choose two.) A. Temporary DNS entries B. The names of the routers created using the hostname command C. The IP addresses of workstations allowed to access the router D. Permanent name-to-address mappings created using the ip host command E. The length of time a host has been connected to the router via Telnet
A, D. The show hosts command provides information on temporary DNS entries and permanent name-to-address mappings created using the ip host command.
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this interface? A. 172.16.112.0 B. 172.16.0.0 C. 172.16.96.0 D. 172.16.255.0 E. 172.16.128.0
A. A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on—which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 112.128 is the next subnet.
Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question. A. 192.168.10.142 B. 192.168.10.66 C. 192.168.100.254 D. 192.168.10.143 E. 192.168.10.126
A. A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the broadcast address of the eighth subnet, so we need to count to the ninth subnet). Starting at 16 (remember, the question stated that we will not use subnet zero, so we start at 16, not 0), we have 16, 32, 48, 64, 80, 96, 112, 128, 144, etc. The eighth subnet is 128 and the next subnet is 144, so our broadcast address of the 128 subnet is 143. This makes the host range 129-142. 142 is the last valid host.
You have an interface on a router with the IP address of 192.168.192.10/29. What is the broadcast address the hosts will use on this LAN? A. 192.168.192.15 B. 192.168.192.31 C. 192.168.192.63 D. 192.168.192.127 E. 192.168.192.255
A. A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are 0, 8, 16, 24, etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address.
You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface? A. 6 B. 8 C. 30 D. 62 E. 126
A. A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six is the maximum number of hosts on this LAN, including the router interface.
(BLANK) on an Ethernet network is the re transmission delay that's enforced when a collision occurs. A. Backoff B. Carrier sense C. Forward delay D. Jamming
A. Backoff on an Ethernet network is the retransmission delay that's enforced when a collision occurs. When that happens, a host will only resume transmission after the forced time delay has expired. Keep in mind that after the backoff has elapsed, all stations have equal priority to transmit data
If you use either Telnet or FTP, what layer are you using to generate the data? A. Application B. Presentation C. Session D. Transport
A. Both FTP and Telnet use TCP at the Transport layer; however, they both are Application layer protocols, so the Application layer is the best answer for this question.
What cable type is shown in the following graphic? A. Fiber optic B. Rollover C. Coaxial D. Full-duplex
A. Fiber-optic cables are the only ones that have a core surrounded by a material called cladding.
At which layer of the OSI model would you assume the problem is if you type show interface serial 1 and receive the following message? Serial1 is down, line protocol is down A. Physical layer B. Data Link layer C. Network layer D. None; it is a router problem.
A. If you see that a serial interface and the protocol are both down, then you have a Physical layer problem. If you see serial1 is up, line protocol is down, then you are not receiving (Data Link) keepalives from the remote end.
Which of the following troubleshooting steps, if completed successfully, also confirms that the other steps will succeed as well? A. Ping a remote computer. B. Ping the loopback address. C. Ping the NIC. D. Ping the default gateway.
A. Pinging the remote computer would fail if any of the other steps fail.
Which of the following statements is not true with regard to routers? A. They forward broadcasts by default. B. They can filter the network based on Network layer information. C. They perform path selection. D. They perform packet switching.
A. Routers by default do NOT forward broadcasts.
What command displays the ARP table on a Cisco router? A. show ip arp B. traceroute C. arp -a D. tracert
A. The command that displays the ARP table on a Cisco router is show ip arp.
Which of the following statements is/are true with regard to the device shown here? (Choose all that apply.) A. It includes one collision domain and one broadcast domain. B. It includes 10 collision domains and 10 broadcast domains. C. It includes 10 collision domains and one broadcast domain. D. It includes one collision domain and 10 broadcast domains.
A. The device shown is a hub and hubs place all ports in the same broadcast domain and the same collision domain.
Which of the following is the only device that operates at all layers of the OSI model? A. Network host B. Switch C. Router D. Bridge
A. The following network devices operate at all seven layers of the OSI model: network management stations (NMSs), gateways (not default gateways), servers, and network hosts.
Which of the following hexadecimal numbers converts to 28 in decimal? A. 1c B. 12 C. 15 D. ab
A. The hex value 1c is converted as 28 in decimal.
What network service is the most likely problem if you can ping a computer by IP address but not by name? A. DNS B. DHCP C. ARP D. ICMP
A. The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS
Which of the following layers of the OSI model is not involved in defining how the applications within the end stations will communicate with each other as well as with users? A. Transport B. Application C. Presentation D. Session
A. The top three layers define how the applications within the end stations will communicate with each other as well as with users.
Which of the following statements is false with regard to Ethernet? A. There are very few collisions in full-duplex mode. B. A dedicated switch port is required for each full-duplex node. C. The host network card and the switch port must be capable of operating in full-duplex mode to use full-duplex. D. The default behavior of 10Base-T and 100Base-T hosts is 10 Mbps half-duplex if the autodetect mechanism fails.
A. There are no collisions in full-duplex mode.
On which type of device could the situation shown in the diagram occur? A. Hub B. Switch C. Router D. Bridge
A. When using a hub, all ports are in the same collision domain, which will introduce collisions as shown between devices connected to the same hub.
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.) A. The Transport layer divides a data stream into segments and may add reliability and flow control information. B. The Data Link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the Network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the Network layer adds layer 3 addresses and control information to a segment. E. The Presentation layer translates bits into voltages for transmission across the physical
A. and D. The Transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number so that the receiving device can reassemble the data on arrival. The Network layer (layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the Network layer determines the best path to a particular destination network and routes the data appropriately.
Which statements are true regarding ICMP packets? (Choose two.) A. ICMP guarantees datagram delivery. B. ICMP can provide hosts with information about network problems. C. ICMP is encapsulated within IP datagrams. D. ICMP is encapsulated within UDP datagrams
B, C. ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostics, it will provide hosts with information about network problems.
Which of the following services use TCP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP
B, D, E. SMTP, FTP, and HTTP use TCP.
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the syslog server? (Choose three.) A. Informational B. Emergency C. Warning D. Critical E. Debug F. Error
B, D, F. If you specify a level with the "logging trap level" command, that level and all the higher levels will be logged. For example, by using the logging trap 3 command, emergencies, alerts, critical, and error messages will be logged. Only three of these were listed as possible options.
You are unsuccessful in telnetting into a remote device from your switch, but you could telnet to the router earlier. However, you can still ping the remote device. What could the problem be? (Choose two.) A. IP addresses are incorrect. B. Access control list is filtering Telnet. C. There is a defective serial cable. D. The VTY password is missing.
B, D. The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.
Which of the following commands will display the current IP addressing and the layer 1 and 2 status of an interface? (Choose two.) A. show version B. show interfaces C. show controllers D. show ip interface E. show running-config
B, D. The commands show interfaces and show ip interface will show you the layer 1 and 2 status and the IP addresses of your router's interfaces
Which two statements describe the IP address 10.16.3.65/23? (Choose two.) A. The subnet address is 10.16.3.0 255.255.254.0. B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0. D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. E. The network is not subnetted.
B, D. The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
What protocol is used to find the hardware address of a local device? A. RARP B. ARP C. IP D. ICMP E. BootP
B. Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
Which layer 4 protocol is used for a Telnet connection? A. IP B. TCP C. TCP/IP D. UDP E. ICMP
B. Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.
The cable used to connect to the console port on a router or switch is called a (BLANK) cable. A. Crossover B. Rollover C. Straight-through D. Full-duplex
B. Although rolled cable isn't used to connect any Ethernet connections together, you can use a rolled Ethernet cable to connect a host EIA-TIA 232 interface to a router console serial communication (COM) port.
In the Ethernet II frame shown here, what is the function of the section labeled "FCS"? A. Allows the receiving devices to lock the incoming bit stream. B. Error detection C. Identifies the upper-layer protocol D. Identifies the transmitting device
B. FCS is a field at the end of the frame that's used to store the cyclic redundancy check (CRC) answer. The CRC is a mathematical algorithm that's based on the data in the frame and run when each frame is built. When a receiving host receives the frame and runs the CRC, the answer should be the same. If not, the frame is discarded, assuming errors have occurred.
Which of the following commands will configure all the default VTY ports on a switch? A. Switch#line vty 0 4 B. Switch(config)# line vty 0 4 C. Switch (config-if)# line console 0 D. Swtich(config)# line vty all
B. From global configuration mode, use the line vty 0 4 command to set all five default VTY lines. However, you would typically always set all lines, not just the defaults.
What is the problem with an interface if you type show interface g0/1 and receive the following message? Gigabit 0/1 is administratively down, line protocol is down A. The keepalives are different times. B. The administrator has the interface shut down. C. The administrator is pinging from the interface. D. No cable is attached
B. If an interface is shut down, the show interface command will show the interface as administratively down. (It is possible that no cable is attached, but you can't tell that from this message.)
Which of the following items does a socket comprise? A. IP address and MAC address B. IP address and port number C. Port number and MAC address D. MAC address and DLCI
B. If you're using TCP, the virtual circuit is defined by the source and destination port number plus the source and destination IP address and called a socket
What type of cable uses the pinout shown here? A. Fiber optic B. Crossover Gigabit Ethernet cable C. Straight-through Fast Ethernet D. Coaxial
B. In creating the gigabit crossover cable, you'd still cross 1 to 3 and 2 to 6, but you would add 4 to 7 and 5 to 8.
Which of the following Application layer protocols sets up a secure session that's similar to Telnet? A. FTP B. SSH C. DNS D. DHCP
B. Secure Shell (SSH) protocol sets up a secure session that's similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another.
Which of the following commands enables syslog on a Cisco device with debugging as the level? A. syslog 172.16.10.1 B. logging 172.16.10.1 C. remote console 172.16.10.1 syslog debugging D. transmit console messages level 7 172.16.10.1
B. Syslog levels range from 0-7, and level 7 (known as Debugging or local7) is the default if you were to use the logging ip_address command from global config.
You type Switch#sh r and receive a % ambiguous command error. Why did you receive this message? A. The command requires additional options or parameters. B. There is more than one show command that starts with the letter r. C. There is no show command that starts with r. D. The command is being executed from the wrong mode
B. The % ambiguous command error means that there is more than one possible show command that starts with r. Use a question mark to find the correct command
Which of the following is a standards-based protocol that provides dynamic network discovery? A. DHCP B. LLDP C. DDNS D. SSTP E. CDP
B. The IEEE created a new standardized discovery protocol called 802.1AB for Station and Media Access Control Connectivity Discovery. We'll just call it Link Layer Discovery Protocol (LLDP
How many collision domains are present in the following diagram?
B. The all-hub network at the bottom is one collision domain; the bridge network on top equals three collision domains. Add in the switch network of five collision domains—one for each switch port—and you get a total of nine.
Using the given output, what type of interface is f0/0? [output cut] Hardware is MV96340 Ethernet, address is 001a.2f55.c9e8 (bia 001a.2f55.c9e8) Internet address is 192.168.1.33/27 MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 A. 10 MB B. 100 MB C. 1000 MB D. 1000 MB
B. The bandwidth shown is 100000 kbits a second, which is a FastEthernet port, or 100 Mbs.
Which of the following is not one of the actions taken in the operation of CSMA/CD when a collision occurs? A. A jam signal informs all devices that a collision occurred. B. The collision invokes a random backoff algorithm on the systems involved in the collision. C. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires. D. All hosts have equal priority to transmit after the timers have expired.
B. The collision will invoke a backoff algorithm on all systems, not just the ones involved in the collision.
You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue? A. Router>ping B. Router>trace C. Router>show ip route D. Router>show interface E. Router>show cdp neighbors
B. The command traceroute (trace for short), which can be issued from user mode or privileged mode, is used to find the path a packet takes through an internetwork and will also show you where the packet stops because of an error on a router.
In the following diagram, identify the cable types required for connections A and B. A. A= crossover, B= crossover B. A= crossover, B= straight-through C. A= straight-through, B= straight-through D. A= straight-through, B= crossover
B. The connection between the two switches requires a crossover and the connection from the hosts to the switches requires a straight-through
With respect to the OSI model, which one of the following is the correct statement about PDUs? A. A segment contains IP addresses. B. A packet contains IP addresses. C. A segment contains MAC addresses. D. A packet contains MAC addresses.
B. The contents of a protocol data unit (PDU) depend on the PDU because they are created in a specific order and their contents are based on that order. A packet will contain IP addresses but not MAC addresses because MAC addresses are not present until the PDU becomes a frame.
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? A. Application B. Host-to-Host C. Internet D. Network Access
B. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host (also called Transport on the objectives), Internet, and Network Access/ Link. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
Which of the following commands displays the networks traversed on a path to a network destination? A. ping B. traceroute C. pingroute D. pathroute
B. The traceroute command displays the networks traversed on a path to a network destination.
You have a network in your data center that needs 310 hosts. Which mask should you use so you waste the least amount of addresses? A. 255.255.255.0 B. 255.255.254.0 C. 255.255.252.0 D. 255.255.248.0
B. We need 9 host bits to answer this question, which is a /23.
What is a function of the WLAN Controller? A. To monitor and control the incoming and outgoing network traffic B. To automatically handle the configuration of wireless access points C. To allow wireless devices to connect to a wired network D. To connect networks and intelligently choose the best paths between networks
B. Wireless LAN Controllers are used to manage anywhere from a few access points to thousands. The AP's are completely managed from the controller and are considered lightweight or dumb AP's as they have no configuration on the AP itself.
If a host is configured with an incorrect default gateway and all the other computers and router are known to be configured correctly, which of the following statements is TRUE? A. Host A cannot communicate with the router. B. Host A can communicate with other hosts in the same subnet. C. Host A can communicate with hosts in other subnets. D. Host A can communicate with no other systems.
B. With an incorrect gateway, Host A will not be able to communicate with the router or beyond the router but will be able to communicate within the subnet.
What cable type uses the pinout arrangement shown below? A. Fiber optic B. Rolled C. Straight-through D. Crossover
B. You can use a rolled Ethernet cable to connect a host EIA-TIA 232 interface to a router console serial communication (COM) port.
You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
B. You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets with 14 hosts—this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts. This is the best answer.
You need to provide network connectivity to 150 client computers that will reside in the same subnetwork, and each client computer must be allocated dedicated bandwidth. Which device should you use to accomplish the task? A. Hub B. Switch C. Router D. Bridge
B. You should use a switch to accomplish the task in this scenario. A switch is used to provide dedicated bandwidth to each node by eliminating the possibility of collisions on the switch port where the node resides. Switches work at layer 2 in the Open Systems Interconnection (OSI) model and perform the function of separating collision domains.
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.) A. When they receive a special token B. When there is a carrier C. When they detect that no other devices are sending D. When the medium is idle E. When the server grants access
C and D. An Ethernet network is a shared environment, so all devices have the right to access the medium. If more than one device transmits simultaneously, the signals collide and cannot reach the destination.If a device detects another device is sending, it will wait for a specified amount of time before attempting to transmit.
Which three statements about syslog utilization are true? (Choose three.) A. Utilizing syslog improves network performance. B. The syslog server automatically notifies the network administrator of network problems. C. A syslog server provides the storage space necessary to store log files without using router disk space. D. There are more syslog messages available within Cisco IOS than there are comparable SNMP trap messages. E. Enabling syslog on a router automatically enables NTP for accurate time stamping. F. A syslog server helps in aggregation of logs and alerts.
C, D, F. There are significantly more syslog messages available within IOS as compared to SNMP Trap messages. System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts.
When a ping to the local host IP address succeeds but a ping to the default gateway IP address fails, what can you rule out? (Choose all that apply.) A. The IP address of the local host is incorrect. B. The IP address of the gateway is incorrect. C. The NIC is not functional. D. The IP stack has failed to initialize.
C, D. If a ping to the local host succeeds, you can rule out IP stack or NIC failure
Which of the following commands are required when configuring SSH on your router? (Choose 2) A. enable secret password B. exec-timeout 0 0 C. ip domain-name name D.username name password password E. ip ssh version 2
C, D. To configure SSH on your router, you need to set the username command, the ip domain-name, login local, and the transport input ssh under the VTY lines and the crypto key command. However, SSH version 2 is suggested but not required.
Which two of the following are private IP addresses? A. 12.0.0.1 B. 168.172.19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.168.24.43
C, E. The Class A private address range is 10.0.0.0 through 10.255.255.255. The Class B private address range is 172.16.0.0 through 172.31.255.255, and the Class C private address range is 192.168.0.0 through 192.168.255.255.
What is the subnetwork number of a host with an IP address of 172.16.66.0/21? A. 172.16.36.0 B. 172.16.48.0 C. 172.16.64.0 D. 172.16.0.0
C. A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so the broadcast address of the 64 subnet is 71.255.
Using the illustration from the previous question, what would be the IP address of S0 if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question. A. 192.168.10.24 B. 192.168.10.62 C. 192.168.10.30 D. 192.168.10.127
C. A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes our host range 17-30. 30 is the last valid host.
You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first available host address. Which of the following should you assign to the server? A. 192.168.19.0 255.255.255.0 B. 192.168.19.33 255.255.255.240 C. 192.168.19.26 255.255.255.248 D. 192.168.19.31 255.255.255.248 E. 192.168.19.34 255.255.255.240
C. A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8, 16, 24, 32, 40, etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the broadcast address for the 24 subnet is 31. 192.168.19.26 is the only correct answer.
The network address of 172.16.0.0/19 provides how many subnets and hosts? A. 7 subnets, 30 hosts each B. 7 subnets, 2,046 hosts each C. 7 subnets, 8,190 hosts each D. 8 subnets, 30 hosts each E. 8 subnets, 2,046 hosts each F. 8 subnets, 8,190 hosts each
C. A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
Which class of IP address provides a maximum of only 254 host addresses per network ID? A. Class A B. Class B C. Class C D. Class D E. Class E
C. A Class C network address has only 8 bits for defining hosts: 28 - 2 = 256.
Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process? A. Ping B. Traceroute C. Gratuitous ARP D. Pathping
C. A host uses something called a gratuitous ARP to help avoid a possible duplicate address. The DHCP client sends an ARP broadcast out on the local LAN or VLAN using its newly assigned address to help solve conflicts before they occur.
The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router? A. RAM should be erased and the router restarted. B. Flash should be erased and the router restarted. C. NVRAM should be erased and the router restarted. D. The new configuration should be entered and saved.
C. Before you start to configure the router, you should erase the NVRAM with the erase startup-config command and then reload the router using the reload command.
Which Class of IP addresses uses the pattern shown here? A. Class A B. Class B C. Class C D. Class D
C. Class C addresses devote 24 bits to the network portion and 8 bits to the host portion.
What is the function of a firewall? A. To automatically handle the configuration of wireless access points B. To allow wireless devices to connect to a wired network C. To monitor and control the incoming and outgoing network traffic D. To connect networks and intelligently choose the best paths between networks
C. Firewalls are used to connect our trusted internal network such as the DMZ, to the untrusted outside network—typically the internet.
You configure a router interface with the IP address 192.168.10.62 255.255.255.192 and receive the following error: (Bad mask /26 for address 192.168.10.62) Why did you receive this error? A. You typed this mask on a WAN link and that is not allowed. B. This is not a valid host and subnet mask combination. C. ip subnet-zero is not enabled on the router. D. The router does not support IP.
C. First, you cannot answer this question if you can't subnet. The 192.168.10.62 with a mask of 255.255.255.192 is a block size of 64 in the fourth octet. The host 192.168.10.62 is in the zero subnet, and the error occurred because ip subnet-zero is not enabled on the router.
The following illustration shows a data structure header. What protocol is this header from? A. IP B. ICMP C. TCP D. UDP E. ARP F. RARP
C. First, you should know easily that only TCP and UDP work at the Transport layer, so now you have a 50/50 shot. However, since the header has sequencing, acknowledgment, and window numbers, the answer can only be TCP.
A network interface port has collision detection and carrier sensing enabled on a shared twisted-pair network. From this statement, what is known about the network interface port? A. This is a 10 Mbps switch port. B. This is a 100 Mb/s switch port. C. This is an Ethernet port operating at half-duplex. D. This is an Ethernet port operating at full-duplex. E. This is a port on a network interface card in a PC.
C. Half-duplex Ethernet networking uses a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium.
What must happen if a DHCP IP conflict occurs? A. Proxy ARP will fix the issue. B. The client uses a gratuitous ARP to fix the issue. C. The administrator must fix the conflict by hand at the DHCP server. D. The DHCP server will reassign new IP addresses to both computers.
C. If a DHCP conflict is detected, either by the server sending a ping and getting a response or by a host using a gratuitous ARP (arp'ing for its own IP address and seeing if a host responds), then the server will hold that address and not use it again until it is fixed by an administrator.
If you delete the contents of NVRAM and reboot the switch, what mode will you be in? A. Privileged mode B. Global mode C. Setup mode D. NVRAM loaded mode
C. If you delete the startup-config and reload the switch, the device will automatically enter setup mode. You can also type setup from privileged mode at any time.
You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be? A. You didn't boot the router with the correct command. B. NVRAM is corrupted. C. The configuration register setting is incorrect. D. The newly upgraded IOS is not compatible with the hardware of the router. E. The configuration you saved is not compatible with the hardware.
C. If you save a configuration and reload the router and it comes up either in setup mode or as a blank configuration, chances are the configuration register setting is incorrect.
Which of the following is the best summarization of the following netoworks: 192.168.128.0 through 192.168.159.0? A. 192.168.0.0/24 B. 192.168.128.0/16 C. 192.168.128.0/19 D. 192.168.128.0/20
C. If you start at 192.168.128.0 and go through 192.168.159.0, you can see this is a block of 32 in the third octet. Since the network address is always the first one in the range, the summary address is 192.168.128.0. What mask provides a block of 32 in the third octet? The answer is 255.255.224.0, or /19.
The output of the show running-config command comes from ____________. A. NVRAM B. Flash C. RAM D. Firmware
C. Once the IOS is loaded and up and running, the startup-config will be copied from NVRAM into RAM and from then on, referred to as the running-config.
The most effective way to mitigate congestion on a LAN would be to (blank) A. Upgrade the network cards B. Change the cabling to CAT C. Replace the hubs with switches D. Upgrade the CPUs in the routers
C. Replacing the hub with a switch would reduce collisions and retransmissions, which would have the most impact on reducing congestion.
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? A. You copied the wrong configuration into RAM. B. You copied the configuration into flash memory instead. C. The copy did not override the shutdown command in running-config. D. The IOS became corrupted after the copy command was initiated.
C. Since the configuration looks correct, you probably didn't screw up the copy job. However, when you perform a copy from a network host to a router, the interfaces are automatically shut down and need to be manually enabled with the no shutdown command.
Switches break up domains, and routers break up domains. A. broadcast, broadcast B. collision, collision C. collision, broadcast D. broadcast, collision
C. Switches create separate collision domains within a single broadcast domain. Routers provide a separate broadcast domain for each interface.
What switch must be added to the ipconfig command on a PC to verify DNS configuration? A. /dns B. -dns C. /all D. showal
C. The /all switch must be added to the ipconfig command on a PC to verify DNS configuration.
Which of the following layers of the OSI model was later subdivided into two layers? A. Presentation B. Transport C. Data Link D. Physical
C. The IEEE Ethernet Data Link layer has two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer.
In the following diagram, what is the most likely reason the station cannot ping outside of its network? A. The IP address is incorrect on interface E0 of the router. B. The default gateway address is incorrect on the station. C. The IP address on the station is incorrect. D. The router is malfunctioning.
C. The IP address of the station and the gateway are not in the same network. Since the address of the gateway is correct on the station, it is most likely the IP address of the station is incorrect.
According to the output, what interface does SW-2 use to connect to SW-3? SW-3#sh cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route BridgeS - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID SW-1 Fas 0/1 170 S I WS-C3560- Fas 0/15 SW-1 Fas 0/2 170 S I WS-C3560- Fas 0/16 SW-2 Fas 0/5 162 S I WS-C3560- Fas 0/2 A. Fas 0/1 B. Fas 0/16 C. Fas 0/2 D. Fas 0/5
C. The Port ID column describes the interfaces on the remote device end of the connection.
If you wanted administrators to see a message when logging into the switch, which command would you use? A. message banner motd B. banner message motd C. banner motd D. message motd
C. The banner motd sets a message of the day for administrators when they login to a switch or router.
Which of the following commands sets the privileged mode password to Cisco and encrypts the password? A. enable secret password Cisco B. enable secret Cisco C. enable secret Cisco D. enable password Cisco
C. The enable secret password is case sensitive, so the second option is wrong. To set the enable secret password, use the enable secret password command from global configuration mode. This password is automatically encrypted.
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? A. Application B. Host-to-Host C. Internet D. Network Access
C. The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.
Which of the following network addresses correctly summarizes the three networks shown below efficiently? 10.0.0.0/16 10.1.0.0/16 10.2.0.0/16 A. 10.0.0.0/15 B. 10.1.0.0/8 C. 10.0.0.0/14 D. 10.0.0.8/16
C. The interesting octet in this example is the second octet, and it is a block size of four starting at 10.0.0.0. By using a 255.252.0.0 mask, we are telling the summary to use a block size of four in the second octet. This will cover 10.0.0.0 through 10.3.255.255. This is the best answer.
What command generated the output shown below? Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 A. traceroute B. show ip route C. ping D. pathping
C. The ping command tests connectivity to another station. The full command is shown below. C:\>ping 172.16.10.2 Pinging 172.16.10.2 with 32 bytes of data: Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Reply from 172.16.10.2: bytes=32 time<1ms TTL=128 Ping statistics for 172.16.10.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
Which of the following prompts indicates that the switch is currently in privileged mode? A. Switch(config)# B. Switch> C. Switch# D. Switch(config-if)
C. The prompts offered as options indicate the following modes: Switch(config)# is global configuration mode. Switch> is user mode. Switch# is privileged mode. Switch(config-if)# is interface configuration mode
What is the address range of a Class B network address in binary? A. 01xxxxxx B. 0xxxxxxx C. 10xxxxxx D. 110xxxxx
C. The range of a Class B network address is 128-191. This makes our binary range 10xxxxxx.
Which of the following is an example of a multicast address? A. 10.6.9.1 B. 192.168.10.6 C. 224.0.0.10 D. 172.16.9.5
C. The range of multicast addresses starts with 224.0.0.0 and goes through 239.255.255.255.
Which command will show you whether a DTE (Data Terminal Equipment) or a DCE (Data Communications Equipment) cable is plugged into serial 0/0 on your router's WAN port? A. sh int s0/0 B. sh int serial0/0 C. show controllers s0/0 D. show serial0/0 controllers
C. The show controllers serial 0/0 command will show you whether either a DTE or DCE cable is connected to the interface. If it is a DCE connection, you need to add clocking with the clock rate command.
Which command can be used to determine a router's CPU utilization? A. show version B. show controllers C. show processes cpu D. show memory
C. The show processes (or show processes cpu) is a good tool for determining a given router's CPU utilization. When it is high, it is not a good time to execute a debug command.
What command can you use to determine the IP address of a directly connected neighbor? A. show cdp B. show cdp neighbors C. show cdp neighbors detail D. show neighbor detail
C. This command can be run on both routers and switches and it displays detailed information about each device connected to the device you're running the command on, including the IP address
What is the subnetwork address for a host with the IP address 200.10.5.68/28? A. 200.10.5.56 B. 200.10.5.32 C. 200.10.5.64 D. 200.10.5.0
C. This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
You telnet into a remote device and type debug ip icmp, but no output from the debug command is seen. What could the problem be? A. You must type the show ip icmp command first. B. IP addressing on the network is incorrect. C. You must use the terminal monitor command. D. Debug output is sent only to the console.
C. To see console messages through your Telnet session, you must enter the terminal monitor command.
To use VLSM, what capability must the routing protocols in use possess? A. Support for multicast B. Multiprotocol support C. Transmission of subnet mask information D. Support for unequal load balancing
C. To use VLSM, the routing protocols in use possess the capability to transmit subnet mask information
In the network shown in the diagram, how many computers could be in Network B? A. 6 B. 12 C. 14 D. 30
C. Using a /28 mask, there are 4 bits available for hosts. Two-to-the-fourth power minus 2 = 14, or block size −2.
When a ping to the local host IP address fails, what can you assume? A. The IP address of the local host is incorrect. B. The IP address of the remote host is incorrect. C. The NIC is not functional. D. The IP stack has failed to initialize.
C. When a ping to the local host IP address fails, you can assume the NIC is not functional.
Which of the following is not a benefit of using a reference model? A. It divides the network communication process into smaller and simpler components. B. It encourages industry standardization. C. It enforces consistency across vendors. D. It allows various types of network hardware and software to communicate.
C. While it is true that the OSI model's primary purpose is to allow different vendors' networks to interoperate, there is no requirement that vendors follow the model.
What is a function of an access point (AP)? A. To monitor and control the incoming and outgoing network traffic B. To automatically handle the configuration of wireless access point C. To allow wireless devices to connect to a wired network D. To connect networks and intelligently choose the best paths between networks
C. Wireless AP's are very popular today and will be going away about the same time that rock n' roll does. The idea behind these devices (which are layer 2 bridge devices) is to connect wireless products to the wired Ethernet network. The wireless AP will create a single collision domain and is typically its own dedicated broadcast domain as well.
Which command will delete the contents of NVRAM on a switch? A. delete NVRAM B. delete startup-config C. erase flash D. erase startup-config E. erase start
C. Wireless AP's are very popular today and will be going away about the same time that rock n' roll does. The idea behind these devices (which are layer 2 bridge devices) is to connect wireless products to the wired Ethernet network. The wireless AP will create a single collision domain and is typically its own dedicated broadcast domain as well.
Which of the following commands displays the configurable parameters and statistics of all interfaces on a switch? A. show running-config B. show startup-config C. show interfaces D. show versions
C. With the show interfaces command, you can view the configurable parameters, get statistics for the interfaces on the switch, check for input and CRC errors, and verify if the interfaces are shut down
You are the Cisco administrator for your company. A new branch office is opening and you are selecting the necessary hardware to support the network. There will be two groups of computers, each organized by department. The Sales group computers will be assigned IP addresses ranging from 192.168.1.2 to 192.168.1.50. The Accounting group will be assigned IP addresses ranging from 10.0.0.2 to 10.0.0.50. What type of device should you select to connect the two groups of computers so that data communication can occur? A. Hub B. Switch C. Router D. Bridge
C. You should select a router to connect the two groups. When computers are in different subnets, as these two groups are, you will require a device that can make decisions based on IP addresses. Routers operate at layer 3 of the Open Systems Interconnect (OSI) model and make data-forwarding decisions based on layer 3 networking information, which are IP addresses. They create routing tables that guide them in forwarding traffic out of the proper interface to the proper subnet.
Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router? (Choose two.) A. 172.16.0.5 B. 172.16.1.100 C. 172.16.1.198 D. 172.16.2.255 E. 172.16.3.0 F. 172.16.3.255
D, E. The router's IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This makes the third octet a block size of 2. The router's interface is in the 2.0 subnet, and the broadcast address is 3.255 because the next subnet is 4.0. The valid host range is 2.1 through 3.254. The router is using the first valid host address in the range.
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? A. 14 B. 15 C. 16 D. 30 E. 31 F. 62
D. A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of subnet bits would never change
If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to? A. 172.16.45.0 B. 172.16.45.4 C. 172.16.45.8 D. 172.16.45.12 E. 172.16.45.16
D. A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4 and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? A. 2 B. 3 C. 4 D. 5 E. 6 F. 7
D. A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let's add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer.
On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? A. /27 B. /28 C. /29 D. /30 E. /31
D. A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet
Which mask should you use on point-to-point links in order to reduce the waste of IP addresses? A. /27 B. /28 C. /29 D. /30 E. /31
D. A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet
What is the default syslog facility level? A. local4 B. local5 C. local6 D. local7
D. By default, Cisco IOS devices use facility local7. Moreover, most Cisco devices provide options to change the facility level from their default value
In the following diagram, in order to have IP addressing that's as efficient as possible, which network should use a /29 mask? A. A B. B C. C D. D
D. For 6 hosts we need to leave 3 bits in the host portion since 2 to the third power = 8 and 8 minus 2 is 6. With 3 bits for the host portion, that leaves 29 bits for the mask, or /29.
What summary address would cover all the networks shown and advertise a single, efficient route to Router B that won't advertise more networks than needed? A. 172.16.0.0/24 B. 172.16.1.0/24 C. 172.16.0.0/24 D. 172.16.0.0/20
D. In a question like this, you need to look for an interesting octet where you can combine networks. In this example, the third octet has all our subnets, so we just need to find our block size now. If we used a block of 8 starting at 172.16.0.0/19, then we cover 172.16.0.0 through 172.16.7.255. However, if we used 172.16.0.0/20, then we'd cover a block of 16, which would be from 172.16.0.0 through 172.16.15.255, which is the best answer
In the following command, what does the IP address 10.10.10.254 refer to? Router#config t Router(config)#interface fa0/0 Router(config-if)#ip helper-address 10.10.10.254 A. IP address of the ingress interface on the router B. IP address of the egress interface on the router C. IP address of the next hop on the path to the DHCP server D. IP address of the DHCP server
D. Specifying the address of the DHCP server allows the router to relay broadcast traffic destined for a DHCP server to that server.
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see whether enough resources exist for that communication? A. Transport B. Network C. Presentation D. Application
D. The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
Between which systems could you use a cable that uses the pinout pattern shown here? A. With a connection from a switch to a switch B. With a connection from a router to a router C. With a connection from a host to a host D. With a connection from a host to a switch
D. The cable shown is a straight-through cable, which is used between dissimilar devices.
In the accompanying graphic, what is the name for the section of the MAC address marked as unknown? A. IOS B. OSI C. ISO D. OUI
D. The organizationally unique identifier (OUI) is assigned by the IEEE to an organization composed of 24 bits, or 3 bytes, which in turn assigns a globally administered address also comprising 24 bits, or 3 bytes, that's supposedly unique to each and every adapter it manufactures.
You try to telnet into SF from router Corp and receive this message: Corp#telnet SF Trying SF (10.0.0.1)...Open Password required, but none set [Connection to SF closed by foreign host] Corp# Which of the following sequences will address this problem correctly? A. Corp(config)#line console 0 Corp(config-line)#password password Corp(config-line)#login B. SF config)#line console 0 SF(config-line)#enable secret password SF(config-line)#login C. Corp(config)#line vty 0 4 Corp(config-line)#password password Corp(config-line)#login D. SF(config)#line vty 0 4 SF(config-line)#password password SF(config-line)#login
D. To allow a VTY (Telnet) session into your router, you must set the VTY password. Option C is wrong because it is setting the password on the wrong router. Notice that you have to set the password before you set the login command.
What command do you type to save the configuration stored in RAM to NVRAM? A. Switch(config)#copy current to starting B. Switch#copy starting to running C. Switch(config)#copy running-config startup-config D. Switch#copy run start
D. To copy the running-config to NVRAM so that it will be used if the router is restarted, use the copy running-config startup-config command in privileged mode (copy run start for short).
You need to configure all your routers and switches so they synchronize their clocks from one time source. What command will you type for each device? A. clock synchronization ip_address B. ntp master ip_address C. sync ntp ip_address D. ntp server ip_address version number
D. To enable a device to be an NTP client, use the ntp server IP_address version number command at global configuration mode. That's all there is to it! Assuming your NTP server is working of course.
If you want to have more than one Telnet session open at the same time, what keystroke combination would you use? A. Tab+spacebar B. Ctrl+X, then 6 C. Ctrl+Shift+X, then 6 D. Ctrl+Shift+6, then X
D. To keep open one or more Telnet sessions, use the Ctrl+Shift+6 and then X keystroke combination.
You type show interfaces fa0/1 and get this output: 275496 packets input, 35226811 bytes, 0 no buffer Received 69748 broadcasts (58822 multicasts) 0 runts, 0 giants, 0 throttles 111395 input errors, 511987 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 58822 multicast, 0 pause input 0 input packets with dribble condition detected 2392529 packets output, 337933522 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out What could the problem possibly be with this interface? A. Speed mismatch on directly connected interfaces B. Collisions causing CRC errors C. Frames received are too large D. Interference on the Ethernet cable
D. Typically, we'd see the input errors and CRC statistics increase with a duplex error, but it could be another Physical layer issue such as the cable might be receiving excessive interference or the network interface cards might have a failure. Typically, you can tell if it is interference when the CRC and input errors output grow but the collision counters do not, which is the case with this question.
Which part of a MAC address indicates whether the address is a locally or globally administered address? A. FCS B. I/G bit C. OUI D. U/L bit
D. When set to 0, this bit represents a globally administered address, as specified by the IEEE, but when it's a 1, it represents a locally governed and administered address.
When you issue the ping command, what protocol are you using? A. DNS B. DHCP C. ARP D. ICMP
D. When you issue the ping command, you are using the ICMP protocol
When configuring a terminal emulation program, which of the following is an incorrect setting? A. Bit rate: 9600 B. Parity: None C. Flow control: None D. Data bits: 1
D. When you set up the connection, use these settings: ■ Bits per sec: 9600 ■ Data bits: 8 ■ Parity: None ■ Stop bits: 1 ■ Flow control: None
You type the following command into the switch and receive the following output: Switch#show fastethernet 0/1 ^ % Invalid input detected at '^' marker. Why was this error message displayed? A. You need to be in privileged mode. B. You cannot have a space between fastethernet and 0/1. C. The switch does not have a FastEthernet 0/1 interface. D. Part of the command is missing.
D. You can view the interface statistics from user mode, but the command is show interface fastethernet 0/0.
Drag the steps in the DHCP process and place them in the correct order on the right. DHCPOffer Drop Target A DHCPDiscover Drop Target B DHCPAck Drop Target C DHCPRequest Drop Target D
DHCPDiscover DHCPOffer DHCPRequest DHCPAck
Which of the networks in the diagram could use a /29 mask? A. Corporate B. LA C. SF D. NY E. None
E. A /29 mask yields only 6 addresses, so none of the networks could use it.
You have a network with a host address of 172.16.17.0/22. From the following options, which is another valid host address in the same subnet? A. 172.16.17.1 255.255.255.252 B. 172.16.0.1 255.255.240.0 C. 172.16.20.1 255.255.254.0 D. 172.16.16.1 255.255.255.240 E. 172.16.18.255 255.255.252.0 F. 172.16.0.1 255.255.255.0
E. A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third octet. The network address in the question is in subnet 172.16.16.0 with a broadcast address of 172.16.19.255. Only option E has the correct subnet mask listed, and 172.16.18.255 is a valid host.
You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to find the address? A. Fly to Hawaii, console into the switch, then relax and have a drink with an umbrella in it. B. Issue the show ip route command on the router connected to the switch. C. Issue the show cdp neighbor command on the router connected to the switch. D. Issue the show ip arp command on the router connected to the switch. E. Issue the show cdp neighbors detail command on the router connected to the switch
E. Although option A is certainly the "best" answer, unfortunately option E will work just fine and your boss would probably prefer you to use the show cdp neighbors detail command.
In the following work area, draw a line from the OSI model layer to its PDU. Layer Description Transport: Bits Data Link: Segment Physical: Packet Network: Frame
Layer Description Transport Goes to Segment Data Link Goes to Frame Physical Goes to Bits Network Goes to Packet
Mode: Definition * Drag the router terms to their correct definition* User EXEC mode: Commands that affect the entire system Privileged EXEC mode: Commands that affect interfaces/processes only Global configuration mode: Interactive configuration dialog Specific configuration modes: Provides access to all other router commands Setup mode: Limited to basic monitoring commands
Mode: Definition User EXEC mode: Limited to basic monitoring commands Privileged EXEC mode: Provides access to all other router commands Global configuration mode: Commands that affect the entire system Specific configuration modes: Commands that affect interfaces/processes only Setup mode: Interactive configuration dialog
Private IP addressing was specified in RFC ___________ _________ .
RFC 1918. These addresses can be used on a private network, but they're not routable through the Internet
In the following image, match the cable type to the standard with which it goes. IEEE 802.3u IEEE 802.3 IEEE 802.3ab IEEE 802.3z 1000Base-T 1000Base-SX 10Base-T 100Base-TX
The given cable types are matched with their standards in the following table. IEEE 802.3u: 100Base-Tx IEEE 802.3 10Base-T IEEE 802.3ab 1000Base-T IEEE 802.3z 1000Base-SX
OSI Model Descriptions
Transport:End-to-End connection Physical: Conversion to bits Data Link: Framing Network: Routing
In the work area, match the command to its function on the right. traceroute = Displays the list of routers on a path to a network destination arp - = Displays IP-to_MAC show ip arp = Cisco router ARP table ipconfig /asll = PC Net config
traceroute: Displays the list of routers on a path to a network destination arp -a: Displays IP-to-MAC-address mappings on a Windows PC show ip arp: Displays the ARP table on a Cisco router ipconfig /all: Shows you the PC network configuration