Network Fundamentals CCNA 200-301 Sample Test Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following do not indicate mismatch on an Ethernet LAN? *Late collisions *Runts *Baby giants *FCS errors *Alignment errors

Baby giants

When a packet is forwarded through a network from one host to another host, which of the following fields in the Ethernet frame will change at every hop? Destination MAC address Source IP address Source port number Destination IP address

Destination MAC address When an Ethernet frame is forwarded through the network, both the source and destination MAC addresses will change at every hop.

Which type of address will a switch use to make forwarding decisions?

Destination MAC addresses

Which cable can suffer attenuation if it is bent beyond the minimum bend radius? UTP STP Co-axial Fiber optic

Fiber optic

Which of the following methods of tunneling Internet Protocol version 6 (IPv6) traffic through an IPv4 network increases protocol overhead because of IPv6 headers? IPv6 over IPv4 tunnels Dual-stack backbones IPv6 over dedicated WAN links Protocol translation

IPv6 over IPv4 tunnels IPv6 over IPv4 tunnels is a method of tunneling IPv6 traffic through an IPv4 network that eliminates the need to create separate circuits to connect to the IPv6 networks. This model increases protocol overhead because of IPv6 headers.

Which of the following statements are TRUE of a straight-through cable? (Choose two.) You can connect a hub to a switch using a straight-through cable. The wires on the cable are crossed over. It is also known as a patch cable. You can connect a switch to a router using a straight-through cable. You can connect two routers using a straight-through cable.

It is also known as a patch cable. You can connect a switch to a router using a straight-through cable.

Which statement is TRUE of the CSMA/CD Ethernet media access method? Each station is allotted a time slot in which they can transmit data. It requires centralized monitoring and control. It is ideal for a switched network environment. It uses a back-off algorithm to calculate a random time value.

It uses a back-off algorithm to calculate a random time value. The Carrier Sense Multiple Access - Collision Detection (CSMA/CD) Ethernet media access control (MAC) method uses a back-off algorithm to calculate random times to transmit packets across a channel. When two stations start transmitting at same time, their signals will collide. The CSMA/CD method detects the collision and causes both stations to hold the retransmission for an amount of time determined by the back-off algorithm. This is done in an effort to ensure that the retransmitted frames do not collide.

Are APICs (Application Policy Infrastructure Controller) directly involved in forwarding traffic?

No

For your current deployment, you need an antenna with 360 degrees radiation in the horizontal plane to use for point-to-multipoint WLAN deployment. Which type of antenna should you deploy? Parabolic dish antenna Patch antenna Yagi antenna Omnidirectional antenna

Omnidirectional antenna

Which of the following topologies provides the best scalability when deployed in the enterprise edge of the CISCO enterprise architecture model? *hub-and-spoke *full-mesh *partial-mesh *point-to-point

Partial-mesh With Partial-mesh a certain degree of redundancy is compromised, however the scalability of the network is proportionately increases because each device on the network is not required to have connection to every other device

What field in missing in this Ethernet Frame preamble SOF destination address source address type ___________ FCS

Payload

You are the network administrator for your company. You want to upgrade the network, which is currently running on IPv4, to a fully functional IPv6 network. During the transition, you want to ensure that hosts capable only of IPv6 can communicate with hosts capable only of IPv4 on the network. Which solution should you implement to accomplish the task in this scenario? Protocol translation IPv6 over dedicated wide area network (WAN) links IPv6 over IPv4 tunnels Dual-stack backbones

Protocol translation The protocol translation deployment model should be used to accomplish the task in this scenario. It is the only offered solution that does not require at least one end of the communication solution to support both IPv6 and IPv4.

Which of the following Application layer protocols use UDP for unsynchronized, connectionless data transfer. (Select 2 choices) *FTP *HTTP *SNMP *SMTP *TFTP

SNMP TFTP SNMP (simple network management protocol) and TFTP (trivial file transfer protocol) use User Datagram Protocol (UDP) for unsynchronized, connectionless data transfer

What field in missing in this Ethernet Frame preamble _____________ destination address source address type payload FCS

SOF

Which of the following addresses will a switch use to populate the CAM table? Destination MAC address Source IP address Destination IP Address Source MAC address

Source MAC address

You are the network administrator for your company. You want to connect the host computers to the switches. Which cable should you use to ensure the connectivity? Straight-through cable Rollover cable Serial cable Crossover cable

Straight-through cable

Which of the following addresses will a switch use to make forwarding decisions? *source IP address *destination IP address *source Mac address *destination Mac address

Switches make forwarding decisions based on the destination MAC address contained in a frames header.

You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? (Choose two.) The application will automatically retransmit the packets. The application will drop the packets. The protocol will drop the packets. The protocol will automatically retransmit the packets.

The application will automatically retransmit the packets. The protocol will drop the packets. User Datagram Protocol (UDP) is a connectionless protocol; thus, it will drop the packets and it will not automatically retransmit them. Because an application is not typically responsible for transmitting data packets across a network, the application in this scenario cannot drop the packets. Instead, an application that uses UDP will usually detect that UDP has dropped packets, and the application will retransmit any dropped packets.

Which of the following statements are true of Class C IP addresses? (Choose all that apply.) The value of the first two binary places in the first octet must be 11. The first octet represents the entire network portion of the address. The first three octets represent the entire network portion of the address. The decimal values of the first octet can range from 192 to 223. The value of the first binary place in the first octet must be 0. The decimal values of the first octet can range from 1 to 126.

The value of the first two binary places in the first octet must be 11. he first three octets represent the entire network portion of the address. The decimal values of the first octet can range from 192 to 223. Class C IP addresses will have the following characteristics: The decimal values of the first octet can range from 192 to 223. The first three octets represent the entire network portion of the address. The value of the first two binary places in the first octet must be 11. Class B IP addresses will have the following characteristics: The decimal values of the first octet can range from 128 to 191. The first two octets represent the entire network portion of the address. The value of the first two binary places in the first octet must be 10. Class A IP addresses will have the following characteristics: The decimal values of the first octet can range from 1 to 126. The first octet represents the entire network portion of the address. The value of the first binary place in the first octet must be 0.

What is another name for hypervisor?

VMM (Virtual Machine Monitor)

You install a second NIC in your Linux computer. Then you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0. Which command should you issue at a command prompt to configure the NIC? ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up ifconfig eth0 192.168.0.1 subnet 255.255.255.0 up ipconfig eth1 192.168.0.1 netmask 255.255.255.0 up ipconfig eth0 192.168.0.1 subnet 255.255.255.0 up

ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up On a Linux computer, you would use the ifconfig command to configure a network interface card (NIC). The first NIC in a Linux computer is typically named eth0, and the second NIC is named eth1. Therefore, you should log on to the Linux computer as root, which is also known as the superuser, and issue the command ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up to configure the second NIC. The 192.168.0.1 portion of the command configures the IP address for the NIC, the netmask 255.255.255.0 portion of the command configures the subnet mask for the NIC, and the up portion of the command activates the NIC. A similar procedure would be used on a UNIX computer.

You receive the following error message after addressing and enabling an interface: %192.168.16.0 overlaps with FastEthernet0/0 Which of the following are NOT the causes of the error message? (Choose two.) incorrect subnet mask in the new interface incorrect encapsulation configured incorrect IP address on the new interface failure to issue the no shutdown command

incorrect encapsulation configured failure to issue the no shutdown command The error message %192.168.16.0 overlaps with FastEthernet0/0 indicates that the newly configured interface is in the same subnet as an existing interface. This can occur if there is an incorrect subnet mask or an address that inadvertently places the new interface in that subnet. Each router interface must be in a different subnet to function. For example, when the series of commands below is executed on a router, it will elicit the error message because the two IP addresses used are in the same subnet given the subnet mask in use.

Which type of switching process requires a switch to wait for the entire frame to be received before forwarding it to a destination port? frame-forward fragment-free store and forward cut-through

store and forward The store and forward switching process requires a switch to wait until the entire frame is received before forwarding it to a destination port. The store and forward method increases latency as it buffers the entire frame and runs a frame check sequence (FCS) before forwarding it to the destination port. However, it ensures error-free frame forwarding because its filters all frame errors.

How many octets of a MAC address represents the OUI *one *two *three *four *five

three

Your company is located in Charlotte, North Carolina. Management has decided to deploy multiple 802.11a WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment? three four twenty-three eleven

twenty-three The 802.11a wireless local area network (WLAN) technology supports twenty-three non-overlapping or non-interfering channels that can be used in a single area.

Which of the following is not true regarding the IaaS (Infrastructure as a Service) service model? *The consumer has control over the configuration of the OS running on the physical infrastructure in the cloud * The consumer has control over the physical infrastructure in the cloud *The consumer has control over the allocation of processing, memory, storage, and network resources within the cloud *The consumer has control over development tools or APIs in the cloud running on the physical infrastructure in the cloud

* The consumer has control over the physical infrastructure in the cloud

Which of the following statements are true regarding physical connections in the ACI (Application Centric infrastructure) architecture? Select 2 choices *Spine nodes must be fully meshed *Leaf nodes must be fully meshed *Each leaf node must connect to every spine mode *Each spine node must connect to every lead node *An APIC must connect to at least one spine node

*Each leaf node must connect to every spine mode *Each spine node must connect to every lead node

Which of the following devices cannot b e connected to leaf nodes in the CISCO ACI (Application Centric infrastructure) architecture? *APICs *Application servers *EPGs *Leaf nodes *Spine nodes

*Leaf nodes

Which of the following MAC address represents an IP multicast address *CF-00-00-00-00-00 *00-00-0C-F0-F0-F0 *01-00-5E-0F-0F-F0 *FF-FF-FF-FF-FF-FF

01-00-5E-0F-0F-0F

Which of the following MAC addresses represents an IP multicast address. 00-00-0C-F0-F0-F0 01-00-5E-0F-0F-0F CF-00-00-00-00 FF-FF-FF-FF-FF

01-00-5E-0F-0F-0F The MAC address of 01-00-5E-0F-0F-0F represents a IP multicast address. The Ethernet multicast range of 01-00-5E-00-00 through 01-00-5E-7F-FF-FF has been allocated for IP multicast use

Which of the following networks is not defined by RFC 1918 *10.1.1.0 *10.16.1.0 *172.20.1.0 *172.172.1.0 *192.168.1.0 *192.168.111.0

172.172.1.0 The IP address 172.172.1.0 is a public address and is not defined by the RFC 1918

You issue the show running-config command on Router A and receive the following partial output interface FastEthernet0/0 ip address 192.168.18.33 255.255.255.240 HostA is on the same physical network as the FastEthernet 0/0 interface of RouterA Which IP address should you configure on HostA to ensure that the host can communicate with the rest of the network? *192.168.18.16/28 *192.168.18.32/28 *192.168.18.46/28 *192.168.18.48/28

192.168.18.46/28

Which is NOT a valid range for private IP addresses? 192.168.0.0 - 192.168.255.255 192.255.255.255 - 193.0.0.0 172.16.0.0 - 172.31.255.255 10.0.0.0 - 10.255.255.255

192.255.255.255 - 193.0.0.0

You have the following equipment list: Two IP subnets of 255.255.255.0 Seven 48-port switches Two router interfaces Which of the following network scenarios could be supported? 300 workstations, with 150 workstations in two broadcast domains and each workstation in its own collision domain 300 workstations in a single broadcast domain, each workstation in its own collision domain 300 workstations, with 150 workstations in two broadcast domains and all workstations in the same collision domain 600 workstations, with 300 workstations in two broadcast domains and each workstation in its own collision domain

300 workstations, with 150 workstations in two broadcast domains and each workstation in its own collision domain

Which of the following statements are TRUE regarding a local area network (LAN)? (Choose three.) A LAN is confined to one building or campus. A LAN is easily expandable. A LAN provides fast data transmission. LANs require the use of a router to communicate between local hosts. A LAN can cover great distances.

A LAN is confined to one building or campus. A LAN is easily expandable. A LAN provides fast data transmission. A LAN is confined to one building or campus, provides fast data transmission, and is easily expandable. A LAN refers to the interconnection of computers within a building or a group of buildings. A LAN generally uses twisted pair cables for data transmission.

Which of the following best describe what occurs when a packet must be re-sent because of an interruption that occurs before the 64th byte has been transmitted? *A runt frame is transmitted *A collision occurs *A late collision occurs *A baby giant frame is transmitted *A Jumbo frame is transmitted

A collision occurs

Which of the following examples best describe the SaaS service model. *A company moves all company-wide documents to an internet-based virtual file system hosted by another provider. *A company hires a service provider to deliver cloud-based processing and storage that will house multiple virtual host configured in a variety of ways *A company licenses an office suite, including email service, that is delivered to the end user through a web browser. *A company obtains a subscription to use a service provider's infrastructure, programing tools, and programming languages to develop and serve cloud-based applications

A company licenses an office suite, including email service, that is delivered to the end user through a web browser.

Which of the following examples best describe the PaaS service model? *A company moves all company-wide documents to an internet-based virtual file system hosted by another provider. *A company hires a service provider to deliver cloud-based processing and storage that will house multiple virtual host configured in a variety of ways *A company licenses an office suite, including email service, that is delivered to the end user through a web browser. *A company obtains a subscription to use a service provider's infrastructure, programing tools, and programming languages to develop and serve cloud-based applications

A company obtains a subscription to use a service provider's infrastructure, programing tools, and programming languages to develop and serve cloud-based applications

You run the following command: switch# show ip interface brief What information is displayed? The IP addresses for the interface and the routing protocol advertising the network The IP packet statistics for the interfaces A summary of the IP addresses on the interface and the interface's status A summary of the IP addresses and subnet mask on the interface

A summary of the IP addresses on the interface and the interface's status

What MAC frame components is missing? FC DUR ADD1 ADD2 _______ SEQ ADD4 DATA FCS

ADD3

Which of the following are types of Internet Protocol version 6 (IPv6) addresses? (Choose three.) Broadcast Anycast Dual-cast Unicast Multicast

Anycast Unicast Multicast

Which table is used by a switch to discover the relationship between Layer 2 address of a device and the physical port used to reach the device

CAM table The Content Addressable Memory (CAM) table us used by a switch to discover the relationship between OSI Layer 2 address of a device and the physical port to reach the device

Refer to the following partial output of the show interfaces command: Serial 0 is down, line protocol is down Hardware is MCI Ethernet, address is 0000.0c00.750c (bia 0000.0c00.750c) Internet address is 134.108.28.8, subnet mask is 255.255.255.0 MTU 1500 bytes, BW 10000 Kbit, DLY 100000 usec, rely 255/255, load 1/255 Encapsulation ARPA, loopback not set, keepalive set (10 sec) ARP type: ARPA, ARP Timeout 4:00:00 Last input 0:00:00, output 0:00:00, output hang never Last clearing of "show interface" counters 0:00:00 Output queue 0/40, 0 drops; input queue 0/75, 0 drops Five minute input rate 0 bits/sec, 0 packets/sec Five minute output rate 2000 bits/sec, 4 packets/sec 1127576 packets input, 447251251 bytes, 0 no buffer Received 354125 broadcasts, 0 runts, 0 giants, 57186* throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 5332142 packets output, 496316039 bytes, 0 underruns 0 output errors, 432 collisions, 0 interface resets, 0 restarts <<output omitted>> What troubleshooting steps should you perform to resolve the problem depicted in the output? (Choose two.) Check the router configuration. Check the router configuration for the shutdown interface command. Check the cable connections. Reset the equipment.

Check the cable connections. Reset the equipment. You should check the cable connections and reset the equipment to troubleshoot the problem depicted in the output. The Serial 0 is down, line protocol is down message indicates that there is no carrier detect (CD) signal sensed by the router. This problem might be due to incorrect cabling or a possible hardware failure. A complete list of the possible troubleshooting steps that should be performed to resolve this issue include: Checking the cable connections. Resetting the equipment. Checking the CD LED on the CSU/DSU. Reporting the issue to the leased-line provider. Replacing the faulty equipment.

which of the following is considered best practice when expanding an existing 802.11 wireless network Configuring each AP with the same SSID and unique, overlapping channel Configuring each AP with a unique SSID, nonoverlapping channel Configuring each AP with a unique SSID, and the same channel Configuring each AP with the same SSID and unique, nonoverlapping channel

Configuring each AP with the same SSID and unique, nonoverlapping channel

Which of the following is NOT a benefit of cloud computing to cloud users? On-demand self-service resources provisioning Highly available, horizontally scaled applications Centralized appearance of resources Cost reduction from standardization and automation

Cost reduction from standardization and automation Cost reduction from standardization and automation is a benefit that accrues to the cloud provider, not the cloud users. Additional benefits to cloud providers are: High utilization through virtualization and shared resources Easier administration Fail-in-place operations model.

Which of the following fields in an 802.11 MAC frame is used to indicate whether the frame is a management frame? *FC *FCS *DUR *SEQ

FC The Frame Control field of 802.11MAC frame is used to indicate whether the frame is a management frame

Which of the following is a unique local IPv6 unicast prefix? *FE80::/10 *FF00::/8 *FC00::/7 *2000::/3

FC00::/7

Which of the following fields appears last in an Ethernet frame? *Preamble *SOF *Destination address *Source address *Length *Data *FCS

FCS 4 byte Frame Check Sequence appears last in an Ethernet Frame

Which of the following IPv6 prefixes is used for unicast link-local addresses? *2000::/3 *FC00::/8 *FD00::/8 *FE80::/10 *FE00::/8

FE80::/10

Which of the following prefixes will an IPv6-enabled computer use to automatically configure an IPv6 address for itself? *2000::/3 *FC00::/7 *FE80::/10 *FF00::/8

FE80::/10

Which of the following IPv6 prefixes is used for unicast link-local addresses? FC00::/8 FF00::/8 FD00::/8 2000::/3 FE80::/10

FE80::/10 The IPv6 prefix FE80::/10 is used for unicast link-local address. IPv6 addresses in the FE80::/10 range begin with the characters FE80 through FEBF. Unicast packets are used for one to one communication. Link-local addresses are unique only on the local segment. Therefor, link-local addresses are not routable.

Which of the following prefixes will an IPv6 enabled computer use to automatically configure an IPv6 address for itself. *FE80::/10 *FC00::/7 *2000::/3 *FF00::/8

FE80::/10 The IPv6 prefix FE80::/10 is used for unicast link-local address. IPv6 addresses in the FE80::/10 range begin with the characters FE80 through FEBF. Unicast packets are used for one to one communication. Link-local addresses are unique only on the local segment. Therefor, link-local addresses are not routable.

Which of the following IPv6 address prefixes are not routable? (Select 2) *2000::03 *FC00::/8 *FD00::/8 *FE80::/10 *FF02::/16 *FF05::/16

FE80::/10 FF02::/16

Which of the following IPv6 prefixes is used for multicast addresses? *2000::/3 *FC00::/8 *FD00::/8 *FE80::/10 *FF00::/8

FF00::/8

Which of the following IPv6 addresses is a link-local multicast address that is used to send a packet to all routers on a segment. *FF02::1 *FF02::2 *FF05::1 *FF05::2

FF02::2

Which of the following IPv6 addresses is a link-local multicast address that is used to send a packet to all routers on a segment? FF05::1 FF02::1 FF05::2 FF02::2

FF02::2 The IPv6 address FF02::2 is a link-local multicast address that is used to send a packet to all routers on a segment. All IPv6 router interfaces automatically join this multicast group.

Which of the following Application layer protocols use TCP for reliable, connection-oriented data transfer? *DHCP *FTP *SNMP *TFTP

FTP

Which of the following terms best describes an Ethernet frame that exceeds 1,518 bytes and has a bad FCS value *Runt *Giant *Baby Giant *Jumbo

Giant

You are configuring a serial link between a Cisco router and a router produced by another vendor. What would be the advantages of using Point-to-Point Protocol (PPP) over High-Level Data Link Control (HDLC) in this scenario? HDLC is not available on non-Cisco routers. PPP is faster. PPP performs error checking. HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors.

HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors. High-Level Data Link Control (HDLC) has a proprietary "type" field that may be incompatible with equipment from other vendors. It is recommended that PPP always be used when combining equipment from multiple vendors because this Data Link layer WAN protocol is an industry standard. PPP is implemented in the same manner on all PPP-capable equipment.

You have been hired as the security administrator for a company. During your first weeks, you discover that most of the client and server computers are not protected from intrusions in any way. For the servers, management wants you to implement a solution that will prevent intrusions on a single server. Which system should you implement to satisfy management's request? NIDS NIPS HIPS HIDS

HIPS You should implement a Host Intrusion Prevention System (HIPS) to prevent intrusions on a single server or computer.

SwitchB receives a frame with the following fields: Source MAC Destination MAC Source IP Destination IP 00c0.57ce.ce33 00c0.aab3.1693 192.168.5.5 192.168.5.9 Below is the partial output of the show mac-address table command as executed on SwitchB: Destination Address Address Type VLAN Destination port 00c0.57ce.ce33 Dynamic 1 FastEthernet0/4 00c0.566e.5858 Dynamic 1 FastEthernet0/5 00c0.45ee.eed4 Dynamic 1 FastEthernet0/7 00c0.aab3.1693 Dynamic 1 FastEthernet0/10 How will SwitchB handle the frame it just received? It will record the source MAC address It will drop the frame It will forward the frame out FastEthernet0/10 only It will forward the frame out all ports It will forward the frame out FastEthernet0/4 only

It will forward the frame out FastEthernet0/10 only SwitchB will forward the frame out FastEthernet0/10 only. The MAC address table indicates that the switch has the destination MAC address in its table and the destination is located on switch port FastEthernet 0/10. Therefore, it will switch the frame to that interface.

Which of the following can cause later collisions on a Ethernet LAN? Select 2 choices *A native VLAN mismatch *BPDU guard *UDLD *Long cable segments *Duplex mismatch

Long cable segments Duplex mismatch

You issue the following commands on a Cisco router's FastEthernet 0/0 interface: ipv6 enable no shutdown The interface on the other side of the link is not yet configured. In addition, there is no DHCPv6 server on the network. How many IPv6 addresses are configured on the interface? (select the best answer) *none *one *two *three

One

What field in missing in this Ethernet Frame __________ SOF destination address source address type payload FCS

Preamble

What MAC frame components is missing? FC DUR ADD1 ADD2 ADD3 ____ ADD4 DATA FCS

SEQ

RouterA and RouterB, which connect two locations, are unable to communicate. You run the show running-configuration command on both router interfaces, RouterA and RouterB. The following is a partial output: routerA#show running-config interface Serial0 description Router_A ip address 192.10.191.2 255.255.255.0 encapsulation ppp no ip mroute-cache clockrate 64000 routerB#show running-config interface Serial1 description Router_B ip address 192.10.192.1 255.255.255.0 encapsulation ppp no ip mroute-cache clockrate 64000 Based on the information given in the output, what are the likely causes of the problem? (Choose two.) The Layer 2 framing is misconfigured. The IP address defined is incorrect. Both routers cannot have a clock rate defined. Both routers cannot have an identical clock rate. At least one of the routers must have the ip mroute-cache command enabled.

The IP address defined is incorrect. Both routers cannot have a clock rate defined. Two possible causes of the problem are that the IP addresses are incorrect as defined, or that both routers have a defined clock rate. The IP addresses on the routers are in different subnets. The IP addresses need to be changed to fall in the same subnet.

You are considering a candidate for a job as a Cisco network technician. As part of the assessment process, you ask the candidate to write down the commands required to configure a serial interface, in the proper order with the correct command prompts. The candidate submits the set of commands shown below (line numbers are for reference only): 1 Router# configure terminal 2 Router(config)# interface S0 3 Router(config)# ip address 192.168.5.5 4 Router(config-if)# enable interface 5 Router(config-if)# description T1 to Raleigh Which part(s) of this submission are incorrect? (Choose all that apply.) The prompt is incorrect on line 4 The command on line 4 is incorrect The IP address on line 3 is missing a subnet mask The prompt is incorrect on line 1 The prompt is incorrect on line 3 The prompt is incorrect on line 5 The description command must be executed before the interface is enabled

The IP address on line 3 is missing a subnet mask The command on line 4 is incorrect The prompt is incorrect on line 3 The IP address is missing a subnet mask, the prompt is incorrect on line 3, and the command enabling the interface (line 4) is incorrect. The correct prompts and commands are as follows: Router# configure terminal Router(config)# interface S0 Router(config-if)# ip address 192.168.5.5 255.255.255.0 Router(config-if)# no shutdown Router(config-if)# description T1 to Raleigh The prompt for line 3 would be Router(config-if)# because the interface S0 command was issued immediately prior to the ip address 192.168.5.5 command. The prompt will remain Router(config-if)# for lines 3, 4, and 5 as each command that applies to the S0 interface is executed, including the description command. The command to enable the interface is no shutdown, not enable interface. Therefore, the command executed on line 4 was incorrect.

Which of the following statements about unique local unicast IPv6 addresses are true? (Select 2) *They are assigned by ICANN *They are equivalent to IPv4 multicast addresses *They can communicate only over a single link *The first 7 bits of the prefix are always 1111110 *They are unique only within an organization

The first 7 bits of the prefix are always 1111110 They are unique only within an organization

As part of your company's cloud deployment, the cloud service provider (CSP) implements virtual machines on a Type I hypervisor. Which of the following statements is NOT true about this virtualization deployment? The hypervisor is known as a bare metal or embedded hypervisor. The hypervisor works directly on the host's hardware. The hypervisor is dependent on the host OS for its operation. The hypervisor's main task is sharing and managing hardware resources.

The hypervisor is dependent on the host OS for its operation. A Type I hypervisor is NOT dependent on the host OS for its operation. This is true of a Type 2 hypervisor. A Type 2 hypervisor is installed on top of the host's OS and supports other guest OSes running above it as virtual machines

Does Because a Spine Node has connection to every Leaf Node, what limits scalability of the fabric?

The number of ports on the Spine node

You have issued the Power Inline Police action log command from interface configuration mode on a Cisco switch Which of the following best describes what will occur when an attached PD attempts to draw more than its allocated amount of power from the configured interface *The port will enter an error-disabled state, and a log message will appear on the console *The port will restart, and a log message will appear on the console *A log message will appear on the console *The port will enter an error-disabled state

The port will enter an error-disabled state

You have issued the Power Inline Police command from interface configuration mode on a Cisco switch Which of the following best describes what will occur when an attached PD attempts to draw more than its allocated amount of power from the configured interface *The port will enter an error-disabled state, and a log message will appear on the console *The port will restart, and a log message will appear on the console *A log message will appear on the console *The port will enter an error-disabled state

The port will enter an error-disabled state, and a log message will appear on the console The port will enter an error-disabled state, and a log message will appear on the console when an attached powered device (PD) attempts to draw more than its allocated amount of power from the configured interface.

A switch is powered up and the system LED is amber. Which of the following describes this situation? There is a security violation on a switch port. The switch is malfunctioning. The switch is performing normally. Utilization level is high.

The switch is malfunctioning. The system LED indicates the overall health of the switch. The LED should turn solid green after a successful Power On Self-Test (POST). An amber system LED indicates that there is a system-wide failure in the switch.

Which of the following is NOT a characteristic of private Internet Protocol (IP) addressing? The ranges of private IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These addresses are not routable through the public Internet. These addresses are publicly registered with the Internet Network Information Center (InterNIC). These addresses are reserved by the Internet Assigned Numbers Authority (IANA).

These addresses are not routable through the public Internet. It is NOT correct to state that private IP addresses are publicly registered with the Internet Network Information Center (InterNIC). Only public IP addresses are registered with the InterNIC. The following characteristics are TRUE regarding private IP addressing: Private addresses are not routable through the public Internet. Private address ranges are reserved by the Internet Assigned Numbers Authority (IANA). The ranges of private IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. The use of private IP addressing conserves the use of the public IPv4 address space. Private addresses cannot be registered publicly. Private IP addresses conserve public addressing space and can improve network security.

Which of the following statements is true regarding link-local addresses? *They must be globally unique *They must never be used as source addresses *They must never be used as destination addresses *They are used for ULA *They are not routable

They are not routable Link-local unicast addresses are unique only on the local segment, they need not be globally unique and are not routable

Your company is located in Atlanta, Georgia. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment? eight eleven five three

Three 802.11b wireless local area networks (WLANs) support three non-overlapping or non-interfering channels that can be used in a single area. An additional channel (channel 14) is supported in all countries except the United States.

How many address fields can be expected in an 802.11 data frame that is sent from a wireless station and destined to a host on the wired network? *one *two *three *four

Three three address fields can be expected in an 802.11 data frame that is sent from a wireless station to a host on the wired network

You must capture an operating system (OS) baseline that will be used when your company deploys new virtual machines in the cloud. You must ensure that the OS baseline is properly hardened prior to its capture. Which of the following guidelines should you follow? (Choose all that apply.) Deploy all OS updates and patches. Disable all nonessential services. Disable all nonessential software. Rename or disable all default accounts.

To ensure that the OS baseline is properly hardened, you should follow all of these guidelines: Disable all nonessential services. Disable all nonessential software. Deploy all OS updates and patches. Rename or disable all default accounts. In addition to these guidelines, you should also use a clean installation of the OS. When capturing an OS baseline, it is important that you document the OS configuration and store the baseline in a secure location.

You issue the following command on a Cisco router's FastEthernet 0/0 interface: ipv6 address 2001:DB8:A::/64 eui-64 no shutdown The interface on the other side of the link is not yet configured. In addition, there is no DHCPv6 server on the network. How many IPv6 addresses are configured on the interface? *none *one *two *three

Two Two IPv6 addresses are configured on the interface after you issue the ipv6 address 2001:DB8:A::/64 eui-64 command on FE0/0. The eui-64 keyword configures a static IPv6 prefix but allows the router to automatically generate a 64-bit interface ID known as a extended unique identifier (EUI)-64 interface ID, the EUI-64 interface ID based on the interface's Media Access Control (MAC) address

Which of the following modes are Cisco Internetwork Operating System (IOS) operating modes? (Choose two.) User EXEC mode NVRAM monitor mode Local configuration mode User privileged mode Global configuration mode

User EXEC mode Global configuration mode

You have been hired as a network security consultant. The company has had multiple incidents where their wireless network has been breached by hackers. You find out that they have a RADIUS authentication server that they use for the corporate VPN. You decide to recommend using RADIUS authentication for the wireless network. Which WPA version should you suggest? WPA-Enterprise WPA-PSK WPA2 WPA

WPA-Enterprise WPA-Enterprise requires the use of a RADIUS authentication server. WPA-Enterprise is intended for large networks. It is also referred to as WPA-802.1x.

You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security while providing support for older wireless clients. Which protocol should you choose? Wireless Application Protocol (WAP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access 2 (WPA2) Wired Equivalent Privacy (WEP)

Wi-Fi Protected Access (WPA) You would implement WPA. WPA was created to fix core problems with WEP. WPA is designed to work with older wireless clients while implementing the 802.11i standard.

You are connecting two Catalyst 6500 switches with fiber optic cable. When you boost switch A, you receive a SYS-3-TRANSCEIVER_NOT APPORVED error. Which of the following is most likely the cause of the problem *You have connected a cable to an incorrect port *There is a physical problem with the fiber cable *You have installed the SFP module upside down *You have installed a third party SFP module

You have installed a third party SFP module Cisco devices do not support the use of third party modules

Which statement best describes a converged network? a network with a mix of voice, video, and data traffic a network with mix of data and video traffic a network with a mix of voice and video traffic a network with real-time applications

a network with a mix of voice, video, and data traffic A converged network is a combination of voice, video, and data traffic. Network convergence is a migration from maintaining multiple service-specific networks, namely data, voice, and video, to a single IP-based network. All services are delivered on the same network, reducing infrastructure costs. Despite the benefits that network convergence provides, it is highly susceptible to network delays, especially for real-time traffic.

You are using Wireshark to monitor traffic on a local LAN segment. You noticed that a large number of frames originating from a particular host contain a destination MAC address of FF-FF-FF_FF-FF-FF What kind of address is the destination address you have noticed in these frames *broadcast *loopback *multicast *unicast

broadcast

You have connected two routers in a lab using a Data Terminal Equipment (DTE)-to-Data Circuit-terminating Equipment (DCE) cable. Which command must be issued on the DCE end for the connection to function? clock rate no bandwidth bandwidth no clock rate

clock rate You would issue the clock rate command on the DCE end for the connection to function. The clock rate is set on the Data Circuit-terminating Equipment (DCE) device. DCE is also known as Data Communications Equipment.

In a two tier network design, which layers are combined together? *core and access *core and distribution *aggregation and access *distribution and access *core, aggregation, and access *core, distribution, and access

core and distribution The core and distribution layers are combined together into a single layer; this two tier network design is often called the collapsed core design

What field in missing in this Ethernet Frame preamble SOF __________ source address type payload FCS

destination address

Which of the following IPV6 commands is used to define a static host name-to-address mapping in the host name cache? ipv6 neighbor ipv6 host ipv6 unicast routing ipv6 local

ipv6 host The ipv6 host command is used to define a static host name-to-address mapping in the host name cache, and is executed in global configuration mode.

Which of the following address types is used by IPv6 routing protocols to form neighbor adjacencies? *global unicast address *anycast address *link-local address *multicast address *site-local unicast address

link-local address

Administrators at your company are responsible for creating, starting, and stopping virtual machine (VM) instances. Which VM component is used to perform these functions? data plane management plane control plane storage pool

management plane The management plane is the component used to create, start, and stop VM instances. It also provisions them with the proper virtual resources. The control plane refers to the processes that control the work done by the network device but do not directly impact the forwarding of individual frames or packets. The data plane refers to the actions that devices take to forward data. The storage pool is all of the storage media used in virtualization.

Which of the following devices can be connected to a router WAN serial interface that can provide clocking? (Choose two.) hub modem switch CSU/DSU

modem CSU/DSU

You are purchasing a device to upgrade your network. You need to determine the type of device required as well as the number and type of required interfaces. The device will host three LAN subnets and a T1 Internet connection. Which of the following devices and interface combinations will support this requirement without providing any unnecessary interfaces or using subinterfaces? a switch with one modem and three serial interfaces a router with one serial interface and one Ethernet interface a router with one serial interface and three Ethernet interfaces a switch with one Ethernet interface and three serial interfaces

router with one serial interface and three Ethernet interfaces This deployment will require a router with one serial interface and three Ethernet interfaces. When LAN subnets and the Internet must be connected, you must deploy a device that can make decisions based on IP addresses. This is the function of a router. Each LAN subnet will require a separate Ethernet interface, and the T1 connection requires a serial interface, so the router must have one serial interface and three Ethernet interfaces.

Which of the following commands would allow you to determine the bandwidth of an interface? show interfaces show cdp show interfaces accounting show cdp neighbors

show interfaces

Which Cisco IOS command would you use to troubleshoot IP addressing problems? show config-file show config show running-config ipconfig /all

show running-config The show running-config command will help troubleshoot IP addressing problems because it shows the details of the router configuration, including the IP address configured on each interface.

Which of the following addresses will a switch use to populate the CAM table? *source IP addresses *destination IP addresses *source MAC addresses *destination MAC addresses

source MAC addresses A switch will use source MAC addresses to populate the Content Addressable Memory (CAM) table. The CAM table, which is also called the switching table, is used by a switch to discover the relationship between the OSI layer 2 address of the device and the physical port used to reach the device

You are the network administrator for your company. The network at the company's office is due to be upgraded, and you have been assigned the responsibility of identifying the requirements for designing the network. You need to provide network connectivity to 200 client computers that will reside in the same sub network, and each client computer must be allocated dedicated bandwidth. Which device should you use to accomplish the task? router hub firewall switch

switch You should use a switch to accomplish the task in this scenario. A switch is used to provide dedicated bandwidth to each node by eliminating the possibility of collisions on the switch port where the node resides. Switches work at Layer 2 in the Open System Interconnection (OSI) model and perform the function of separating collision domains. When a node resides in its own collision domain, the possibility of collisions (which slow throughput due to the subsequent but necessary retransmission) is eliminated. The advantage of using a switch instead of a hub is that a switch provides dedicated bandwidth to each client, while all connected clients share the bandwidth on a hub.

Which of the following tables is used by a switch to discover the relationship between the layer 2 address of a device and the physical port used to reach the device *the FIB table *the ARP table *the CAM table *the adjacency table *the VLAN table

the CAM table The CAM table is used by a switch to discover the relationship between the OSI Layer 2 address and the physical port used to reach the device

You set up several routers in your lab. Two of them are connected back to back using a Data Terminal Equipment (DTE)-to-Data Circuit-terminating Equipment (DCE) cable. You need to configure the clock rate. On which router would you configure the clock rate? the DTE the DCE The clock rate is set by default The clock rate cannot be configured

the DCE The clock rate is set on the Data Circuit-terminating Equipment (DCE) device. DCE is also known as Data Communications Equipment.

You are attempting to add an IP address to an interface on a router with which you are unfamiliar. You type the following command and receive the following error: Router78(config)#interfce Serial0 ^ %invalid input detected at '^' marker. Which of the following could be a reason for receiving this message? the command syntax is incorrect the interface is configured already the interface type does not exist on this router the command is entered at the wrong prompt

the command syntax is incorrect The command has a syntax error. The word interface is misspelled as indicated by the marker.

he execution of the show interfaces command yields the following as a part of its output: Ethernet 0/0 is up, line protocol is down. Which of the following can be determined from this output? A)the link is not functional due to a Physical layer issueB)the link is not functional due to both a Physical layer and a Data Link layer issueC)the link is not functional due to a Data Link layer issueD)the link is fully functional

the link is not functional due to a Data Link layer issue The command output excerpt indicates that the link is not functional due to a Data Link layer (or "line protocol") issue, while the Physical layer (Layer 1) is operational. The first (left) column indicates the Physical layer state of the interface, while the second (right) column indicates the Data Link layer state of the interface.

You have issued the Errdisable detect cause inline power command from global configuration mode on a Cisco switch. Power policing is enabled with the default settings. If a PD attempts to draw more power than the cutoff power from a PoE-enabled interface, how long will the interface remain error-disabled state *300 seconds *30 seconds *until it is manually reset with the Shutdown and No Shutdown command *84,400 seconds

until it is manually reset with the Shutdown and No Shutdown command


Set pelajaran terkait

Chapter 13, 14, 15, 16 Study Questions

View Set

Chapter 11: Overview of the Dentitions

View Set

Chapter 13 NCLEX Review (website)

View Set

Xcel solutions chapter 3 - policy provisions

View Set

ACCT3723 EXAM 3 CH 24: Full Disclosure in Financial Reporting

View Set

CISCO Chapter 4 Exam Flash Cards

View Set

Forensic Psychology Chapter 5, PSY 320 ch 5, PSY 320 ch 8, Psy 327 ch 7, Psy 327 ch 5, Psy 327 chapter 1, Psy 327 ch 5

View Set