Network Pro Final Study Set - Part 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following utilities would you use to view the routing table? traceroute dig tracert route mtr

route EXPLANATION Use the route command to display the contents of the routing table and to add or remove static routes. traceroute, or tracert, uses ICMP packets to test connectivity between devices and shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and be returned by that host. The mtr command on Linux is a combination of the ping and traceroute commands. The dig command resolves (looks up) the IP address of a host name. REFERENCES LabSim for Network Pro, Section 7.4.

Which of the following commands would display the output shown here? mtr ifconfig host route print

route print EXPLANATION Use the route print or netstat -r commands to display the contents of the routing table. The mtr command performs a test that is like a combination of the ping and traceroute commands. The host command resolves host names to IP addresses. The ifconfig command shows the IP configuration on a Linux computer. REFERENCES LabSim for Network Pro, Section 7.4.

The network board in a workstation is currently configured as follows: Network speed = Auto Duplexing = Auto The workstation is experiencing poor network performance, and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings? (Select two.) show interface switchport show interface capabilities show interface show interface ethernet counters show running-config interface

show running-config interface show interface EXPLANATION To view the speed and duplex settings of the interfaces in a Cisco switch, you can use one of the following commands: show running-config interface (displays concise summary information) show interface (displays extended information) The show interface capabilities command displays information about the capabilities of the interfaces in the switch, not the current configuration. The show interface ethernet counters command displays statistics for interfaces. The show interface switchport command displays VLAN information about switch interfaces. REFERENCES LabSim for Network Pro, Section 6.7.

Which TCP/IP utility gives you the following output? nslookup tracert ifconfig ipconfig

tracert EXPLANATION The exhibit shows a few lines from the tracert command, which shows you each host a packet must pass through to reach its destination. REFERENCES LabSim for Network Pro, Section 7.4.

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which of these commands produced this output? tracert ping pingroute nslookup

tracert EXPLANATION The output is from a tracert command run on a Windows Server 2003 system. The tracert command provides information on each step in the route a packet takes to reach a remote host. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and be returned by that host. This information can be useful for locating congestion points on a network or when verifying that network routing is operating as expected. The ping command is used to test connectivity between devices on a network. Like tracert, ping sends three packets to the target host, but it does not report information on any intermediate devices it traverses to reach the target. nslookup is a tool provided on Linux, Unix, and Windows systems that allows manual name resolution requests to be made to a DNS server. This can be useful when troubleshooting name resolution problems. REFERENCES LabSim for Network Pro, Section 7.4.

Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver? -1.2 dB -0.9 dB -0.6 dB -0.3 dB

-1.2 dB EXPLANATION When calculating a loss budget for a segment of fiber optic cable, use the following guidelines: - Connectors = 0.3 dB loss each - Splices = 0.3 dB loss each - Multimode cabling = 3 dB loss per 1000 meters (850 nm) or 1 dB loss per 1000 meters (1300 nm) - Single mode cabling = 0.5 dB loss per 1000 meters (1310 nm) or 0.4 dB loss per 1000 meters (1550 nm) In this scenario, there are two connectors (0.3 dB loss each) and 200 meters of 850 nm multimode cable (.2 * 3 dB) for a total expected loss of 1.2 dB. Note that dirty or poorly polished connectors can dramatically increase the amount of loss in the cable. REFERENCES LabSim for Network Pro, Section 2.5.

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.) 224.15.166.12 172.18.188.67 240.12.188.1 127.0.0.1 32.188.99.10 192.168.12.253 10.0.12.15

10.0.12.15 192.168.12.253 172.18.188.67 EXPLANATION Of the addresses listed here, the following are in the private IP address ranges: 10.0.12.15 (private range = 10.0.0.0 to 10.255.255.255) 172.18.188.67 (private range = 172.16.0.0 to 172.31.255.255) 192.168.12.253 (private range = 192.168.0.0 to 192.168.255.255) REFERENCES LabSim for Network Pro, Section 7.3.

What is the binary format for the following decimal IP address? 131.9.202.111 10000111.00001101.11001110.01011101 10000011.00001001.11001010.01101111 10000110.00001011.11000101.10101110 10000001.00001010.11000011.01010111

10000011.00001001.11001010.01101111 EXPLANATION 10000011.00001001.11001010.01101111 is the binary format of this address. To convert binary to decimal, remember the following numbers:128, 64, 32, 16, 8, 4, 2, 1Each number represents the decimal value for a binary 1 in the corresponding position. For example, 10000000 is equal to 128, and 00010000 is equal to 16. To find the binary form of a decimal number, try to subtract each decimal value from the value in the octet. For example, for 131, you can subtract 128 leaving a remainder of 3. You can then subtract 2, and then 1. For each number you can subtract, write a 1 in the address's binary position. REFERENCES LabSim for Network Pro, Section 1.5.

Match each decimal value on the left with the corresponding hexadecimal value on the right. Not all decimal values have a corresponding hexadecimal value. Drag 11 12 13 14 15 16 17 Drop 11 B D F C 10

11-17 B-11 D-13 F-15 C-12 10-16 EXPLANATION Hexadecimal is a Base 16 numbering system, which means there are 16 characters possible for each number place. These characters go from 0 to 9, as decimal does; however, hexadecimal uses the letter A to represent the decimal number 10, B represents 11, and so on up to F, which represents 15. The easiest way to convert between decimal and hexadecimal is to memorize the corresponding values for each hexadecimal number using the following tables. Hex Value 0 1 2 3 4 5 6 7 8 9 A B C D E F Decimal Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Hex Value 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F Decimal Value 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 REFERENCES LabSim for Network Pro, Section 1.5.

Which of the following IP addresses is a valid IP address for a host on a public network? 142.15.6.1 172.16.254.12 10.3.125.2 192.168.16.45

142.15.6.1 EXPLANATION A public network is a network that does not limit traffic to members of a corporation or other group. The internet is an example of a public network. Certain sets of IP addresses are reserved for private networks only and cannot be used on public networks. They are: 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 REFERENCES LabSim for Network Pro, Section 7.3.

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 10.0.0.1 - 10.255.255.254 172.16.0.1 - 172.31.255.254 169.254.0.1 - 169.254.255.254 192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254 EXPLANATION 169.254.0.1 - 169.254.255.254 is the range of IP addresses assigned to Windows DHCP clients if a DHCP server does not assign the client an IP address. This range is known as the Automatic Private IP Addressing (APIPA) range. The other three ranges listed in this question are defined as the private IP addresses from RFC 1918, which are commonly used behind a NAT server. REFERENCES LabSim for Network Pro, Section 7.3.

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network shown? 0 1 2 4 5

2 EXPLANATION There are two broadcast domains. Each VLAN is in its own broadcast domain. When you connect devices to a switch, each switch port connection is in its own collision domain. In this graphic, there are five collision domains. REFERENCES LabSim for Network Pro, Section 6.5.

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011 238.90.202.99 205.57.169.66 190.42.154.51 206.58.170.67

206.58.170.67 EXPLANATION 206.58.170.67 is the decimal form of the IP address. To convert binary to decimal, remember the following numbers:128, 64, 32, 16, 8, 4, 2, 1Each number represents the decimal value for a binary 1 in the corresponding position. For example, 10000000 is equal to 128, and 00010000 is equal to 16. To find the decimal form of a binary number, add up each decimal equivalent for each 1 bit in the address. For example, the equation for the number 11001110 is128 + 64 + 8 + 4 + 2 = 206. REFERENCES LabSim for Network Pro, Section 1.5.

Select the statement that best describes a broadcast storm. A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway. A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer. A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity. A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. EXPLANATION A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. REFERENCES LabSim for Network Pro, Section 6.7.

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the second floor. What could cause this to happen? A strong EMI emitter near the cable run connected to that interface. Two hosts on the network with the same MAC address. Collisions between two or more network hosts. An incorrect subnet mask configured on the workstation.

A strong EMI emitter near the cable run connected to that interface. EXPLANATION CRC errors indicate that a frame has been corrupted in transit. The CRC counter displays the number of frames received by the switch that did not pass the FCS check. On a hub-based Ethernet network, these errors are usually caused by collisions. However, because a switch is being used in this scenario, collisions can't occur. Therefore, the most likely cause is EMI or cross-talk on the UTP cabling, which can corrupt frames transmitted on the wire and cause a CRC error. CRC errors are almost always Layer 1 errors. Duplicate MAC addresses would result in a Layer 2 error. Incorrect protocol or IP addressing configurations would result in Layer 3 errors. REFERENCES LabSim for Network Pro, Section 2.5.

Which of the following is a characteristic of static routing when compared to dynamic routing? Routers send packets for destination networks to the next hop router. All routes must be manually updated on the router. Routers use the hop count to identify the distance to a destination network. Routers can only use static routing when not connected to the internet.

All routes must be manually updated on the router. EXPLANATION Static routing requires that entries in the routing table are configured manually. Network entries remain in the routing table until manually removed. When changes to the network occur, static entries must be added or removed. The next hop router is used with most routes to identify the next router in the path to the destination, regardless of whether the route is a static or dynamically-learned route. The hop count can be used by static or dynamic routes, depending on the routing protocol used. Static routing can be used for private and public networks whether they are connected to the internet or not. REFERENCES LabSim for Network Pro, Section 7.1.

Which type of polish grade uses green-colored connectors to help you keep from using the wrong connector type? Super Physical Contact (SPC) Physical Contact (PC) Ultra Physical Contact (UPC) Angled Physical Contact (APC)

Angled Physical Contact (APC) EXPLANATION Angled Physical Contact (APC) connecters are colored green to differentiate them from non-APC connectors. Physical Contact (PC), Super Physical Contact (SPC), and Ultra Physical Contact (UPC) connectors do not use any specific coloring designations. REFERENCES LabSim for Network Pro, Section 2.5.

You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable? Physical Contact polish Flat Physical Contact polish Ultra Physical Contact polish Angled Physical Contact polish

Angled Physical Contact polish EXPLANATION A slight slant to the fiber ferrule indicates an Angled Physical Contact (APC) polish. Using a non-angled connector will cause excessive insertion loss. A Physical Contact (PC) polish is polished with a slight curvature. An Ultra Physical Contact (UPC) polish uses a higher grade polish and is slightly more curved than a PC polish. A Flat Physical Contact connector has little to no curvature and suffers from the most insertion loss. REFERENCES LabSim for Network Pro, Section 2.5.

Match the networking function or device on the left with its associated OSI model layer on the right. Drag Session ID number ASCII Port numbers Router Modem HTTP Switch Drop Application Presentation Session Transport Network Data Link Physical

Application HTTP Presentation ASCII Session Session ID number Transport Port Numbers Network Router Data Link Switch Physical Modem

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, which switch will become the root bridge? A B C D

B EXPLANATION The switch with the lowest bridge ID becomes the root bridge. The bridge ID is composed of two parts, a bridge priority number and the MAC address assigned to the switch. The default priority number for all switches is 32,768. This means that for unconfigured switches, the switch with the lowest MAC address becomes the root bridge. In this example, bridge B has the lowest MAC address. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions? RIP BGP IS-IS OSPF EIGRP

BGP EXPLANATION BGP is an advanced distance vector protocol (also called a path vector protocol) that uses paths, rules, and policies to make routing decisions instead of a metric. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? OSPF IS-IS BGP RIP EIGRP

BGP EXPLANATION BGP is the protocol used on the internet. ISPs use BGP to identify routes between ASs. Very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connections to the internet through different ISPs. RIP is used on small private networks, while OSPF and EIGRP are used on larger private networks. IS-IS is used on very large private networks and within the internet service provider (ISP) network. REFERENCES LabSim for Network Pro, Section 7.2.

You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter? F-Type ST BNC RJ11

BNC EXPLANATION A 10Base2 Ethernet network (also called a Thinnet) is an older type of network that uses coaxial cables with BNC connectors for communication. F-type connectors are used for cable and satellite TV connections as well as broadband cable connections. RJ11 connectors are typically used for dial-up and DSL connections. ST connectors are used with fiber optic cables. REFERENCES LabSim for Network Pro, Section 2.2.

A switch running STP is classified as a backup bridge. What state is it in? Blocking Forwarding Learning Disabled Listening

Blocking EXPLANATION A backup bridge is in the blocking state. It receives packets addressed specifically to it and packets addressed to all bridges. It does not forward packets or build its database. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following topologies connects all devices to a trunk cable? Star Bus Ring Tree

Bus EXPLANATION The bus topology connects all devices to a trunk cable. REFERENCES LabSim for Network Pro, Section 1.2.

Which of the following geographic network types is made up of an interconnection of LANs? Wireless Local Area Network (WLAN) Wide Area Network (WAN) Campus Area Network (CAN) Metropolitan Area Network (MAN)

Campus Area Network (CAN)

Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated? Cat 5e Cat 5 Cat 6 Cat 3

Cat 6 EXPLANATION Cat 6 cables include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly. REFERENCES LabSim for Network Pro, Section 2.1.

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network? Multimeter Cable tester Certifier Toner probe TDR

Certifier EXPLANATION A cable certifier is a multi-function tool that verifies or validates that a cable or an installation meets the requirements for a specific architecture implementation. For example, you would use a certifier to verify that a specific drop cable meets the specifications for 1000BaseT networking. A cable tester verifies that the cable can carry a signal from one end to the other and that all wires are in their correct positions. A toner probe is two devices used to trace the end of a wire from a known endpoint into the termination point in the wiring closet. A time domain reflector (TDR) measures the length of a cable or to identify the location of a fault in the cable. A multimeter measures the electrical properties of a device, including voltage, amps, and resistance. REFERENCES LabSim for Network Pro, Section 2.5.

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? Client-server Intranet Extranet Peer-to-peer

Client-Server

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B? Computer A appends a VLAN ID to the frame. It travels from switch to switch and arrives at Computer B where it removes the VLAN ID. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The VLAN ID remains on the frame through the second switch up to Computer B. Computer A sends a normal frame. The first switch forwards the frame to the second switch, where the VLAN ID is appended to the frame and forwarded to Computer B.

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B EXPLANATION VLAN IDs are understood only by switches and are used by switches for inter-switch traffic. The first switch appends the VLAN ID, and the second switch removes it. REFERENCES LabSim for Network Pro, Section 6.5.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge? Remove link cable 6 from the configuration. Remove link cable 1 from the configuration. Configure a priority number of 4096 for switch C. Remove link cables 1 and 6 from the configuration. Configure a priority number of 61440 for switch C.

Configure a priority number of 4096 for switch C. EXPLANATION To force a specific switch to become the root bridge, configure a priority number lower than the default (32768). The switch with the lowest bridge ID becomes the root bridge. The bridge ID is composed of two parts: a bridge priority number and the MAC address assigned to the switch. When the default priority is used for all switches, the switch with the lowest MAC address becomes the root bridge. REFERENCES LabSim for Network Pro, Section 6.6.

You have three switches configured as shown in the Exhibit. How can you guarantee that switch C becomes the root bridge? Configure Fa0/1 and Fa0/2 on switch C with a lower cost value. Configure switch C with a lower priority value. Configure Fa0/1 and Fa0/2 on switch C with a higher port priority. Configure switch C with a higher priority value. Configure Fa0/1 and Fa0/2 on switch C with a higher cost value. Configure Fa0/1 and Fa0/2 on switch C with a lower port priority.

Configure switch C with a lower priority value. EXPLANATION To guarantee that switch C becomes the root bridge, configure switch C with a lower priority value. The election of the root bridge is determined by the switch with the lowest bridge ID. The bridge ID is made of two parts: The priority value assigned to the switch. The MAC address. The switch with the lowest priority value automatically becomes the root bridge. If two or more switches have the same priority value, then the switch with the lowest MAC address becomes the root bridge. The link cost is used when determining the root port and the designated ports. The port priority is used only when there are two equal-cost paths back to the root bridge on the same switch. The port with the lowest priority is used. If two ports have the same priority, the port with the lowest port number is used. REFERENCES LabSim for Network Pro, Section 6.6.

What does the ip address dhcp command allow you to do? Send the DHCP server address to all connected devices. Specify the DHCP relay server for forwarding DHCP packets. Configure the switch to act as a DHCP server. Configure the switch to obtain an IP address from a DHCP server.

Configures the switch to obtain an IP address from a DHCP server EXPLANATION You can use the ip address dhcp command to configure a switch or router to get its IP address from a DHCP server. The DHCP server can be configured to deliver the default gateway and DNS server addresses to the Cisco device as well. A manually configured default gateway address overrides any address received from the DHCP server. REFERENCES LabSim for Network Pro, Section 6.2.

Which of the following tasks is associated with the Session layer? Host ID number assignment Connection establishment Transmission synchronization Acknowledgement coordination

Connection establishment EXPLANATION Connection establishment is controlled through Session layer protocols. REFERENCES LabSim for Network Pro, Section 1.3.

Which of the following are included as part of Data Link layer specifications? (Select two.) Composing electrical signals as they pass through the transmission medium. Identifying physical network devices. Controlling how messages are propagated through the network. Synchronizing individual bits as they are transmitted through the network.

Controlling how messages are propagated through the network. Identifying physical network devices. EXPLANATION The Data Link layer controls device identification on networks, as well as how messages travel through the network (the logical topology). The other functions listed here are performed by the Physical layer. REFERENCES LabSim for Network Pro, Section 1.3.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? Classful Link state VLSM Convergence Distance vector

Convergence EXPLANATION The term "convergence" is used to describe the condition when all routers have the same (or correct) routing information. Convergence requires some time, but once it is reached, it means that any router has learned about all other networks that are being advertised (or shared) on the network. Link-state and distance vector describe general methods that routers use to share routes with other routers. Classful describes a routing protocol that assumes the subnet mask based on the address class of the network. Variable length subnet masks (VLSM) lets you use custom subnet masks for subnetting or supernetting. REFERENCES LabSim for Network Pro, Section 7.2.

What is the basic purpose of the OSI Physical layer? Coordinates rules for managing network servers. Coordinates rules for routing packets. Coordinates rules for transmitting bits. Defines basic physical structures, such as disks.

Coordinates rules for transmitting bits. EXPLANATION The OSI Physical layer coordinates rules for transmitting bits. REFERENCES LabSim for Network Pro, Section 1.3.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task? Punch down tool Crimping tool Needle nose pliers Wire puller

Crimping tool. EXPLANATION You should use a crimping tool designed for RJ45 connectors to attach connectors to UTP cable. REFERENCES LabSim for Network Pro, Section 2.4.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change? Subnet mask IP address DNS server Default gateway

Default gateway EXPLANATION Check the default gateway setting on the computer. The default gateway value is used for sending packets to other subnets. If the value is incorrect, then the packets will not be sent to the correct router. In this scenario, the host can communicate with other hosts on the same subnet, meaning that the IP address and subnet mask are correctly configured. The DNS server address is likely not the problem, as name resolution is not mentioned in the scenario. In addition, if name resolution were a problem, it could affect access to both local and remote hosts. REFERENCES LabSim for Network Pro, Section 7.4.

Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends, and the customer's responsibility begins? Punch down block Vertical cross connect Demarc IDF

Demarc. EXPLANATION When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack onto your premises. The demarcation point (demarc) is the line that marks the boundary between the telco equipment and the private network or telephone system. Typically, the LEC is responsible for all equipment on one side of the demarc, and the customer is responsible for all equipment on the other side of the demarc. A punch down block is a block used to connect individual copper wires together. While the demarc might terminate in a punch down block, punch down blocks are used within other locations at the customer site. An intermediate distribution frame (IDF) is a smaller wiring distribution point within a building. IDFs are typically located on each floor directly above the main distribution frame (MDF), although additional IDFs can be added on each floor as necessary. A vertical cross connect connects the IDF to the MDF on a different floor. REFERENCES LabSim for Network Pro, Section 2.4.

Match the EtherChannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all. Drag Port Aggregation Protocol (PAgP) Link Aggregation Control Protocol (LACP) Drop Desirable mode places the port in a negotiating state. Based on the 802.3ad standard. Passive mode places the port into a passive negotiating state. Auto mode places the port into a passive negotiating state. Active mode places the port in a negotiating state.

Desirable mode places the port in a negotiating state. - Port Aggregation Protocol (PAgP) Based on the 802.3ad standard. - Link Aggregation Control Protocol (LACP) Passive mode places the port into a passive negotiating state. - Link Aggregation Control Protocol (LACP) Auto mode places the port into a passive negotiating state. - Port Aggregation Protocol (PAgP) Active mode places the port in a negotiating state. - Link Aggregation Control Protocol (LACP) EXPLANATION Cisco switches can use the following protocols for EtherChannel configuration: Port Aggregation Protocol (PAgP) Port Aggregation Protocol prevents loops, limits packet loss due to misconfigured channels, and aids in network reliability. PAgP operates in the following modes: - Auto places the port into a passive negotiating state and forms an EtherChannel if the port receives PAgP packets. While in this mode, the port does not initiate the negotiation. - Desirable places the port in a negotiating state to form an EtherChannel by sending PAgP packets. A channel is formed with another port group in either the auto or desirable mode. Link Aggregation Control Protocol (LACP) Link Aggregation Control Protocol is based on the 802.3ad standard and has similar functions to PAgP. LACP is used when configuring EtherChannel between Cisco switches and non-Cisco switches that support 802.3ad. LACP operates in the following modes: - Passive places the port into a passive negotiating state and forms an EtherChannel if the port receives LACP packets. While in this mode, the port does not initiate the negotiation. - Active places the port in a negotiating state to form an EtherChannel by sending LACP packets. A channel is formed with another port group in either the active or passive mode. REFERENCES LabSim for Network Pro, Section 6.6

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.) Broadcast traffic is only transmitted on VLAN1. Devices on the same VLAN have the same subnet address. Devices on separate VLANs share the same subnet address. Broadcast traffic is transmitted only within a VLAN. Broadcast traffic is transmitted to all devices on all VLANs.

Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted only within a VLAN EXPLANATION VLANs allow computers to be grouped into a common broadcast domain regardless of their physical location on the network. Broadcast traffic is seen only by computers belonging to the same VLAN. Devices sharing a VLAN ID must also share the same subnet address so that traffic can be routed between VLANs. Broadcast traffic is only transmitted to devices belonging to the same VLAN as the device that sent the broadcast. Broadcast traffic is not forwarded to the other VLANs. REFERENCES LabSim for Network Pro, Section 6.4.

Which of the following best describes the concept of a VLAN? Devices connected through the internet that can communicate without using a network address. Devices connected by a transmission medium other than cable (such as microwave or radio transmissions). Devices on different networks that can receive multicast packets. Devices on the same network logically grouped as if they were on separate networks. Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network.

Devices on the same network logically grouped as if they were on separate networks. EXPLANATION A VLAN is created by identifying a subset of devices on the same network and logically identifying them as if they were on separate networks. Think of a VLAN as a subdivision of a LAN. REFERENCES LabSim for Network Pro, Section 6.4.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? Send the packet out both of its directly-connected networks as a broadcast frame. Hold the packet in cache until a matching route is learned or configured. Send the packet to both networks 192.168.3.0 and 192.168.4.0 and to the next hop router. Drop the packet.

Drop the packet. EXPLANATION If a packet does not match any route in a routing table, the router drops the packet. In this example, the router does not know about the destination network, and it is not configured with a default route. With a default route, the router will forward the packet to the next hop router specified by the default route. REFERENCES LabSim for Network Pro, Section 7.1.

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause? Incorrect VLAN Switching loop Broadcast storm Duplex mismatch

Duplex mismatch EXPLANATION A duplex mismatch occurs when two devices are using different duplex settings. In this case, one device will try to transmit using full-duplex, while the other will expect half-duplex communications. Symptoms of a duplex mismatch include very slow network communications. Ping tests might appear to complete correctly, but normal communications work well below the expected speeds, even for half-duplex communications. A switching loop occurs when there are multiple active paths between two switches. Switching loops lead to incorrect entries in a MAC address table, making a device appear to be connected to the wrong port, and causing unicast traffic to be circulated in a loop between switches. A broadcast storm is excessive broadcast traffic that renders normal network communications impossible. Broadcast storms can be caused by switching loops that cause broadcast traffic to be circulated endlessly between switches or Denial of Service (DoS) attacks. For both switching loops and broadcast storms, the problem would not be isolated to a single device, but the problem would exist for most devices. VLANs create logical groupings of computers based on switch port. Devices can only communicate with other devices that are members of the same VLAN. In this scenario, the problem is that network access is slow, not that devices cannot be accessed. REFERENCES LabSim for Network Pro, Section 6.7.

You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connections to internal hosts. What type of network address translation (NAT) should you implement? Shared Static Dynamic Restricted

Dynamic EXPLANATION Use dynamic NAT to share public addresses with multiple private hosts. Dynamic NAT allows private hosts to access the internet, but does not allow internet hosts to initiate contact with private hosts. REFERENCES LabSim for Network Pro, Section 7.3.

Which of the following routing protocols is classified as a hybrid routing protocol? IS-IS OSPF RIP EIGRP

EIGRP EXPLANATION EIGRP is a hybrid routing protocol developed by Cisco for routing within an AS. RIP is a distance vector protocol, while OSPF and IS-IS are link state protocols. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following protocols stores email on the mail server and allows users to access messages from various client devices without having to download the emails? NTP IMAP4 SMTP POP3

IMAP4 EXPLANATION IMAP4 allows a mail server to store messages users can access from various locations using various client devices. A POP3 server requires the user to download his or her email. SMTP allows a user to send email to a server. The NTP protocol synchronizes the clocks of all computers on a network. REFERENCES LabSim for Network Pro, Section 1.4.

Which of the following best describes OSPF? OSPF is a classless link state routing protocol. OSPF is a classful link state routing protocol. OSPF is a classless distance vector routing protocol. OSPF is a classful distance vector routing protocol.

OSPF is a classless link state routing protocol. EXPLANATION OSPF is a classless link state routing protocol. RIP version 1 and IGRP are both classful distance vector routing protocols. EIGRP is a hybrid protocol that supports classless addressing. REFERENCES LabSim for Network Pro, Section 7.2.

You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience? Echo NEXT FEXT EMI Attenuation

Echo EXPLANATION An impedance mismatch (manifested by echo) occurs when you connect cables and devices that have a different impedance (resistance) rating. Impedance is mostly a factor in coaxial cables used for networking. Be sure to choose cable with the correct rating (50 or 75 ohm) based on the network type, and do not mix cables with different ratings. RG6 cables have a rating of 75 ohms, while RG-8 cables have a rating of 50 ohms. Attenuation is the loss of signal strength from one end of a cable to the other. Electromagnetic interference (EMI) is interference that comes from an external source. Common sources of EMI include nearby generators, motors (such as elevator motors), radio transmitters, welders, transformers, and fluorescent lighting. Near-end crosstalk (NEXT) is crosstalk measured on the same end as the transmitter. For example, when a signal is sent on one wire, near-end crosstalk measures the interference on another wire at the same connector near the source of the original signal. Far-end crosstalk (FEXT) is crosstalk measured on the opposite end from the transmitter. For example, when a signal is sent on one wire, far-end crosstalk measures the interference on another wire at the opposite end from the source signal. REFERENCES LabSim for Network Pro, Section 2.5.

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm? Configure each switch with a single trunk port Enable spanning tree on the switches Manually set the speed for each switch port Disable auto-duplex detection

Enable spanning tree on the switches EXPLANATION A broadcast storm is excessive broadcast traffic that renders normal network communications impossible. Broadcast storms can be caused by switching loops that cause broadcast traffic to be circulated endlessly between switches or denial of service (DoS) attacks. To reduce broadcast storms: - Run the spanning tree protocol to prevent switching loops. - Implement switches with built-in broadcast storm detection, which limits the bandwidth that broadcast traffic can use. - Use VLANs to create separate broadcast domains on switches. REFERENCES LabSim for Network Pro, Section 6.7.

In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply.) Data translation Enabling communication between network clients and services Conversation identification Integrating network functionality into the host operating system

Enabling communication between network clients and services Integrating network functionality into the host operating system EXPLANATION The Application layer enables network services and integrates network functionality into the host operating system. Applications actually run above the OSI Application layer. Conversation identification is accomplished at the Session layer through connection or transaction ID numbers. Data translation is performed at the Presentation layer. REFERENCES LabSim for Network Pro, Section 1.3.

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.) Transmit data frames Encrypt and compress data Provide network services Specify data format (such as file formats) Maintain separate client connections Handle general network access, flow control, and error recovery

Encrypt and compress data Specify data format (such as file formats) EXPLANATION The Presentation layer encrypts data, changes and converts character sets, and compresses data. File formats (such as .jpg, .wmv, and .wav) are part of the Presentation layer. The Application layer provides network services. The Session layer maintains separate client connections through session IDs and maintains those sessions. Flow control and error detection are provided at both the Transport layer and the Data Link layer. Frame transmission occurs at the Physical layer. REFERENCES LabSim for Network Pro, Section 1.3.

You need to disable the FastEthernet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all of the commands are required. Drag conf t ifdown int fa0/1 shutdown speed auto show ip interface brief int disable int fa0/0 Drop Enter global configuration mode. Enter interface configuration mode. Disable the interface. Verify that the interface is disabled.

Enter global configuration mode conf t Enter interface configuration mode int fa0/0 Disable the interface shutdown Verify the interface is disabled show ip interface brief EXPLANATION To complete the requirements of this scenario, you need to use the following commands: - Enter global configuration mode: conf t - Enter interface configuration mode: int fa0/0 - Disable the interface: shutdown - Verify the interface status: show ip interface brief REFERENCES LabSim for Network Pro, Section 6.3.

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all commands are required. Drag conf t ifup int fa0/0 shutdown no shut show interface status int enable int fa0/2 Drop Enter global configuration mode. Enter interface configuration mode. Enable the interface. Verify that the interface is enabled.

Enter global configuration mode conf t Enter interface configuration mode int fa0/0 Enable the interface no shut Verify the interface is disabled show interface status EXPLANATION To complete the requirements of this scenario, you need to use the following commands: - Enter global configuration mode: conf t - Enter interface configuration mode: int fa0/0 - Enable the interface: no shut - Verify the interface status: show interface status REFERENCES LabSim for Network Pro, Section 6.3.

You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all of the commands are required. Drag conf t int fa0/0 interface status int fa0/1 duplex auto speed auto duplex mixed speed full show ip interface brief Drop Enter global configuration mode. Enter interface configuration mode. Set the speed of the interface. Set the duplex setting for the interface.

Enter global configuration mode conf t Enter interface configuration mode int fa0/1 Set speed of the interface speed auto Set the duplex setting for the interface duplex auto EXPLANATION To complete the requirements of this scenario, you need to use the following commands: - Enter global configuration mode: conf t - Enter interface configuration mode: int fa0/1 - Configure the interface to automatically detect the line speed: speed auto - Configure the interface to automatically detect duplex settings: duplex auto REFERENCES LabSim for Network Pro, Section 6.3.

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use? BNC ST RJ45 RJ11 F-type SC

F-type EXPLANATION Use an F-type connector for broadband cable connections that use coaxial cable. Use a BNC connector for 10Base2 Ethernet networks. Use an RJ11 connector for modem connections to a phone line. Use an RJ45 connector for an Ethernet network that uses twisted pair cable. Use ST and SC connectors for fiber optic cables. REFERENCES LabSim for Network Pro, Section 2.2.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? Send the packet out both of its directly connected networks as a broadcast frame. Drop the packet. Send the packet out both of its directly connected networks to the next hop router. Forward the packet to the next hop router specified by the route to network 0.0.0.0.

Forward the packet to the next hop router specified by the route to network 0.0.0.0 EXPLANATION A route of 0.0.0.0 with a mask of 0.0.0.0 identifies a default route. The default route is used when no other route is a better match. Packets that match no other networks are sent to the next hop router specified by the default route. REFERENCES LabSim for Network Pro, Section 7.1.

Which protocol is used on the World Wide Web to transmit web pages to web browsers? SMTP HTML HTTP NNTP

HTTP

Which protocol is used to securely browse a website? ARP HTTPS UDP SSH SIP

HTTPS EXPLANATION HTTPS is a secure form of HTTP that uses SSL to encrypt data before it is transmitted. HTTP is used by web browsers and web servers to exchange files (such as web pages) through the World Wide Web and intranets. SSH is used for secure remote management. UDP is a data transport control protocol that does not include error correction or detection mechanisms. SIP is a protocol used by Voice over IP (VoIP) to set up and terminate phone calls. ARP is used to find the IP address of a device with a known MAC address. REFERENCES LabSim for Network Pro, Section 1.4.

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? DHCP ARP IP ICMP IGMP TCP

ICMP EXPLANATION The internet control message protocol (ICMP) allows hosts to exchange messages to indicate a packet's status as it travels through the network. REFERENCES LabSim for Network Pro, Section 1.4.

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? IGP Dynamic Link state Static Distance vector BGP

IGP EXPLANATION You would use an interior gateway protocol (IGP) on routers within your network. Routing protocols can be classified based on whether they are routing traffic within or between autonomous systems. An interior gateway protocol (IGP) routes traffic within an AS; an exterior gateway protocol (EGP) routes traffic between ASs. Link state and distance vector describe how routing protocols share routing information. The network size might determine which protocol is best for your network. Static routing uses manually-defined routes in the routing table, while dynamic routing uses a protocol so routers learn and share routes with other routers. You can use static routing, dynamic routing, or both on a private network. REFERENCES LabSim for Network Pro, Section 7.2.

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose? SMTP IMAP4 MFTP POP3 POP4

IMAP4 EXPLANATION The internet message access protocol version 4 (IMAP) is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system. POP3 is an email retrieval protocol that downloads and then deletes messages from a mail server. POP3 is well suited for reading email offline, but you must go online when you want to receive and send new messages. Once your new messages have been downloaded to your computer, you can log off to read them. This option is often used when email is received over a dial-up connection. REFERENCES LabSim for Network Pro, Section 1.4.

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? If the network has over 15 areas and uses IPv6. If the network is connected to the Internet using public addressing. If the network is connected to the Internet using multiple ISPs. If the network has over 15 hops.

If the network is connected to the Internet using multiple ISPs. EXPLANATION Very large networks can use BGP internally, but typically only share routes on the Internet if the AS has two (or more) connections to the Internet through different ISPs. If your network has over 15 hops, use a routing protocol other than RIP. Use OSPF or IS-IS to divide your network into areas. Private networks that use public IP addresses do not need to share routes with Internet routers; it is typically the responsibility of the ISP to configure routes into the private network, even when public addressing is being used. A single route out of the private network is all that is required if the network has a single connection to the Internet. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following are advantages of using fiber optic cabling for a network? (Select two.) Lower installation cost Greater cable distances without a repeater No special training or equipment is required Immunity to electromagnetic interference

Immunity to electromagnetic interference Greater cable distances without a repeater EXPLANATION Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to electromagnetic interference. However, it is more costly, and specialized training and equipment is required for installation. REFERENCES LabSim for Network Pro, Section 2.3.

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all. Drag In-band management Out-of-band management Drop Competes with normal network traffic for bandwidth. Uses a dedicated communication channel. Must be encrypted to protect communications from sniffing. Does not compete with normal network traffic for bandwidth. Affected by network outages.

In-Band Management -Competes with normal network traffic for bandwidth. -Must be encrypted to protect communications from sniffing. -Affected by network outages. Out-of-band management -Uses a dedicated communication channel. -Does not compete with normal network traffic for bandwidth. EXPLANATION Switch management tasks can be performed using the management utilities through a network connection. Such management is called in-band management because it uses a normal network connection with the switch for performing these tasks. For example, tools such as Telnet or SSH provide in-band management. Using the same network connection for both data and management has several drawbacks: You must compete with normal network traffic for bandwidth. The network traffic created by the management utilities must be protected from sniffing to ensure that hackers cannot capture sensitive configuration information. If the network connection is unavailable or if the switch is unresponsive to network communications, management tasks cannot be performed. Out-of-band management, on the other hand, overcomes these problems using dedicated communication channels that separate server management traffic from normal network traffic. With network switches (and routers), you can use console redirection to redirect console output to a built-in serial or USB console port. REFERENCES LabSim for Network Pro, Section 6.1.

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? NNTP SAP SNMP NTP SMTP

NTP EXPLANATION The network time protocol (NTP) lets you keep clocks synchronized. REFERENCES LabSim for Network Pro, Section 1.4.

You manage a local area network with several switches. A new employee has started today, so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and see that the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem? Half-duplex setting on the switch and workstation Switching loop Incorrect default gateway setting Incorrect VLAN assignment

Incorrect VLAN assignment EXPLANATION The most likely cause is that the switch port is a member of a VLAN that is different from the VLAN for the DHCP server and other devices. It is possible that unused ports on the switch were assigned to a VLAN that is different from the VLAN used by other devices. The duplex setting would probably not prevent traffic between the workstation and the switch; it would simply mean that both devices would perform collision detection. A problem might occur if one device were manually configured for full-duplex, and the other were configured for half-duplex. A switching loop occurs when there are multiple active paths between two switches. Switching loops lead to incorrect entries in a MAC address table, making a device appear to be connected to the wrong port and causing unicast traffic being circulated in a loop between switches. Switching loops would typically affect multiple devices, not just one. The default gateway setting affects whether the device can communicate with hosts on different subnets, but this value is typically received from the DHCP server. REFERENCES LabSim for Network Pro, Section 6.7.

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) Increased number of collision domains Redundant paths between two hosts Increased security Allowing broadcast traffic between subnets Increased number of broadcast domain

Increased Security Increased Number of broadcast domains EXPLANATION Create VLANs to increase the number of broadcast domains and implement security. Each VLAN is in its own broadcast domain. Broadcast traffic within the VLAN goes only to the members of the VLAN. Members of one VLAN can only communicate with members in the same VLAN through the switch. A router or a Layer 3 switch is required to enable inter-VLAN communication. Using switches increases the number of collision domains because each switch port is its own collision domain. Using VLANs does not offer this additional advantage. Spanning tree lets you have loop-free redundant paths through a switched network. Broadcast traffic does not travel between routers. REFERENCES LabSim for Network Pro, Section 6.4.

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? IDF Horizontal cross connect Demarc extension MDF Vertical cross connect

Intermediate distribution frame IDF. EXPLANATION An intermediate distribution frame (IDF) is a wiring distribution point within a building that is smaller than the MDF. IDFs are typically located on each floor directly above the MDF, but you can place additional IDFs on each floor as necessary. The main distribution frame (MDF) is the main wiring point for a building. The MDF is typically located on the bottom floor or basement. The LEC typically installs the demarc to the MDF. A vertical cross connect connects the MDF on the main floor to IDFs on upper floors. Cabling runs vertically (up and down) between the MDF and the IDFs. A horizontal cross connect connects IDFs on the same floor. Cabling runs horizontally (sideways) between the IDFs. A demarc extension extends the demarcation point from its original location to another location within the building. REFERENCES LabSim for Network Pro, Section 2.4.

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It places the source address and segment in its database, but does not forward the message. It does not record address or segment information. It does not forward the message. It places the source address and segment in its database and forwards the message. It does not record address or segment information. However, the message is forwarded.

It does not record address or segment information. It does not forward the message. EXPLANATION A switch in listening state receives packets, but does not build its database or forward them. Switches in the listening state are in the process of defining their role on the network. REFERENCES LabSim for Network Pro, Section 6.6.

A switch is running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It does not record address or segment information. It does not forward the message. It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. It places the source address and segment in its database and forwards the message. It does not record address or segment information. However, the message is forwarded.

It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. EXPLANATION A switch in the learning state will build its database through the information it receives from incoming messages. However, it does not forward messages. Remember, devices forward messages only if they are in the forwarding state. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following are characteristics of coaxial network cable? (Select three.) It uses two concentric metallic conductors. The conductors within the cable are twisted around each other to eliminate cross-talk. The ends of the cable must be terminated. It uses RJ45 connectors. It uses two concentric conductors that are made from plastic or glass and conduct light signals. It is composed of four pairs of 22-gauge copper wire. It has a conductor made from copper in the center of the cable

It uses two concentric metallic conductors. The ends of the cable must be terminated. It has a conductor made from copper in the center of the cable. EXPLANATION Coaxial cable is composed of a central copper conductor surrounded by an insulator, which is then surrounded by a second metallic mesh conductor. The name coaxial is derived from the fact that both of these conductors share a common axis. Both ends of a coaxial cable must be terminated. REFERENCES LabSim for Network Pro, Section 2.2

Which recommendation should you follow while using 110 blocks for connecting Cat 5 and higher data cables? Use C-5 connectors. Connect wires using the T568B standard. Connect wires using the T568A standard. Keep wire pairs twisted up to within one-half of an inch of the connector.

Keep wire pairs twisted up to within one-half of an inch of the connector. EXPLANATION While using Cat5 (or higher) wiring, preserve the twists in each wire pair to within one-half of an inch of the connecting block. Use C-4 connectors to connect four pairs of wires. When connecting data wires on a 110 block, you typically connect wires in the following order: - White wire with a blue stripe followed by the solid blue wire. - White wire with an orange stripe followed by the solid orange wire. - White wire with a green stripe followed by the solid green wire. - White wire with a brown stripe followed by the solid brown wire. T568A and T568B are used to connect wires within an RJ45 connector when making drop cables. REFERENCES LabSim for Network Pro, Section 2.4.

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.) BNC MTRJ SC LC

LC MTRJ EXPLANATION LC and MTRJ connectors have both fiber optic cables in a single connector. ST and SC connectors hold a single strand of fiber optic cable. A cable using either connector has two connectors on each end. A BNC connector is used with coaxial cable. REFERENCES LabSim for Network Pro, Section 2.3.

The Data Link Layer of the OSI model is comprised of two sublayers. What are they? (Select two.) LLC DLC SAN LAT MAC

LLC MAC EXPLANATION The Data Link layer is split into the following sublayers: - The Logical Link Control (LLC) Sublayer, which provides the operating system link to the device driver. - The Media Access Control (MAC) Sublayer, which translates generic network requests into device-specific terms. REFERENCES LabSim for Network Pro, Section 1.3.

Which of the following are functions of the MAC sublayer? (Select two.) Creating routing tables based on MAC addresses Mapping hardware addresses to link-layer addresses Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network

Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network EXPLANATION The MAC sublayer defines a unique MAC or data-link address for each device on the network. This address is usually assigned by the manufacturer. The MAC sublayer also provides devices with access to the network media. REFERENCES LabSim for Network Pro, Section 1.3.

Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in? Blocking Learning Disabled Listening Forwarding

Listening EXPLANATION Switches that are exchanging STP configuration information to define their roles are in the listening state. After listening, designated bridges progress to learning and then forwarding. Backup bridges return to blocking. REFERENCES LabSim for Network Pro, Section 6.6.

The UDP transport protocol provides which of the following features? (Select all that apply.) Sequence numbers and acknowledgements Low overhead Guaranteed delivery Connectionless datagram services

Low overhead connectionless datagram services EXPLANATION UDP is a connectionless protocol used by applications that need low overhead and do not require guaranteed delivery. REFERENCES LabSim for Network Pro, Section 1.4.

Which of the following terms identifies the wiring closet in the basement or a ground floor that typically includes the demarcation point? Smart jack Horizontal cross connect MDF IDF 110 block

Main Distribution Frame (MDF). EXPLANATION The main distribution frame (MDF) is the main wiring point for a building. The MDF is typically located on the bottom floor or basement. The LEC typically installs the demarc to the MDF. An intermediate distribution frame (IDF) is a smaller wiring distribution point within a building. IDFs are typically located on each floor directly above the MDF, but you can place additional IDFs on each floor as necessary. A horizontal cross connect joins wiring closets on the same floor. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. Use 66 and 110 blocks to connect individual wires within a wiring closet. REFERENCES LabSim for Network Pro, Section 2.4.

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all. Drag Unmanaged switch Managed switch Drop Commonly sold at retail stores. Provides port security features. Supports VLANs. Provides very few configuration options. Can be configured over a network connection. Can be configured over a dedicated communication channel.

Managed Switch -Provide port security features. -Support VLANs. -Can be configured over a network connection. -Can be configured over a dedicated communication channel. Unmanaged switch -Commonly sold at retail stores. -Provide very few configuration options EXPLANATION The low-end switches available from many retail stores cannot be configured. These are called unmanaged switches. To implement an unmanaged switch, you simply plug it in to a power outlet and connect your network devices with UTP cables. While unmanaged switches are convenient and easy to implement, they lack many of the advanced management and security features available on managed switches. For example, managed switches provide port security and support VLANs. REFERENCES LabSim for Network Pro, Section 6.1.

You want to implement a fault tolerant topology as you connect routers on your wide area network. Which of the following topologies meets your needs? Mesh Ring Bus Star

Mesh EXPLANATION A mesh topology has multiple connections at each node, increasing connectivity fault tolerance. None of the other topologies have native fault tolerance built in. REFERENCES LabSim for Network Pro, Section 1.2.

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? Star Bus Ring Mesh

Mesh EXPLANATION In a mesh topology, each network device is interconnected to all other network nodes. This creates multiple data paths. If a link fails, the data has an alternate route to its destination. The star topology connects network devices to the network with a single patch cable. A patch cable failure makes the connected device unavailable. The bus topology has a single point of failure. If there is a break in the network media, the network becomes unavailable. A single break in a physical ring topology disables the network. REFERENCES LabSim for Network Pro, Section 1.2.

You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? Ring Tree Star Mesh Bus

Mesh EXPLANATION This type of network uses a physical mesh topology. A mesh topology has two key characteristics: - There is no central connecting point. - Any host can communicate directly with any other host on the network. A mesh network is usually impractical on a wired network. Each host would require a separate dedicated network interface and cable connected to each host on the network. But you can implement a mesh topology with relative ease on a wireless network because wires aren't an issue. REFERENCES LabSim for Network Pro, Section 1.2.

You have a network that uses a logical bus topology. How do messages travel through the network? Messages are sent directly to the correct destination device Messages are sent to a central device that forwards them to the destination devices. Messages travel from one device to the next until they reach the destination device. Messages are broadcast to all devices connected to the network.

Messages are broadcast to all devices connected to the network EXPLANATION Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star, which is typically a hub, receives the message and forwards it on to all other devices. REFERENCES LabSim for Network Pro, Section 1.2.

You have a network that uses a logical ring topology. How do messages travel through the network Messages are sent to all devices connected to the network. Messages travel from one device to the next until they reach the destination device. Messages are sent directly to the destination device only. Messages are sent to a central device that forwards them to the destination devices.

Messages travel from one device to the next till they reach the destination device EXPLANATION In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network. REFERENCES LabSim for Network Pro, Section 1.2.

When multiple routes to a destination exist, what is used to select the best possible route? Distance vector Exterior gateway protocol Autonomous system number Metric

Metric EXPLANATION Routers use metric values to identify the distance, or cost, to a destination network. The metric is used by the routing protocol to identify and select the best route to the destination when multiple routes exist. The metric can be calculated based on hop count, bandwidth, or link cost. The Exterior Gateway Protocol is a routing protocol that routes traffic between autonomous systems. The distance vector is a routing protocol that defines how routers update and share routing information. An autonomous system number is a unique number used to identify an autonomous system. REFERENCES LabSim for Network Pro, Section 7.1.

Which of the following geographic network types are typically managed by a city as a public utility? Metropolitan area network (MAN) Local area network (LAN) Wide area network (WAN) Personal area network (PAN)

Metropolitan area network (MAN)

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the internet. You investigate the problem and find that she can access all hosts on the private network, including subnets, but no hosts on the internet. Which of the following is likely the cause of the problem? Incorrect default gateway setting on the computer Missing default route on a router Duplex mismatch between a switch and a router Switching loop on the user's subnet

Missing default route on a router EXPLANATION If you can access all private subnets but not the internet, troubleshoot the connection to the internet. For example, verify that routers have a default route that would apply to internet traffic and make sure the internet link is up and working. The default gateway on the workstation is configured properly because routing to other subnets works correctly, meaning that the workstation is able to send and receive packets from remote networks. A duplex mismatch would cause slow communications, but some access might still be possible. A switching loop would affect devices within the subnet, not on other subnets. REFERENCES LabSim for Network Pro, Section 7.4.

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet. However, the computer does access other computers on other subnets as well as the internet. Which of the following is most likely the cause of the problem? Incorrect default gateway setting on the computer Switching loop on the user's subnet Incorrect VLAN membership of the accounting server Missing route on the default gateway router

Missing route on the default gateway router EXPLANATION The most likely cause of the problem is a missing route in one of the routers on your internal network (or that the router connecting that subnet to the network is down). Because the problem applies to all hosts in the remote subnet, you can suspect some type of misconfiguration of the router. The default gateway on the workstation is configured properly because routing to other subnets and the internet works correctly, meaning that the workstation is able to send and receive packets from remote networks. A switching loop would affect devices within the subnet, not on other subnets. Incorrect VLAN membership for the server would affect communications with the server only, not all devices on the subnet (unless all switch ports on the remote subnet are assigned to the same VLAN). REFERENCES LabSim for Network Pro, Section 7.4.

Which of the following functions are performed at the Physical layer of the OSI model? Provisioning environments where you can run network applications Conversation identification Data translation Enabling network services Moving data across network cables

Moving data across network cables EXPLANATION The Physical layer is concerned with how to transmit data and how to connect network hosts. REFERENCES LabSim for Network Pro, Section 1.3.

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use? Multimeter Butt set Voltage event recorder Toner probe Certifier

Multimeter EXPLANATION A multimeter is a device that tests various electrical properties. For example, most multimeters can measure: - AC and DC voltage - Current (amps) - Resistance (ohms) - Capacitance - Frequency A voltage event recorder tracks voltage conditions on a power line. Basic recorders keep track of the occurrence of under or over voltage conditions, while more advanced devices track conditions over time and create a graph, saving data from a program running on a computer. A butt set (also called a lineman's handset) is a device used to test analog telephone installations. The butt set includes an earpiece, mouthpiece, dialing interface, and various connectors. A toner probe is two devices used to trace the end of a wire from a known endpoint into the termination point in the wiring closet. A cable certifier is a multi-function tool that verifies or validates that a cable or an installation meets the requirements for a specific architecture implementation. REFERENCES LabSim for Network Pro, Section 2.5.

You are configuring a switch so that you can manage it using PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? Yes, the switch can now be accessed by PuTTY using the IP address 192.168.1.10. No, the ip default-gateway command needs to be set. No, the switch needs to obtain an IP address from the DHCP server using the ip address dhcp command. No, the no shutdowncommand needs to be entered.

No, the no shutdown command needs to be entered EXPLANATION By default, the Vlan1 interface is set to administratively down, preventing remote access. Use the following commands to configure the switch IP address and allow management: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 switch(config-if)#no shutdown Because the switch is being accessed from the same network segment, the ip default-gateway command doesn't need to be used. The ip address dhcp command only allows the switch to obtain an IP address using DHCP. REFERENCES LabSim for Network Pro, Section 6.2.

You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon investigation, it appears very similar to Cat 5e wiring. Should you use Cat 3 cabling as a substitute for Cat 5e cabling to finish the project? Yes. You can use Cat 3 cabling as a substitute for Cat 5e cabling, as they are electrically identical. No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates. No. Cat 5e cabling uses a thicker copper wire than Cat 3 cable, enabling higher data transmission rates. No. The sheath surrounding Cat 5e cable is much thicker than the Cat 3 sheath, creating an extra layer of shielding that reduces cross-talk and supports higher data rates. No, Category 3 cabling doesn't support RJ-45 connectors.

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates. EXPLANATION While Cat 3 and Cat 5e cabling may appear similar physically, they are electrically different. Cat 5e cabling is twisted much tighter than Cat 3 cabling. This reduces cross talk and enables Cat 5e wiring to support much faster data transmission rates. REFERENCES LabSim for Network Pro, Section 2.1.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have their own network segments separated by routers. Funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multi-mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1-meter multi-mode patch cables from Amazon. But when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work? No. You should purchase patch cables that use MTRJ connectors. Yes. All of the requirements for implementing a fiber optic network have been met. No. You should use a specialized backbone fiber optic switch to create a backbone network for routers. No. You should use single-mode patch cables to connect a GBIC module to a switch.

No. You should purchase patch cables that use MTRJ connectors. EXPLANATION For light to pass through a fiber optic connector, the fiber within the jack must line up perfectly with the fiber in the connector. Using the wrong connector will result in misaligned fibers. This will disrupt the light signal, even if you are able to successfully lock the connector into the jack. In this scenario, you should purchase patch cables that use MT-RJ connectors. REFERENCES LabSim for Network Pro, Section 2.5.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single-mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1-meter multimode patch cables. Will this implementation work? Yes,. All of the requirements for implementing a fiber optic network have been met. No. You should purchase fiber optic equipment that use FC connectors. No. You should not use standard fiber optic switches to create a backbone network for routers. No. You shouldn't use multi-mode patch cables with single-mode GBIC modules.

No. You shouldn't use multi-mode patch cables with single-mode GBIC modules. EXPLANATION Some GBIC/SFP modules use multi-mode fiber, while others use single-mode. You must use the correct type of fiber optic cable and connector required by the specific adapter. You cannot mix and match different types of cable. In this scenario, connecting a single-mode GBIC to multi-mode fiber will introduce a catastrophic signal loss of up to 99%. REFERENCES LabSim for Network Pro, Section 2.5.

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? EIGRP RIP OSPF IS-IS

OSPF EXPLANATION OSPF divides a large network into areas. Each autonomous system requires an area 0 that identifies the network backbone. All areas are connected to area 0, either directly or indirectly through another area. Routes between areas must pass through area 0. IS-IS uses areas, but does not have an area 0 requirement. Neither RIP nor EIGRP use areas. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following routing protocols uses relative link cost as the metric? BGP RIP OSPF EIGRP

OSPF EXPLANATION OSPF is a link-state routing protocol used for routing within an AS. OSPF uses relative link cost for the metric. REFERENCES LabSim for Network Pro, Section 7.2.

What are the main differences between the OSPF and IS-IS routing protocols? OSPF is a classful protocol, while IS-IS is a classless protocol. OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. OSPF is a link state protocol, while IS-IS is not. OSPF requires an area 0, while IS-IS does not.

OSPF requires an area 0, while IS-IS does not. EXPLANATION Like OSPF, IS-IS uses areas when designing the network. However, IS-IS does not require an area 0 like OSPF does. Because IS-IS was originally designed for non-IP protocols, it can more easily support IPv6 routing. Both OSPF and IS-IS have the following characteristics: - Both are link state protocols. - Both are classless protocols, supporting CIDR and VLSM. - Both are Interior Gateway Protocols (IGPs) that are used within an AS. REFERENCES LabSim for Network Pro, Section 7.2.

You are working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls. Which tool should you use? Toner probe Smartjack Multimeter OTDR

OTDR EXPLANATION An optical time domain reflector (OTDR) sends light pulses on a cable to discover information about the cable. The results of this test can be used to: - Estimate the length of a wire. - Measure the cable impedance. - Identify locations of splices and connectors on the wire. - Identify shorts and open circuits, and the location of the fault. A TDR performs the same tests on copper cables. Use a toner probe to locate the end of a wire from a wall jack to the punch down block. Use a multimeter to measure the electrical properties of a device, such as voltage, amps, and resistance. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. REFERENCES LabSim for Network Pro, Section 2.5.

You work for a large multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: - Verified that the server is up and running. - Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -f -l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean? The destination host is down. Communications are functioning normally between your workstation and the target server. One of the intermediate routers is offline. Collisions are occurring on the network. One of the intermediate routers is an MTU black hole.

One of the intermediate routers is an MTU black hole. EXPLANATION A black hole router will drop packets when the packet size exceeds the maximum transmission unit (MTU) size. You can use ping to locate a black hole router by setting the following parameters along with the IP address of the remote host: -f causes the ping utility to send an ICMP echo packet that has the IP do not fragment bit set. -l sets the buffer (or payload) size of the ICMP echo packet. Specify this size by typing a number after the -l parameter. The ping test will provide you with helpful information: If the MTU of every segment of a routed connection is at least the MTU size, the ping is successful. If there is an intermediate segment that has a smaller MTU size, the router returns an ICMP destination unreachable packet, and the ping utility displays a "Packet needs to be fragmented but DF set" message. REFERENCES LabSim for Network Pro, Section 7.4.

Which of the following associates a port number with a host on a private network? PAT NAT CIDR VLSM

PAT EXPLANATION Port address translation (PAT) associates a port number with the translated address. Use PAT to allow multiple private hosts to share a single public address. Each private host is associated with a unique port number. Technically speaking, NAT translates one address to another. With only NAT, you would have to have a public address for each private host. NAT would associate a single public address with a single private address. Because virtually all NAT routers perform port address translation, most routers that are configured with NAT are really performing PAT. When you use a NAT router, you normally use PAT, not just NAT. (NAT is typically used synonymously with PAT.) Classless inter-domain routing (CIDR) allows non-default subnet masks (variable-length subnet masks, or VLSMs). REFERENCES LabSim for Network Pro, Section 7.3.

Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? SNMP POP3 SPC SMTP FTP

POP3 EXPLANATION The POP3 protocol is part of the TCP/IP protocol suite. It is used to retrieve email from a remote server to a local client over a TCP/IP connection. SNMP is a protocol used to monitor network traffic. SMTP is a TCP/IP protocol used to send email. FTP is used to transfer files. REFERENCES LabSim for Network Pro, Section 1.4.

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Full mesh Partial mesh Star Bus

Partial Mesh EXPLANATION In a partial mesh topology, only some redundant paths exist. A partial mesh topology is more practical and less expensive than a full mesh topology. In a full mesh topology, every device has a point-to-point connection with every other device. This provides full redundancy, but it is expensive and impractical. A star topology connects network devices to the network with a single patch cable; a patch cable failure makes the connected device unavailable. A bus topology has a single point of failure. If there is a break in the network media, the network becomes unavailable. REFERENCES LabSim for Network Pro, Section 1.2.

Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports? 110 block 66 block Patch panel Horizontal cross connect

Patch panel. EXPLANATION A patch panel is a device that typically connects individual stranded wires into female RJ45 connectors. For example, you might connect 4 pairs of wires from a punch down block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ45 connectors) to the patch panel on one end and a computer on the other end. Use 66 and 110 blocks to connect individual wires within a wiring closet. These punch down blocks connect the individual wires together, but do not terminate in RJ45 connectors. A horizontal cross connect connects IDFs on the same floor. REFERENCES LabSim for Network Pro, Section 2.4.

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? Client-server Polling Multiple access Peer-to-peer

Peer-to-peer

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network? (Select two.) Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8

Pin 1, Pin 2. EXPLANATION On a 100BaseT network cable, the RJ45 pin-outs are as follows: Pin 1: Tx+ Pin 2: Tx- Pin 3: Rx+ Pin 4: Unused Pin 5: Unused Pin 6: Rx- Pin 7: Unused Pin 8: Unused For a 100BaseT cable, Pins 1 and 2 are used to transmit data; pins 3 and 6 are used to receive data. REFERENCES LabSim for Network Pro, Section 2.4.

You need to terminate a Cat 6 UTP cable with an RJ45 connector. Your organization's IT policy states that all cable connectors must be wired according to TIA568A standards. Drag the UTP wire on the left to the correct pin in the RJ45 connector on the right. Drag White with orange stripe White with green stripe Solid brown Solid blue Solid green White with brown stripe White with blue stripe Solid orange Drop Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8

Pin 1. White with green stripe. Pin 2. Solid green. Pin 3. White with orange stripe. Pin 4. Solid blue. Pin 5. White with blue stripe. Pin 6. Solid orange. Pin 7. White with brown stripe. Pin 8. Solid brown.

You need to terminate a Cat 6 UTP cable with an RJ45 connector. Your organization's IT policy states that all cable connectors must be wired according to TIA568B standards. Drag the UTP wire on the left to the correct pin in the RJ45 connector on the right. Drag White with orange stripe White with green stripe Solid brown Solid blue Solid green White with brown stripe White with blue stripe Solid orange Drop Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8

Pin 1. White with orange stripe. Pin 2. Solid orange. Pin 3. White with green stripe .Pin 4. Solid blue. Pin 5. White with blue stripe. Pin 6. Solid green. Pin 7. White with brown stripe. Pin 8. Solid brown.

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use? STP cables PVC jacketed cables Plenum rated cable Fiber optic cables Cat 5e or Cat 6a cables

Plenum rated cable EXPLANATION Plenum rated cable is fire resistant and non-toxic. You must use plenum rated cable to wire in air spaces used by heating and air conditioning systems. You cannot use PVC jacketed cable to wire above ceilings because it is toxic when burned. Cat 5e cables provide better EMI protection than Cat 5 cables, and Cat 6a cables are an improvement over Cat 6 specifications, but neither of these qualities are a requirement for use in a ceiling area. If the area has a lot of EMI, you might consider using STP or fiber optic cables, but this is not a requirement for wires were in a ceiling area. Typically, you can avoid EMI sources by re-routing cables. REFERENCES LabSim for Network Pro, Section 2.1.

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? Spanning tree protocol Port address translation EIGRP Port forwarding

Port forwarding EXPLANATION Port forwarding is a type of static NAT implementation where a specific port is mapped to a private IP address. Incoming traffic that is addressed to a specific port is then forwarded to the specified host. Port address translation (PAT) is used to keep track of which request goes to which host on the internal network. EIGRP is a routing protocol used to exchange information about known routes with other routers. The spanning tree protocol is used to eliminate switching loops within a network. REFERENCES LabSim for Network Pro, Section 7.3.

Which statements accurately describe the port states of both bridges and switches? (Select two.) In the learning state, the MAC address table cannot be populated because the port is blocked. In the learning state, all ports are in a forwarding state. In the learning state, the MAC address table can be populated, but frames are not forwarded. Ports in a blocked state cannot receive BPDUs. Ports in a blocked state still receive BPDUs.

Ports in a blocked state still receive BPDUs. In the learning state, the MAC address table can be populated, but frames are not forwarded. EXPLANATION For both bridges and switches: - In the learning state, ports do not forward frames, but still populate the MAC address table based on frames received. - In the blocking state, ports receive BPDUs, but do not forward frames. - In the listening state, all ports are blocked. REFERENCES LabSim for Network Pro, Section 6.6.

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once. Drag Host-to-Host Internet Network Access Application Drop Presentation Data Link Application Session Network Transport

Presentation Application Data Link Network Access Application Application Session Application Network Internet Transport Host-to-Host

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server? The server isn't using the default subnet mask. The server has been assigned a multicast address. The server must have an entry on a DNS server that exists on the internet. Private addresses are not accessible through the internet.

Private addresses are not accessible through the internet. EXPLANATION The server has been assigned a private IP address. Private addresses are not accessible from the internet. Instead, a NAT router translates the private address into a public address, and the public address is used to gain access to the private host. REFERENCES LabSim for Network Pro, Section 7.3.

Your computer has an IP address of 161.13.5.15. Your computer is on a: Private network Class C network Public network Multi-cast network

Public Network EXPLANATION Most IP addresses are public IP addresses. However, certain ranges have been reserved for private networks. These are: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 Because your computer's IP address does not fall into these ranges, it is a public IP address. REFERENCES LabSim for Network Pro, Section 7.3.

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now you need to cut off the excess end of each wire. Which tool should you use? Needle nose pliers Snips Cable stripper Punch down tool

Punch down tool. EXPLANATION Use a punch down tool to push wires into 66 or 110 blocks and cut wires at the same time. The punch down tool has a blade on one side that cuts off the excess wires. Use snips to cut cables or wires. Use a cable stripper to remove the plastic covering for a cable. When making drop cables or using punch down blocks, do not remove the plastic covering for individual wires. REFERENCES LabSim for Network Pro, Section 2.4.

You have a small home network connected to the internet using an RG-6 cable. You need to move the router connecting the network to the internet, but can't find any RG-6 cable. Which cable types could you use instead? RG-58 Cat 3 Cat 5e RG-59

RG-59 EXPLANATION RG-6 has an impedance rating of 75 ohms. It is important to use coaxial cables with the same impedance rating. Only RG-59 is rated for 75 ohms. Connecting coaxial cables with Cat 3 and Cat5e cables requires a media converter. REFERENCES LabSim for Network Pro, Section 2.2.

Which of the following cables offers the best protection against EMI? Cat 5e Cat 5 RG-6 Cat 6a

RG-6 EXPLANATION Coaxial cable offers better protection against EMI than twisted pair cables. Coaxial cable has a mesh conductor, which provides a ground and protects against EMI. In general, the higher the twisted pair cable standard, the better protection against some forms of EMI (typically crosstalk). For twisted pair, use shielded twisted pair instead of unshielded twisted pair. Use fiber optic for the best protection against EMI. REFERENCES LabSim for Network Pro, Section 2.2.

F-type connectors are typically used with which of the following cable standards? (Select two.) Cat 5 Cat 6a RG-58 Cat 5e RG-59 RG-6

RG-6 RG-59 EXPLANATION F-type connectors are used with coaxial cable. They are typically used for cable TV and satellite installations using RG-6 or RG-59 cables. RG-58 cables typically use BNC connectors and cables are used for 10Base2 Ethernet. Cat 5, 5e, and 6a cables use RJ45 connectors. REFERENCES LabSim for Network Pro, Section 2.2.

Which of the following protocols has a limit of 15 hops between any two networks? RIP OSPF IS-IS BGP EIGRP

RIP EXPLANATION RIP networks are limited in size to a maximum of 15 hops between any two networks. A network with a hop count of 16 indicates an unreachable network. The other routing protocols do not use the hop count as the metric. EIGRP uses bandwidth and delay for the metric. OSPF and IS-IS use a relative link cost. BGP uses paths, rules, and policies for the metric. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following statements about RIP is true? RIP is a link state routing protocol. RIP is the routing protocol used on the internet. RIP uses hop counts as the cost metric. RIP is suitable for large networks.

RIP uses hop counts as the cost metric. EXPLANATION RIP is a distance vector routing protocol. As such, it is susceptible to the count-to-infinity problem. RIP uses the hop count as the cost metric. Because it has a limitation of 15 hops in one route, it is not suited for large networks. REFERENCES LabSim for Network Pro, Section 7.2.

Which of the following connectors is used with Ethernet 100BaseT networks? RJ45 RJ11 ST BNC

RJ45 EXPLANATION RJ45 connectors are used with Ethernet 100BaseT networks. RJ11 connectors are used with phone, dial-up internet, and DSL modem connections. BNC connectors are used with coaxial cable. ST connectors are used with fiber optic cable. REFERENCES LabSim for Network Pro, Section 2.1.

Which of the following connector types would you most likely use to connect to a T1 WAN service? RJ48c GG45 RJ11 RJ45

RJ48c EXPLANATION The RJ48c connector is similar to an RJ45 connector, but has different pin-outs. RJ48c connectors are commonly used for T1 WAN connections. RJ45 connectors are used for Ethernet. RJ11 connectors are used for dial-up (modem) connections and some DSL connections. GG45 are used with Cat 7 cabling. REFERENCES LabSim for Network Pro, Section 2.1.

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use? EtherChannel BPDU guard PortFast Rapid PVST+

Rapid PVST+ EXPLANATION Rapid PVST+ is the IEEE 802.1w standard. RSTP improves convergence by actively confirming that a switch is ready to transition to a forwarding state, eliminating the listening and learning stages. RSTP defines several new types of links and uses fewer spanning tree states. PortFast allows a port connected to a host to go into a forwarding state almost immediately. PortFast ports must be used only for connections to end user devices, such as workstations or server systems. PortFast should not be used when the port is connected to a bridge, a switch, or another STP speaking device. EtherChannel combines multiple parallel physical links into a single logical channel. The switch treats the logical channel as a single interface that provides redundancy, as well as load sharing among the links in the channel. BPDU guard is frequently used with PortFast to ensure the stability of the STP topology. BPDU guard disables a port configured by PortFast if that port receives BPDUs. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following functions are performed by the OSI Transport layer? (Select three.) Reliable message delivery Data segmentation and reassembly Control media access, logical topology, and device identification End-to-end flow control Format packets for delivery through the media Path identification and selection Consistent data formatting between dissimilar systems

Reliable message delivery Data segmentation and reassembly End-to-end flow control EXPLANATION The Transport layer is responsible for breaking upper-layer data into segments and allowing reliable communications through end-to-end flow control, error detection, and error correction. Message transmission through media is performed at the Physical layer. Media access, logical topology, and device identification occurs at the Data Link layer. Path identification and selection is a function of the Network layer. Data formatting is performed at the Presentation layer. REFERENCES LabSim for Network Pro, Section 1.3.

Which of the following topologies connects each device to a neighboring device? Ring Bus Tree Star

Ring EXPLANATION In ring topologies, each device connects to a neighboring device so that a ring is formed. REFERENCES LabSim for Network Pro, Section 1.2.

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? Star Ring Bus Tree

Ring EXPLANATION In ring topologies, each device on the network acts as a repeater for sending the signal to the next device. REFERENCES LabSim for Network Pro, Section 1.2.

In the OSI model, what is the primary function of the Network layer? Allows applications to establish, use, and end a connection Transmits data frames Routes messages between networks Ensures that packets are delivered with no loss or duplication

Routes messages between networks EXPLANATION The Network layer is responsible for routing messages between networks. REFERENCES LabSim for Network Pro, Section 1.3.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate? Trunking Mirroring Routing PoE Spanning tree

Routing EXPLANATION In a typical configuration with multiple VLANs and a single or multiple switches, workstations in one VLAN will not be able to communicate with workstations in other VLANs. To enable inter-VLAN communication, you will need to use a router (or a Layer 3 switch). Trunking is used to configure switch ports to carry VLAN traffic between switches or between a router and a switch. If you configured a single router to connect to the switch with a single physical interface, you would have to configure trunking on that interface in addition to routing. Trunking by itself would not enable the two devices to communicate. Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Mirroring sends traffic from all switch ports to a switch port you designate as the mirrored port. Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. REFERENCES LabSim for Network Pro, Section 6.4.

Which of the following connectors usually require polishing as part of the assembly process? (Select two.) ST SC RJ45 F-type BNC

SC ST EXPLANATION The fiber optic cable assembly process is more complex than other assemblies. It is necessary to polish the exposed fiber tip to ensure that light is passed from one cable to the next with minimal dispersion. REFERENCES LabSim for Network Pro, Section 2.3.

What protocol sends email to a mail server? TFTP SNMP POP3 FTP SMTP

SMTP EXPLANATION SMTP sends email to a mail server. REFERENCES LabSim for Network Pro, Section 1.4.

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems? POP3 IMAP4 ICMP SMTP FTP

SMTP EXPLANATION The simple mail transfer protocol (SMTP) specifies how messages are exchanged between email servers. Email clients use POP3 and IMAP4 to download email messages from email servers. FTP is a file transfer protocol. ICMP is used in ping and traceroute to communicate network information. REFERENCES LabSim for Network Pro, Section 1.4.

Which of the following connectors is used with fiber optic cables and requires that you use a twisting motion to connect it? LC F-type BNC SC ST

ST. (Set-and Twist) EXPLANATION The ST connector is used with fiber optic cable and uses a twist-type connector. To remember the difference between ST and SC connectors, use the mnemonics Set-and-Twist and Set-and-Click. SC and LC connectors are used with fiber optic cables, but plug in instead of twist. F-type and BNC connectors use a twist to connect, but are used with coaxial cables. REFERENCES LabSim for Network Pro, Section 2.3.

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame? Drop the frame. Send it out all ports except for the port it was received on. Process the frame and respond to the sending device. Forward it out the port and to the device with that MAC address.

Send it out all ports except for the port it was received on EXPLANATION The MAC address FF:FF:FF:FF:FF:FF identifies the broadcast address, meaning all hosts on the subnet. Switches forward broadcast frames out all ports except for the port on which the frame was received. REFERENCES LabSim for Network Pro, Section 6.3.

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.) Drag Packets Segments Bits Frames Drop Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

Session Layer *BLANK* Transport Layer Segments Network Layer Packets Data Link Layer Frames Physical Layer Bits

You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable so that a signal sent on pin 1 arrives on the cable connected to pin 7. Which term describes this condition? Split pair Attenuation Open circuit Short circuit Crosstalk

Short Circuit EXPLANATION An electrical short occurs when electrical signals take a path other than the intended path. In the case of twisted pair wiring, a short means that a signal sent on one wire might arrive on a different wire. Shorts are caused by worn wire jackets, crushed wires that touch, and pierced wire that touches metal. If an open circuit is a cut in the wire that prevents the original signal from reaching the end of the wire, you will have a short. If you have a short, the signal travels a different path. If you have an open circuit, the signal does not travel anywhere (electricity cannot flow because the path is disconnected). Crosstalk is interference that is caused by signals within the twisted pairs of wires. Attenuation is the loss of signal strength from one end of a cable to the other caused by distance. A split pair condition is where a single wire in two different pairs is reversed at both ends. For example, instead of matching the green and green/white wires in pins 1 and 2, you swap the solid green wire with the solid brown wire. REFERENCES LabSim for Network Pro, Section 2.5.

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart? Fibre Channel mode Dual-mode Multi-mode Single-mode

Single-mode EXPLANATION In this scenario, you would use single-mode fiber optic cables. Fiber optic is graded as single-mode or multi-mode. Single-mode consists of a single very thin core, which produces fewer reflections. This provides greater effective bandwidth over greater distances. Multi-mode is less costly than single-mode fiber. Multi-mode is used to transmit over shorter distances, as the rays tend to disperse as the transmission distance increases. Fibre channel is a technology used in storage area networks. REFERENCES LabSim for Network Pro, Section 2.3.

Of the following cables, which offer the best protection against EMI? Cat 5 Cat 5e Single-mode fiber optic RG-6

Single-mode fiber optic EXPLANATION Fiber optic cables offer the best protection against electromagnetic interference (EMI). REFERENCES LabSim for Network Pro, Section 2.3.

When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? IP address Switch port Host name MAC address

Switch Port EXPLANATION VLAN membership is configured by assigning a switch port to a VLAN. A switch can have multiple VLANs configured on it, but each switch port can only be a member of a single VLAN. All devices connected to a switch port are members of the same VLAN. REFERENCES LabSim for Network Pro, Section 6.4.

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet is not working properly. Which of the following allows the service provider to remotely test the local loop? Smartjack Demarc Demarc extension Loopback plug Horizontal cross connect

Smartjack EXPLANATION A smartjack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. A smartjack is similar to a loopback plug; however, the loopback plug must be manually inserted into a jack to test the line, while the smartjack is a special plug that includes loopback support and can be used to test the local loop remotely. Your provider's technicians can use a smartjack to diagnose the local loop without visiting your location. The demarcation point (demarc) is the line that marks the boundary between the telco equipment and the private network or telephone system. A demarc extension extends the demarcation point from its original location to another location within the building. A horizontal cross connect connects wiring closets on the same floor. REFERENCES LabSim for Network Pro, Section 2.5.

Which of the following solutions would you implement to eliminate switching loops? Auto-duplex Spanning tree CSMA/CD Inter-VLAN routing

Spanning Tree EXPLANATION Run the spanning tree protocol to prevent switching loops. A switching loop occurs when there are multiple active paths between switches. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Switch ports that are part of that path are placed in a forwarding state. Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. Use inter-VLAN routing to enable devices in different VLANs to communicate. The auto-duplex setting allows a switch port to detect the duplex setting of connected devices (either half- or full-duplex). CSMA/CD is a method for detecting and recovering from collisions. REFERENCES LabSim for Network Pro, Section 6.6.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? PoE Trunking Spanning tree Bonding 802.1x

Spanning Tree EXPLANATION Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. - Without the spanning tree protocol, switches that are connected with multiple links would form a switching loop, where frames are passed back and forth continuously. - Spanning tree provides only a single active path between switches. Switch ports that are part of that path are placed in a forwarding state. - Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. - When an active path goes down, the spanning tree protocol automatically recovers and activates the backup ports necessary to provide continued connection between devices. Bonding performs spanning tree's opposite function--it allows multiple switch ports to be used at the same time to reach a specific destination. 802.1x is an authentication protocol used with port security (or port authentication). Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. Trunking identifies ports that are used to carry VLAN traffic between switches. A trunk port is a member of all VLANs defined on all switches. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following features dynamically places switch ports in blocking or forwarding states? Mirroring Spanning tree Trunking PoE

Spanning Tree EXPLANATION Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. -vWithout the spanning tree protocol, switches that are connected with multiple links would form a switching loop, where frames are passed back and forth continuously. - Spanning tree provides only a single active path between switches. Switch ports that are part of that path are placed in a forwarding state. - Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. - When an active path goes down, the spanning tree protocol automatically recovers and activates the backup ports necessary to provide continued connection between devices. Trunking identifies ports that are used to carry VLAN traffic between switches. A trunk port is a member of all VLANs defined on all switches. Mirroring sends traffic from all switch ports to a switch port you designate as the mirrored port. Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. REFERENCES LabSim for Network Pro, Section 6.6.

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? PoE Spanning tree Mirroring Trunking OSPF

Spanning Tree Spanning Tree EXPLANATION Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. -vWithout the spanning tree protocol, switches that are connected with multiple links would form a switching loop, where frames are passed back and forth continuously. - Spanning tree provides only a single active path between switches. Switch ports that are part of that path are placed in a forwarding state. - Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state. - When an active path goes down, the spanning tree protocol automatically recovers and activates the backup ports necessary to provide continued connection between devices. Trunking identifies ports that are used to carry VLAN traffic between switches. A trunk port is a member of all VLANs defined on all switches. Mirroring sends traffic from all switch ports to a switch port you designate as the mirrored port. Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. REFERENCES LabSim for Network Pro, Section 6.6.

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Bus Mesh Star Ring

Star EXPLANATION A hub creates a network with a physical star topology. The physical star topology uses a logical bus topology and sends messages to all the devices connected to the hub. A mesh topology is a series of point-to-point links between devices. A ring topology uses a central device called an MSAU. REFERENCES LabSim for Network Pro, Section 1.2.

Which of the following topologies connects each network device to a central hub? Star Ring Mesh Bus

Star EXPLANATION Star topologies connect each device on the network to a central hub. REFERENCES LabSim for Network Pro, Section 1.2.

You are the network administrator for a small company that implements NAT to access the internet. You recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these five servers? Restricted Overloading Static Dynamic

Static EXPLANATION Static translation consistently maps an unregistered IP address to the same registered IP address on a one-to-one basis. Static NAT is particularly useful when a device needs to be assigned the same address so it can be accessed from outside the network, such as web servers and other similar devices. Dynamic translation would not work for these servers because it maps an unregistered host IP address to any available IP address configured in a pool of one or more registered IP addresses. Accessing a server assigned one of these addresses would be nearly impossible because the addresses are still shared by multiple hosts. REFERENCES LabSim for Network Pro, Section 7.3.

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access? DNS A record Dynamic NAT DNS CNAME record Multicast Static NAT

Static NAT EXPLANATION Static NAT maps an internal IP address to a static port assignment. Static NAT is typically used to take a server on the private network (such as a web server) and make it available on the internet. External hosts contact the internal server using the public IP address and the static port. Using a static mapping allows external hosts to contact internal hosts. Dynamic NAT automatically maps internal IP addresses with a dynamic port assignment. On the NAT device, the internal device is identified by the public IP address and the dynamic port number. Dynamic NAT allows internal (private) hosts to contact external (public) hosts, but not vice versa. External hosts cannot initiate communications with internal hosts. DNS records associate a host name with an IP address. Multicast can forward a single data stream to all computers that are members of the same multicast group. REFERENCES LabSim for Network Pro, Section 7.3.

What device is used to create a physical star topology? Switch Router Bridge Firewall

Switch EXPLANATION A physical star topology uses a switch or a hub. Routers are used to connect multiple subnets together. A firewall is a router that filters packets or other network communications. REFERENCES LabSim for Network Pro, Section 1.2.

Which of the following connectivity hardware is used to create a VLAN? Hub Router Bridge Switch

Switch EXPLANATION Specialized switches are used to create virtual LANs. The switch must be capable of appending and reading VLAN IDs. REFERENCES LabSim for Network Pro, Section 6.4.

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? Router Bridge Switch Active hub

Switch EXPLANATION Use a switch to create additional collision domains on a LAN. A switch filters an entire network and creates virtual LANs inside it rather than dividing it into separate internetworks as a router does. REFERENCES LabSim for Network Pro, Section 6.4.

You can create a virtual LAN using which of the following? Hub Switch Gateway Router

Switch EXPLANATION Use a switch to create virtual LANs (VLANs). The various ports on a switch can be assigned to a specific VLAN to create logically distinct networks on the same physical network topology. Routers, gateways, and hubs are common network devices, but they do not support the creation of VLANs. REFERENCES LabSim for Network Pro, Section 6.4.

Which of the following statements accurately describes a VLAN ID? Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer. VLAN IDs identify the VLAN where the frame originated so the receiving host can reply. VLAN IDs are defined at the Network layer and help route the frame through the switch fabric.

Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to EXPLANATION A VLAN ID is a unique identifier attached to each frame. Switches in the network understand the ID as they forward the frame. When the frame reaches its destination, the last switch removes the VLAN ID because no other device understands it. VLAN IDs work at the Data Link layer. REFERENCES LabSim for Network Pro, Section 6.5.

Which problem does the spanning tree protocol prevent? Switching loops from developing when redundant paths are implemented between switches. Routing tables from becoming outdated by decreasing the convergence time on a network. Buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device. Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs.

Switching loops from developing when redundant paths are implemented between switches. EXPLANATION The spanning tree protocol is a long-standing protocol that runs in the background of bridged and switched networks to keep message loops from occurring. REFERENCES LabSim for Network Pro, Section 6.6.

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? UDB TCP UDP UCP

TCP EXPLANATION The TCP protocol includes error checking. REFERENCES LabSim for Network Pro, Section 1.4.

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? IP TCP UDP RIP FTP TFTP

TCP EXPLANATION Write the application to use the transmission control protocol (TCP). TCP guarantees delivery through error checking and acknowledgments. REFERENCES LabSim for Network Pro, Section 1.4.

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use? Butt set Smartjack Toner probe TDR OTDR

TDR EXPLANATION A TDR is a special device that sends electrical pulses on a wire in order to discover information about the cable. The TDR measures impedance discontinuities; the echo received on the same wire in response to a signal on the wire. The results of this test can be used to: - Estimate the length of a wire. - Measure the cable impedance. - Identify the locations of splices and connectors on the wire. - Identify shorts, open circuits, and the location of the fault. An optical time domain reflector (OTDR) performs the same function for fiber optic cables using light waves. A toner probe is two devices used to trace the end of a wire from a known endpoint into the termination point in the wiring closet. A butt set (also called a lineman's handset) is a device used to test analog telephone installations. The butt set includes an earpiece, mouthpiece, dialing interface, and various connectors. A smartjack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. REFERENCES LabSim for Network Pro, Section 2.5.

Which of the following is true about single-mode fiber optic network cabling? The central core is smaller than standard multi-mode fiber optic cabling core. Single-mode fiber optic cabling is less expensive than multi-mode cabling. Single-mode cabling supports shorter segment lengths than multi-mode fiber optic cabling. The central core is composed of braided plastic or glass fibers.

The central core is smaller than standard multi-mode fiber optic cabling core. EXPLANATION Single-mode fiber optic cabling provides one path (or mode) for the light to travel. It supports longer transmission distances than multi-mode fiber optic cable, and it's also more expensive. Single-mode cabling also has a central core that is much smaller than standard multi-mode fiber optic cabling core. REFERENCES LabSim for Network Pro, Section 2.3.

What information does the next hop entry in a routing table identify? The last router in the path to the destination network. The number of routers that the packet must go through to reach the destination network. The first router in the path to the destination network. A backup router that is used to forward packets addressed to unknown networks.

The first router in the path to the destination network. EXPLANATION The next hop router is the first (or next) router in the path to the destination network. Each router looks at the destination network in the packet, then consults the routing table to identify the next hop router to the destination network. The hop count identifies the number of routers in the path to the destination network. A default gateway router is a router that is used for packets sent to external networks. Most routers do not have a default gateway setting, but instead use a default route setting, which identifies a next hop router for all unknown networks. REFERENCES LabSim for Network Pro, Section 7.1.

Which of the following are true regarding using multiple VLANs on a single switch? (Select two.) The number of broadcast domains decreases. The number of collision domains remains the same. The number of broadcast domains increases. The number of collision domains increases. The number of broadcast domains remains the same. The number of collision domains decreases.

The number of broadcast domains increases The number of collision domains remain the same EXPLANATION When you configure multiple VLANs on a single switch, the number of broadcast domains increases. Each VLAN will be placed in its own broadcast domain. The number of collision domains remains the same. Each switch port is its own collision domain regardless of the number of VLANs configured on the switch. REFERENCES LabSim for Network Pro, Section 6.4.

Which of the following are characteristics of an LC fiber optic connector? (Choose two.) They are threaded. They use a housing and latch system similar to an RJ45 UTP connector. They can be used with either fiber optic or copper cabling. They are half the size of standard connectors. They use a one-piece bayonet connecting system.

The use a housing and latch system similar to an RJ45 UTP connector They are half the size of standard connectors EXPLANATION LC fiber optic connectors are small, about half the size of other fiber optic connectors. Their appearance is similar to a typical RJ45 connector used with UTP wiring. Like an RJ45 connector, an LC fiber optic connector uses a small latch to lock the connector in a jack. REFERENCES LabSim for Network Pro, Section 2.3.

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. This interface is connected to a workstation located on the second floor. What could cause this to happen? Two hosts on the network have the same MAC address. Collisions between two or more network hosts are occurring. The workstation's network board is jabbering. A strong EMI emitter is near the cable that connects the workstation to the interface. An incorrect subnet mask has been configured on the workstation.

The workstation's network board is jabbering EXPLANATION Frames that are too long are typically caused by a faulty network card that jabbers (constantly sending garbage data). On a hub-based Ethernet network, these errors could possibly be caused by collisions. However, because a switch is being used in this scenario, collisions can't occur. EMI or cross-talk on the UTP cabling would cause corrupted frames and result in CRC errors. Oversize frame errors are Layer 1 errors. Duplicate MAC addresses would result in a Layer 2 error. Incorrect protocol or IP addressing configurations would result in Layer 3 errors. REFERENCES LabSim for Network Pro, Section 6.7.

Which of the following are characteristics of an MTRJ fiber optic connector? (Select two.) They can be used with multi-mode fiber optic cables. They must never be used with single-mode fiber-optic cables. They are used with multi-fiber fiber optic ribbon cables. They use a keyed bayonet. They use metal guide pins to ensure accurate alignment.

They use metal guide pins to ensure accurate alignment They can be used with multi-mode fiber optic cables. EXPLANATION MTRJ connectors can be used with either multi-mode or single-mode fiber optic cabling. The connector is made from plastic and uses metal guide pins to ensure that it is properly aligned in the jack. REFERENCES LabSim for Network Pro, Section 2.3.

You've connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device. What does this output indicate? (Select two.) This is a crossover cable. This is a straight-through cable. There are multiple shorts on this cable. There are multiple open pins on this cable. The cable is functioning correctly.

This is a crossover cable. The cable is functioning correctly. EXPLANATION In this example, the cable being tested is a correctly wired crossover cable. Output with x characters between pins indicates that they are shorted. Straight-through connections are displayed using - characters in the output of the cable certifier. Open connections are displayed with no characters or lines between the pin numbers. REFERENCES LabSim for Network Pro, Section 2.5.

Which OSI model layer is responsible for guaranteeing reliable message delivery? Data Link Session Application Transport

Transport EXPLANATION The Transport layer is responsible for connection services that provide reliable message delivery through error detection and correction mechanisms. Specifically, the TCP protocol provides these services. The Application layer integrates network functionality into the host operating system and enables network services. The Session layer's primary function is managing the sessions in which data is transferred. The Data Link layer defines the rules and procedures for hosts as they access the Physical layer. REFERENCES LabSim for Network Pro, Section 1.3.

Which of the following tasks do routers perform? (Select two.) Identify devices through hardware addresses. Control access to the transmission media. Route data based on hardware device addresses. Route data based on logical network addresses. Maintain information about paths through an internetwork. Multiplex signals onto the same transmission media.

maintain info about paths through an internetwork. route data based on logical network addresses EXPLANATION Routers build and maintain tables of routes through an internetwork and deliver data between networks based on logical network addresses. REFERENCES LabSim for Network Pro, Section 7.1.

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? Gigabit and higher Ethernet ports. Each port can only be a member of a single VLAN. Trunk ports. Any port not assigned to a VLAN. Uplink ports.

Trunk Ports EXPLANATION A trunk port is a member of all VLANs defined on a switch and carries traffic between the switches. When trunking is used, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows which VLAN the frame belongs to. Typically, uplink ports (which are faster than the other switch ports) are used for trunk ports, although any port can be designated as a trunking port. On an unconfigured switch, ports are members of a default VLAN (often designated VLAN 1). When you remove a port's VLAN membership, it is reassigned back to the default VLAN. Therefore, the port is always a member of one VLAN. REFERENCES LabSim for Network Pro, Section 6.5.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches? Bonding Trunking Layer 3 switching Spanning tree

Trunking EXPLANATION A trunk port is used to connect two switches together. - Typically, Gigabit Ethernet ports are used for trunk ports, although any port can be a trunking port. A trunk port is a member of all VLANs and carries traffic between the switches. - When trunking is used, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows which VLAN the frame belongs to. - The trunking protocol describes the format that switches use for tagging frames with the VLAN ID. - Because end devices do not understand the VLAN tags, the tag is removed from the frame by the switch before the frame is forwarded to the destination device. - VLAN tagging is only used for frames that travel between switches on the trunk ports. Use a Layer 3 switch or a router to enable devices in different VLANs to communicate with each other. Spanning tree is a protocol on a switch that allows it to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Bonding allows multiple switch ports to be used at the same time to reach a specific destination. REFERENCES LabSim for Network Pro, Section 6.5.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? Spanning tree 802.1x PoE Trunking Bonding

Trunking EXPLANATION A trunk port is used to connect two switches together. A trunk port is a member of all VLANs and carries traffic between the switches. When trunking is used, frames that are sent over a trunk port are tagged by the first switch with the VLAN ID so that the receiving switch knows which VLAN the frame belongs to. The trunking protocol describes the format that switches use for tagging frames with the VLAN ID. Because end devices do not understand the VLAN tags, the tag is removed from the frame by the switch before the frame is forwarded to the destination device. 802.1x is an authentication protocol used with port security (or port authentication). Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. Bonding groups multiple switch ports into a single logical port, allowing both ports to be used to communicate with a single device. REFERENCES LabSim for Network Pro, Section 6.5.

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? DMZ NAT VLANs Port authentication

VLANs EXPLANATION Use VLANs to segregate hosts based on switch ports. You can define two VLANs, one for employees connected throughout the building, and another for the ports in the lobby. The ports in the lobby would have only internet access, while devices connected to ports in the rest of the building could communicate with other devices within the same VLAN. Use port authentication to control access to the network based on things such as username and password. Port authentication would allow or deny access, but would not restrict access once authenticated or provide any type of access if not authenticated. A demilitarized zone (DMZ) is a buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet). Network address translation (NAT) modifies the IP addresses in packets as they travel from one network (such as a private network) to another (such as the internet). NAT allows you to connect a private network to the internet without obtaining registered addresses for every host. Hosts on the private network share the registered IP addresses. REFERENCES LabSim for Network Pro, Section 6.4.

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first? Use a wire crimper to ensure that the cable ends are still fully attached to the cable in two places: between the computer and the network switch, and between the network switch and the server system. Use a tone generator to test the network cables between the computer and the network switch and between the network switch and the server system. Use a cable tester to test the cable between the computer system and the network switch. Use a punch down tool to test the network cable between the computer system and the network switch. Use a cable tester to test the cable between the network switch and the server system.

Use a cable tester to test the cable between the computer system and the network switch EXPLANATION A cable tester is a hardware device that can be used to verify the correct operation of network cabling. In this scenario, because no other systems are having problems connecting to the server, you are most likely to use the cable tester to check the cable between the client system and the network switch. A punch down tool is used to connect network cabling to physical end points such as sockets and demarcation points. You would not use it to test a suspected faulty cable. A tone generator is used to locate network cables. Successful use of a tone generator does not necessarily indicate that the cable is functioning correctly. You might use a wire crimper to repair a cable, but you would not use it to locate a fault cable. REFERENCES LabSim for Network Pro, Section 2.5.

Which of the following methods would you use to create a crossover cable? Use the T568A standard on one connector and the T568B standard on the other connector. Use the T568A standard. Use the BLOG convention. Use the T568B standard on one connector and the BLOG convention on the other connector. Use the T568B standard. Use the T568A standard on one connector and the BLOG convention on the other connector.

Use the T568A standard on one connector and the T568B standard on the other connector. EXPLANATION The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard. A crossover cable connects the transmit pins on one connector to the receive pins on the other connector (pin 1 to pin 3 and pin 2 to pin 6). REFERENCES LabSim for Network Pro, Section 2.4.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? Spanning tree VLAN VPN Port security

VLAN EXPLANATION Define virtual LANs (VLANs) on the switch. With a VLAN, a port on the switch is associated with a VLAN. Only devices connected to ports that are members of the same VLAN can communicate with each other. Routers are used to allow communication between VLANs if necessary. Use virtual private network (VPN) to connect two hosts securely through an unsecured network (such as the internet). VPN tunneling protocols protect data as it travels through the unsecured network. Spanning tree is a switch feature that allows redundant paths between switches. Port security is a method of requiring authentication before a network connection is allowed. REFERENCES LabSim for Network Pro, Section 6.7.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation? VLAN Port security Spanning tree VPN

VLAN EXPLANATION You should define virtual LANs (VLANs) on the switch. With a VLAN, a port on the switch is associated with a VLAN. Only devices connected to ports that are members of the same VLAN can communicate with each other. Routers are used to allow communication between VLANs if necessary. Use a virtual private network (VPN) to connect two hosts securely through an unsecured network (such as the internet). VPN tunneling protocols protect data as it travels through the unsecured network. Spanning tree is a switch feature that allows for redundant paths between switches. Port security is a method of requiring authentication before a network connection is allowed. REFERENCES LabSim for Network Pro, Section 6.4.

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? Port security VPN VLAN Spanning tree

VLAN EXPLANATION You should define virtual LANs (VLANs) on the switch. With a VLAN, a port on the switch is associated with a VLAN. Only devices connected to ports that are members of the same VLAN can communicate with each other. Routers are used to allow communication between VLANs if necessary. Use virtual private network (VPN) to connect two hosts securely through an unsecured network (such as the internet). VPN tunneling protocols protect data as it travels through the unsecured network. Spanning tree is a switch feature that allows for redundant paths between switches. Port security is a method of requiring authentication before a network connection is allowed. REFERENCES LabSim for Network Pro, Section 6.4.

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network? MAC filtering Subnetting VLANs NIC teaming

VLANs EXPLANATION A virtual LAN (VLAN) uses switch ports to define a broadcast domain. When you define a VLAN, you assign devices on different switch ports to a separate logical, or virtual, LAN. NIC teaming is used to combine two or more physical connections into one logical connection and does not isolate networks. While MAC filtering could be used to control access, it is easily bypassed by MAC spoofing. Subnetting is used to divide large networks into smaller networks. Subnetting can be used to isolate sensitive systems, but a subnet is not as secure as a VLAN. REFERENCES LabSim for Network Pro, Section 6.4.

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? Port authentication VLANs Spanning tree PoE

VLANs EXPLANATION Use VLANs to segregate hosts based on switch ports. You could define two VLANs, one for employees connected throughout the building, and another for the ports in the lobby. The ports in the lobby would have only internet access, while devices connected to ports in the rest of the building could communicate with other devices within the same VLAN. Use port authentication to control access to the network based on things such as username and password. Port authentication would allow or deny access, but would not restrict access once authenticated or provide any type of access if not authenticated. Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. REFERENCES LabSim for Network Pro, Section 6.7.

Match the Cisco device password type on the left with its function on the right. Drag VTY Console SDM Drop Controls the ability to log on through a LAN or WAN interface configured on the device. Controls the ability to connect to the device using a web browser using HTTPS. Controls the ability to connect to the device using a direct connection.

VTY-Controls the ability to log on though a LAN or WAN interface configured on the device. SDM-Controls the ability to switch configuration modes Console-Controls the ability to connect to the device using a direct connection EXPLANATION The following table lists three of the most common password types that you can configure on Cisco devices, including switches and routers: Console - Controls the ability to log on to the device through a console connection. VTY - Controls the ability to log on to the device using a virtual terminal (VTY) connection. EXEC mode - Controls the ability to switch to configuration modes. REFERENCES LabSim for Network Pro, Section 6.1.

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together? Smart jack Vertical cross connect Demarc extension Horizontal cross connect

Vertical cross connect. EXPLANATION A vertical cross connect joins the main distribution frame (MDF) on the main floor to intermediate distribution frames (IDFs) on upper floors. Cabling runs vertically (up and down) between the MDF and the IDFs. A horizontal cross connect joins IDFs on the same floor. Cabling runs horizontally (sideways) between the IDFs. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. A demarc extension extends the demarcation point from its original location to another location within the building. The demarc extension typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You might need a demarc extension if your network occupies an upper floor of a building. The LEC will typically install the demarc into the MDF on the bottom floor, and you will need to install an extension to place the demarc into the IDF on your floor. REFERENCES LabSim for Network Pro, Section 2.4.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Manually reconfigure the default route to point to the new next hop router. Stop and restart the RIP protocol on the router. Wait for convergence to take place. Force RIP to perform an immediate update.

Wait for convergence to take place. EXPLANATION When using a routing protocol, changes in routing information take some time to be propagated to all routers on the network. The term "convergence" is used to describe the condition when all routers have the same (or correct) routing information. Static routes in the routing table must be updated manually. Restarting RIP might actually increase the time required for changes to be learned. Forcing an update (if the router supports it) is not a requirement, as the periodic sharing of routes will eventually update the routing table entry. REFERENCES LabSim for Network Pro, Section 7.2.

When would you typically use an RJ11 connector? When using multi-mode fiber optic cables When using single-mode fiber optic cables When using RG-6 cables When using Cat 3 cables When connecting a phone to a phone line When using Cat 5 or higher cables

When connecting a phone to a phone line EXPLANATION An RJ11 connector is used for connecting analog telephones to the telephone jacks. Cat 3, Cat 5, and higher twisted pair cables use RJ45 connectors. Coaxial cables use F-type or BNC connectors. Fiber optic cables use a variety of connectors (ST, SC, LC, MT-RJ, FC). REFERENCES LabSim for Network Pro, Section 2.1.

You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/blue, blue, white/orange, orange, white/green, green, white/brown, brown White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown. EXPLANATION The T568B standard uses the following order of wires in the connector: white/orange, orange, white/green, blue, white/blue, green, white/brown, brown. The T568A standard switches the green and orange wires (along with their corresponding white wires). Use the order blue-orange-green-brown (BLOG), with the white wire first for connecting wires on a 110 punch down block. REFERENCES LabSim for Network Pro, Section 2.4.

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches? You can provide guaranteed bandwidth between two devices. You can segment the network based on physical location. You can create multiple collision domains. You can create multiple broadcast domains.

You can create multiple broadcast domains EXPLANATION By creating a VLAN, you create multiple broadcast domains, with each VLAN being in its own broadcast domain. Using switches without VLANs lets you segment the network based on physical location, create multiple collision domains, and provide guaranteed bandwidth between devices. REFERENCES LabSim for Network Pro, Section 6.5.

Why might you use an RJ11 connector? You want to connect the 10BaseT network card in your computer to a switch. You want to connect your computer to the internet with a DSL modem. You want to upgrade your 10BaseT network to 100BaseTX. You want to test a network cable to see if there is a break in the line.

You want to connect your computer to the internet with a DSL modem. EXPLANATION RJ11 connectors are typically used for telephones and modems. REFERENCES LabSim for Network Pro, Section 2.1.

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. Which condition are you most likely to experience on the network? Collisions Echo Interference Attenuation Crosstalk

collisions EXPLANATION A collision occurs when two devices that share the same media segment transmit at the same time. In a switched network, collisions should only occur on ports that have multiple devices attached. To eliminate collisions, connect only a single device to each switch port. Interference is an electrical signal on a wire that is not part of the original signal sent on the wire. Common sources of interference include nearby generators, motors (such as elevator motors), radio transmitters, welders, transformers, and fluorescent lighting. Crosstalk is interference that is caused by signals within the twisted pairs of wires. Crosstalk is often introduced within connectors where the twists are removed to add the connector. Crosstalk can also occur where wires are crushed or where the plastic coating is worn. Attenuation is the loss of signal strength from one end of a cable to the other. The longer the cable, the more attenuation. Echo occurs when some of the signal is reflected back to the transmitter, distorting the signal. Echo is caused by connecting cables and devices with different impedance ratings. REFERENCES LabSim for Network Pro, Section 6.7.

Which command would you use on a switch to enable management from a remote network? ip default-gateway 192.168.10.185 ip address dhcp no shutdown ip address 192.168.10.185 255.255.255.0

ip default-gateway 192.168.10.185 EXPLANATION To enable management from a remote network, configure the default gateway. Use the following command in global configuration mode: switch(config)#ip default-gateway IP_address REFERENCES LabSim for Network Pro, Section 6.2.

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is working properly? tracert netstat nslookup nbtstat

tracert EXPLANATION tracert shows you the series of routers that are used between the source and destination computers. If a router is not functioning, tracert can help you find which router is not working by showing you the last router it was able to contact successfully. REFERENCES LabSim for Network Pro, Section 7.4.


Set pelajaran terkait

Understanding Business Chapter 9

View Set

Chapter 42: Nursing Care of the Child With an Alteration in Bowel Elimination/Gastrointestinal Disorder

View Set

MGT 340 Organizational Behavior Final Exam [Missing Ch5 & 10]

View Set

Chapter 21 - Managing Patient Care

View Set

Spanish 2 Ch. 4 Primera Parte Test

View Set

NUR 1024: NCLEX Questions on Fractures

View Set