9/27 last minute study set

Ace your homework & exams now with Quizwiz!

Class A networks have a first octet in the range of

1-126

Class B networks have a first octet in the range of

128-191

Class C networks have a first octet in the range of

192-223

Class D networks have a first octet in the range of

224-239

Class E networks have a first octet in the range of

240-255

________ stores a bootstrap (or boothelper) program that is loaded when the switch first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the switch.

ROM: Read-only memory (ROM)

An engineer wants to set up simple password protection with no usernames for some switches in a lab, for the purpose of keeping curious co-workers from logging into the lab switches from their desktop PCs. Which of the following commands would be a useful part of that configuration? a. A login vty mode subcommand b. A password password console subcommand c. A login local vty subcommand d. A transport input ssh vty subcommand

a

Which of the following commands might you see associated with the router CLI, but not with the switch CLI? a. The clock rate command b. The ip address address mask command c. The ip address dhcp command d. The interface vlan 1 command

a

Which of the following devices would be in the same collision domain as PC1? a. PC2, which is separated from PC1 by an Ethernet hub b. PC3, which is separated from PC1 by a transparent bridge c. PC4, which is separated from PC1 by an Ethernet switch d. PC5, which is separated from PC1 by a router

a

Which of the following line subcommands tells a switch to wait until a show com- mand's output has completed before displaying log messages on the screen? a. logging synchronous b. no ip domain-lookup c. exec-timeout 0 0 d. history size 15

a

Which of the following statements best describes what a switch does with a frame destined for an unknown unicast address? a. It forwards out all interfaces in the same VLAN except for the incoming interface. b. It forwards the frame out the one interface identified by the matching entry in the MAC address table. c. It compares the destination IP address to the destination MAC address. d. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

a

Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incom- ing interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

a

Working at the help desk, you receive a call and learn a user's PC IP address and mask (192.168.9.1/27). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the following is true in this case? a. N=24 b. S=24 c. H=8 d. H=7

a

Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2. c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC2. d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.

a A. PC1 will send an Ethernet frame to Router 1, with PC1's MAC address as the source address and Router 1's MAC address as the destination address. Router 1 will remove the encapsulated IP packet from that Ethernet frame, discarding the frame header and trailer. Router 1 will forward the IP packet by first encapsulating it inside an HDLC frame, but Router 1 will not encapsulate the Ethernet frame in the HDLC frame but rather the IP packet. Router 2 will de-encapsulate the IP packet from the HDLC frame and forward it onto the Ethernet LAN, adding a new Ethernet header and trailer, but this header will differ. It will list Router 2's MAC address as the source address and PC2's MAC address as the destination address.

Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.) a. Logical addressing b. Physical addressing c. Path selection d. Arbitration e. Error recovery

a and c

A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has been disabled. An engineer gets into configuration mode and issues the vlan 22 command, followed by the name Hannahs-VLAN command. Which of the following are true? (Choose two answers.) a. VLAN 22 is listed in the output of the show vlan brief command. b. VLAN 22 is listed in the output of the show running-config command. c. VLAN 22 is not created by this process. d. VLAN 22 does not exist in that switch until at least one interface is assigned to that VLAN.

a b

Which of the following masks, when used as the only mask within a Class B network, would supply enough subnet bits to support 100 subnets? (Choose two.) a. /24 b. 255.255.255.252 c. /20 d. 255.255.252.0

a b

Which of the following devices would be in the same broadcast domain as PC1? (Choose three answers.) a. PC2, which is separated from PC1 by an Ethernet hub b. PC3, which is separated from PC1 by a transparent bridge c. PC4, which is separated from PC1 by an Ethernet switch d. PC5, which is separated from PC1 by a router

a b c

Which of the following are typical functions of TCP? (Choose four answers.) a. Flow control (windowing) b. Error recovery c. Multiplexing using port numbers d. Routing e. Encryption f. Ordered data transfer

a b c f

The output of the show interfaces status command on a 2960 switch shows interface Fa0/1 in a "disabled" state. Which of the following is true about interface Fa0/1? (Choose three answers.) a. The interface is configured with the shutdown command. b. The show interfaces fa0/1 command will list the interface with two status codes of administratively down and line protocol down. c. The show interfaces fa0/1 command will list the interface with two status codes of up and down. d. The interface cannot currently be used to forward frames. e. The interface can currently be used to forward frames.

a b d

Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size? (Choose two answers.) a. Network b. Subnet c. Host d. Broadcast

a c

Imagine that you are told that switch 1 is configured with the dynamic auto param- eter for trunking on its Fa0/5 interface, which is connected to switch 2. You have to configure switch 2. Which of the following settings for trunking could allow trunking to work? (Choose two answers.) a. on b. dynamic auto c. dynamic desirable d. access e. None of the other answers are correct.

a c

In a three-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.) a. The design uses a partial mesh of links between access and distribution switches b. The design uses a full mesh of links between access and distribution switches c. The design uses a partial mesh of links between the distribution and core switches d. The end user and server devices connect directly to distribution layer switches

a c

On a Cisco Catalyst switch, you issue a show mac address-table command. Which of the following answers list information you would likely see in most lines of output? (Choose two answers.) a. A MAC address b. An IP address c. A VLAN ID d. Type (broadcast, multicast, or unicast)

a c

Which of the following are true about IP address 192.168.6.7's IP network? (Choose two answers.) a. The network ID is 192.168.6.0. b. The network is a Class B network. c. The default mask for the network is 255.255.255.0. d. The number of host bits in the unsubnetted network is 16.

a c

Which of the following are private IP networks? (Choose two answers.) a. 172.31.0.0 b. 172.32.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 11.0.0.0

a c A and C. The private IPv4 networks, defined by RFC 1918, are Class A network 10.0.0.0, the 16 Class B networks from 172.16.0.0 to 172.31.0.0, and the 256 Class C networks that begin with 192.168.

A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user's PC. The end user, thinking the user is helping, manually sets the PC's OS to use a speed of 1000 Mbps and to use full duplex, and disables the use of autonegotiation. The switch's G0/1 port has default settings for speed and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.) a. Full duplex b. Half duplex c. 10 Mbps d. 1000 Mbps

a d

Switch SW1 uses its Gigabit 0/1 interface to connect to switch SW2's Gigabit 0/2 interface. SW2's Gi0/2 interface is configured with the speed 1000 and duplex full commands. SW1 uses all defaults for interface configuration commands on its Gi0/1 interface. Which of the following are true about the link after it comes up? (Choose two answers.) a. The link works at 1000 Mbps (1 Gbps). b. SW1 attempts to run at 10 Mbps because SW2 has effectively disabled IEEE standard autonegotiation. c. The link runs at 1 Gbps, but SW1 uses half-duplex and SW2 uses full duplex. d. Both switches use full duplex.

a d

An engineer's desktop PC connects to a switch at the main site. A router at the main site connects to each branch office through a serial link, with one small router and switch at each branch. Which of the following commands must be configured on the branch office switches, in the listed configuration mode, to allow the engineer to tel- net to the branch office switches? (Choose three answers.) a. The ip address command in interface configuration mode b. The ip address command in global configuration mode c. The ip default-gateway command in VLAN configuration mode d. The ip default-gateway command in global configuration mode e. The password command in console line configuration mode f. The password command in vty line configuration mode

a f d

Flash memory also can be used to store _______

any other files besides just the cisco ios

Configuring both the speed and duplex on a Cisco switch interface disables

autonegotiation

A network engineer spends time thinking about the entire Class B network 172.16.0.0, and how to subnet that network. He then chooses how to subnet this Class B net- work and creates an addressing and subnetting plan, on paper, showing his choices. If you compare his thoughts about this network before subnetting the network, to his thoughts about this network after mentally subnetting the network, which of the fol- lowing occurred to the parts of the structure of addresses in this network? a. The subnet part got smaller. b. The host part got smaller. c. The network part got smaller. d. The host part was removed. e. The network part was removed.

b

Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? a. enable password b. enable secret c. Neither d. The password command, if it is configured

b

In a LAN, which of the following terms best equates to the term VLAN? a. Collision domain b. Broadcast domain c. Subnet d. Single switch e. Trunk

b

Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2? a. Inserts a 4-byte header and does change the MAC addresses b. Inserts a 4-byte header and does not change the MAC addresses c. Encapsulates the original frame behind an entirely new Ethernet header d. None of the other answers are correct

b

The show port-security interface f0/1 command lists a port status of secure-down. Which one of the following answers must be true about this interface at this time? a. The show interface status command lists the interface status as connected. b. The show interface status command lists the interface status as err-disabled. c. The show port-security interface command could list a mode of shutdown or restrict, but not protect. d. The show port-security interface command could list a violation counter value of 10.

b

Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /30? a. 255.255.255.192 b. 255.255.255.252 c. 255.255.255.240 d. 255.255.254.0 e. 255.255.255.0

b

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.255.240? a. /26 b. /28 c. /27 d. /30 e. /29

b

Which of the following comparisons does a switch make when deciding whether a new MAC address should be added to its MAC address table? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It compares the VLAN ID to the bridging, or MAC address, table. d. It compares the destination IP address's ARP cache entry to the bridging, or MAC address, table.

b

Which of the following is required when configuring port security with sticky learning? a. Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand. b. Enabling port security with the switchport port-security interface subcommand. c. Defining the specific allowed MAC addresses using the switchport port-security mac-address interface subcommand. d. All the other answers list required commands.

b

In the URI http://www.certskills.com/ICND1, which part identifies the web server? a. http b. www.certskills.com c. certskills.com d. http://www.certskills.com e. The file name.html includes the hostname.

b B. Note that the hostname is all the text between the // and the /. The text before the // identifies the application layer protocol, and the text after the / represents the name of the web page.

A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN switch, and that 172.16.2.254 is already configured on the router connected to that same VLAN. The switch needs to support SSH con- nections into the switch from any subnet in the network. Which of the following commands are part of the required configuration in this case? (Choose two answers.) a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode. b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 con- figuration mode. c. The ip default-gateway 172.16.2.254 command in global configuration mode. d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be configured on interface VLAN 1.

b c

A switch's port Gi0/1 has been correctly enabled with port security. The configura- tion sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.) a. The switch puts the interface into an err-disabled state when the first frame arrives. b. The switch generates syslog messages about the violating traffic for the first frame. c. The switch increments the violation counter for Gi0/1 by 1. d. The switch discards both the first and second frame.

b c

An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch expected a password of mypassword from the Telnet user. The engi- neer then changed the configuration to support Secure Shell. Which of the following commands could have been part of the new configuration? (Choose two answers.) a. A username name secret password vty mode subcommand b. A username name secret password global configuration command c. A login local vty mode subcommand d. A transport input ssh global configuration command

b c

Which of the following are not valid Class A network IDs? (Choose two answers.) a. 1.0.0.0 b. 130.0.0.0 c. 127.0.0.0 d. 9.0.0.0

b c

A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/subnet. Which of the following answers list a workable combination for the number of network, subnet, and host bits? (Choose two answers.) a. Network = 16, subnet = 7, host = 7 b. Network = 16, subnet = 8, host = 8 c. Network = 16, subnet = 9, host = 7 d. Network = 8, subnet = 7, host = 17

b c B and C. At least 7 subnet bits are needed, because 2 6 = 64, so 6 subnet bits could not number 100 different subnets. Seven subnet bits could, because 2 7 = 128 => 100. Similarly, 6 host bits is not enough, because 2 6 − 2 = 62, but 7 host bits is enough, because 2 7 − 2 = 126 => 100. The number of network, subnet, and host bits must total 32 bits, making one of the answers incorrect. The answer with 8 network bits cannot be correct because the question states that a Class B network is used, so the number of network bits must always be 16. The two correct answers have 16 network bits (required because the question states the use of a Class B network), and at least 7 subnet and host bits each.

Which of the following commands list the MAC address table entries for MAC addresses configured by port security? (Choose two answers.) a. show mac address-table dynamic b. show mac address-table c. show mac address-table static d. show mac address-table port-security

b c B and C. IOS adds MAC addresses configured by the port security feature as static MAC addresses, so they do not show up in the output of the show mac address-table dynamic command. show mac address-table port-security is not a valid command.

Which of the following commands identify switch interfaces as being trunking inter- faces: interfaces that currently operate as VLAN trunks? (Choose two answers.) a. show interfaces b. show interfaces switchport c. show interfaces trunk d. show trunks

b c B and C. The show interfaces switchport command lists both the administrative and operational status of each port. When a switch considers a port to be trunking, this command lists an operational trunking state of "trunk." The show interfaces trunk command lists a set of interfaces: the interfaces that are currently operating as trunks. So, both of these commands identify interfaces that are operational trunks.

A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows: interface range gigabitethernet 0/1 - 24 switchport mode access switchport port-security switchport port-security mac-address sticky Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.) a. Prevents unknown devices with unknown MAC addresses from sending data through the switch ports. b. If a user connects a switch to the cable, prevents multiple devices from sending data through the port. c. Will allow any one device to connect to each port, and will save that device's MAC address into the startup-config. d. Will allow any one device to connect to each port, but will not save that device's MAC address into the startup-config.

b d

Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the fol- lowing are typically assigned an IP address in the same subnet as host A? (Choose two answers.) a. The local router's WAN interface b. The local router's LAN interface c. All other hosts attached to the same switch d. Other hosts attached to the same switch and also in VLAN 1

b d

In a two-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.) a. The design uses a full mesh of links between access and distribution switches b. The design uses a partial mesh of links between access and distribution switches c. The design uses a partial mesh of links between the distribution and core switches d. The end user and server devices connect directly to access layer switches

b d

Which of the following Ethernet standards support a maximum cable length of longer than 100 meters? (Choose two answers.) a. 100BASE-T b. 1000BASE-SX c. 1000BASE-T d. 1000BASE-LX

b d

Which of the following are true about IP address 172.16.99.45's IP network? (Choose two answers.) a. The network ID is 172.0.0.0. b. The network is a Class B network. c. The default mask for the network is 255.255.255.0. d. The number of host bits in the unsubnetted network is 16.

b d

Which of the following statements are true regarding the binary subnet ID, subnet broadcast address, and host IP address values in any single subnet? (Choose two answers.) a. The host part of the broadcast address is all binary 0s. b. The host part of the subnet ID is all binary 0s. c. The host part of a usable IP address can have all binary 1s. d. The host part of any usable IP address must not be all binary 0s.

b d

In the following line taken from a show interfaces fa0/1 command, which of the fol- lowing are true about the interface? (Choose two answers.) Full-duplex, 100Mbps, media type is 10/100BaseTX a. The speed was definitely configured with the speed 100 interface subcommand. b. The speed might have been configured with the speed 100 interface subcommand. c. The duplex was definitely configured with the duplex full interface subcommand. d. The duplex might have been configured with the duplex full interface subcommand

b d B and D. The show interfaces command lists the actual speed and duplex setting, but it does not imply anything about how the settings were configured or negotiated. The show interfaces status command lists a prefix of a- in front of the speed and duplex setting to imply that the setting was autonegotiated, leaving off this prefix if the setting was configured.

Which of the following installation steps are more likely required on a Cisco router, but not typically required on a Cisco switch? (Choose two answers.) a. Connect Ethernet cables b. Connect serial cables c. Connect to the console port d. Connect the power cable e. Turn the on/off switch to "on"

b e

A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the ten lowest numbered port, with those PCs working and sending data over the network. The other ports are not connected to any device. Which of the fol- lowing answers lists facts displayed by the show interfaces status command? a. Port Ethernet 0/1 is in a connected state. b. Port Fast Ethernet 0/11 is in a connected state. c. Port Fast Ethernet 0/5 is in a connected state. d. Port Ethernet 0/15 is in a notconnected state.

c

A fellow engineer tells you to configure the DHCP server to lease the last 100 usable IP addresses in subnet 10.1.4.0/23. Which of the following IP addresses could be leased as a result of your new configuration? a. 10.1.4.156 b. 10.1.4.254 c. 10.1.5.200 d. 10.1.7.200 e. 10.1.255.200

c

Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0? a. /19 b. /20 c. /23 d. /24 e. /25

c

Which of the following does a router normally use when making a decision about routing TCP/IP packets? a. Destination MAC address b. Source MAC address c. Destination IP address d. Source IP address e. Destination MAC and IP addresses

c

Which of the following functions is performed by both TCP and UDP? a. Windowing b. Error recovery c. Multiplexing using port numbers d. Routing e. Encryption f. Ordered data transfer

c

Which of the following is the resident subnet ID for IP address 10.7.99.133/24? a. 10.0.0.0 b. 10.7.0.0 c. 10.7.99.0 d. 10.7.99.128

c

Which of the following is the resident subnet for IP address 192.168.44.97/30? a. 192.168.44.0 b. 192.168.44.64 c. 192.168.44.96 d. 192.168.44.128

c

Which of the following is the subnet broadcast address for the subnet in which IP address 172.31.77.201/27 resides? a. 172.31.201.255 b. 172.31.255.255 c. 172.31.77.223 d. 172.31.77.207

c

Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incom- ing interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame's incoming interface to the source MAC entry in the MAC address table.

c

Working at the help desk, you receive a call and learn a user's PC IP address and mask (10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the follow- ing is true in this case? a. N=12 b. S=12 c. H=8 d. S=8 e. N=24

c

Which of the following are functions of a routing protocol? (Choose two answers.) a. Advertising known routes to neighboring routers b. Learning routes for subnets directly connected to the router c. Learning routes, and putting those routes into the routing table, for routes adver- tised to the router by its neighboring routers d. Forwarding IP packets based on a packet's destination IP address

c a

Which of the following are true about a LAN-connected TCP/IP host and its IP rout- ing (forwarding) choices? (Choose two answers.) a. The host always sends packets to its default gateway. b. The host sends packets to its default gateway if the destination IP address is in a different class of IP network than the host. c. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host. d. The host sends packets to its default gateway if the destination IP address is in the same subnet as the host.

c and b

Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what happens between Fred's web browser and the web server? (Choose two answers.) a. Messages flowing toward the server use UDP destination port 80. b. Messages flowing from the server typically use RTP. c. Messages flowing to the client typically use a source TCP port number of 80. d. Messages flowing to the server typically use TCP.

c d

Which answers describe a good practice in applying good troubleshooting method- ologies? (Choose two answers.) a. Perform problem isolation as fast as possible, including not slowing down to document your findings. b. The last step in a good troubleshooting process should be to take action to resolve the root cause of the problem. c. The last step in a good troubleshooting process should include monitoring the status to ensure that the problem is indeed solved and does not recur. d. Each worker should know and use the escalation process when they cannot resolve a particular problem.

c d

What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3? (Choose two answers.) a. L3PDU b. Chunk c. Segment d. Packet e. Frame f. L4PDU

c f

A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information from some other server device? a. ARP b. ping c. DNS d. None of these answers is correct.

c. DNS

Consider the following output from a Cisco Catalyst switch: SW1# show mac address-table dynamic Mac Address Table ------------------------------------------- Vlan Mac Address Type ---- ----------- -------- ----- Ports 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3 Which of the following answers are true about this switch? a. The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB. b. The switch has learned three MAC addresses since the switch powered on. c. The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch. d. 02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.

d

Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use TCP/IP? a. 0 b. 1 c. 2 d. 3 e. You cannot tell from the information provided.

d

What is the assignable range of values for the first octet for Class A IP networks? a. 0 to 127 b. 0 to 126 c. 1 to 127 d. 1 to 126 e. 128 to 191 f. 128 to 192

d

When thinking about an IP address using classful addressing rules, an address can have three parts: network, subnet, and host. If you examined all the addresses in one subnet, in binary, which of the following answers correctly states which of the three parts of the addresses will be equal among all addresses? (Choose the best answer.) a. Network part only b. Subnet part only c. Host part only d. Network and subnet parts e. Subnet and host parts

d

Which of the following is a network broadcast address? a. 10.1.255.255 b. 192.168.255.1 c. 224.1.1.255 d. 172.30.255.255

d

Which of the following statements is true about classless IP addressing concepts? a. Uses a 128-bit IP address b. Applies only for Class A and B networks c. Separates IP addresses into network, subnet, and host parts d. Ignores Class A, B, and C network rules

d

Which one answer gives the strongest match between one part of a typical three-tier design with the idea behind the listed generic topology design term? a. The access layer looks like a partial mesh. b. The distribution layer looks like a full mesh. c. The distribution layer looks like a hybrid design. d. The access layer looks like a star design.

d

Why does the formula for the number of hosts per subnet (2 H - 2) require the sub- traction of two hosts? a. To reserve two addresses for redundant default gateways (routers) b. To reserve the two addresses required for DHCP operation c. To reserve addresses for the subnet ID and default gateway (router) d. To reserve addresses for the subnet broadcast address and subnet ID

d

The show interfaces g0/1 switchport command on SW1 shows the trunking status on a link connected to switch SW2. Based on the output, which of the following must be true on SW2's port connected to this link? SW1# show interfaces gigabit0/1 switchport Name: Gi0/1 Switchport: Enabled Administrative Mode: trunk Operational Mode: trunk a. The operational state per show interfaces switchport must be "trunk." b. The administrative state per show interfaces switchport must be "trunk." c. SW2 must use the switchport mode trunk configuration command on G0/2, or the link will not use trunking. d. SW2 can use the switchport mode dynamic auto configuration command as one option to make the link use trunking.

d D. The show interface switchport command lists a switch's configured value of the switchport mode command as the administrative mode, telling us that SW1 uses the switchport mode trunk configuration command. The operation state shows the current working state (trunk). Of the four answers, one incorrect answer claims that SW2's operational state must also be "trunk"; however, one switch can use trunking while the other does not. Another answer claims that the administrative mode must be "trunk," which basically means that the switchport mode trunk command must be used. However, SW2 has a few other configuration options that would work, like the switchport mode dynamic desirable and switchport mode dynamic auto commands, with the correct answer referring to one of those commands (the switchport mode dynamic auto command).

Which of the following header fields identify which TCP/IP application gets data received by the computer? (Choose two answers.) a. Ethernet Type b. SNAP Protocol Type c. IP Protocol d. TCP Port Number e. UDP Port Number

d and e

PC1 and PC2 are on two different Ethernet LANs that are separated by an IP router. PC1's IP address is 10.1.1.1, and no subnetting is used. Which of the following addresses could be used for PC2? (Choose two answers.) a. 10.1.1.2 b. 10.2.2.2 c. 10.200.200.1 d. 9.1.1.1 e. 225.1.1.1 f. 1.1.1.1

d and f

In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5? a. User mode b. Enable mode c. Global configuration mode d. VLAN mode e. Interface configuration mode

e

Which of the following are not valid Class B network IDs? a. 130.0.0.0 b. 191.255.0.0 c. 128.0.0.0 d. 150.255.0.0 e. All are valid Class B network IDs.

e

Which of the following describes a way to disable IEEE standard autonegotiation on a 10/100 port on a Cisco switch? a. Configure the negotiate disable interface subcommand b. Configure the no negotiate interface subcommand c. Configure the speed 100 interface subcommand d. Configure the duplex half interface subcommand e. Configure the duplex full interface subcommand f. Configure the speed 100 and duplex full interface subcommands

f

devices that transmit on 3 and 6

hub, switch

transmits on 1 and 2

router, pc nic, wireless access point

Note that Cisco IOS does not have a command that erases the ___________ contents of the To clear out the _________________, simply erase the startup-config file, and then reload the switch, and the _______________ will be empty at the end of the process.

running- config file.

Port security provides an easy way to discover the MAC addresses used off each port using a feature called sticky secure MAC addresses. With this feature, port security learns the MAC addresses off each port and stores them in __________

the port security configuration (in the running-config file).

he default console port settings on a switch are as follows. Note that the last three parameters are referred to collectively as 8N1:

■ 9600 bits/second ■ No hardware flow control ■ 8-bit ASCII ■ No parity bits ■ 1 stop bit

Multiplexing relies on a concept called a socket. A socket consists of three things:

■ An IP address ■ A transport protocol ■ A port number

IEEE autonegotiation defines some rules (defaults) that nodes should use as defaults when autonegotiation fails—that is, when a node tries to use autonegotiation but hears nothing from the device. The rules:

■ Speed: Use your slowest supported speed (often 10 Mbps). ■ Duplex: If your speed = 10 or 100, use half duplex; otherwise, use full duplex.


Related study sets

Trigonometric Identities & Equations

View Set

ATI Fluid, Electrolyte, and Acid-Base Regulation

View Set

Business Finance Evaluation 4 Quiz Q&As

View Set

APCPS UNIT 9 Final Exam Review 2021

View Set

Chapter 1- Introduction to Supply Chain and Operations Management

View Set