Cisco study Guide
Which of the following is the wildcard (inverse) version of a /27 mask? 0.0.0.7 0.0.0.15 0.0.0.31 0.0.0.63 0.0.31.255
0.0.0.31
Which of the following represent valid ranges of access list numbers on a Cisco router for an Internet Protocol (IP) standard access list? (Choose all that apply.) 1 - 99 100 - 199 1300 - 1999 2000 - 2699 1200 - 1299
1 - 99 1300 - 1999
a list of access list number ranges and their respective protocols and types
1 - 99: IP standard access list 100 - 199: IP extended access list 300 - 399: DECnet access list 600 - 699: Appletalk access list 700 - 799: 48-bit MAC address access list 800 - 899: IPX standard access list 900 - 999: IPX extended access list 1000 - 1099: IPX SAP access list 1100 - 1199: Extended 48-bit MAC address access list 1200 - 1299: IPX summary address access list 1300 - 1999: IP standard access list (expanded range) 200 - 299: Protocol type-code access list 2000 - 2699: IP extended access list (expanded range)
Which statement correctly identifies a difference between Inter-Switch Link (ISL) and 802.1q? 1. 802.1q uses a native VLAN, ISL does not. 2. Cisco devices support only ISL. 3. ISL uses a 12-bit VLAN number field, and 802.1q does not. 4. ISL modifies the original Ethernet frame, while 802.1q encapsulates the original Ethernet frame.
1. 802.1q uses a native VLAN, ISL does not.
to secure the virtual terminal interfaces on a router, follow these steps
1. Configure a virtual terminal password. 2. Enable a login process on the virtual terminal interface. 3. Enter an access list and apply it to the virtual terminal interfaces with the access-class command.
You have multiple departments sharing a common network. You are concerned about network traffic from one department reaching another department. What would be a solution for isolating the departments? (Choose all that apply.) 1. Configure separate VLANs for each department. 2. Assign a unique VTP domain for each department. 3. Put each department in a separate collision domain. 4. Configure trunk links between departmental switches. 5. Configure separate subnets for each department
1. Configure separate VLANs for each department. 5. Configure separate subnets for each department
Which device will always have all of its ports in the same collision domain? 1. Hub 2. Bridge 3. Switch 4. Router
1. Hub
Which two statements are TRUE of Internet Protocol (IP) addressing? (Choose two.) 1. Public addresses are registered with the Internet Assigned Numbers Authority (IANA). 2. These addresses are publicly registered with the Internet Service Provider (ISP). 3. Through a public IP address, you can access another computer on the Internet, such as a Web server. 4. The ranges of public IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. 5. Private addresses are allocated by the Internet Assigned Numbers Authority (IANA).
1. Public addresses are registered with the Internet Assigned Numbers Authority (IANA). 3. Through a public IP address, you can access another computer on the Internet, such as a Web server.
Which VLAN can NOT be filtered through the VLAN Trunking Protocol (VTP) Pruning feature of Cisco switches? 1. VLAN 1 2. VLAN 10 3. VLAN 100 4. VLAN 1000
1. VLAN 1 Vlan 2-1000 can be pruned
Which option lists the given applications in the correct sequence of increasing bandwidth consumption? (In order least to greatest) an interactive Telnet session on a server running an SAP application a voice conversation between two IP phones while accessing an online video site a voice conversation between PC-based VoIP services
1. an interactive Telnet session on a server running an SAP application 2. a voice conversation between PC-based VoIP services 3. a voice conversation between two IP phones while accessing an online video site
the steps to configure a switch port as a protected port:
1. configure terminal 2. interface interface-id 3. switchport protected 4. end
Which command would be used to list the timers, version of spanning tree and the bridge ID of the local and designated switch for a specific VLAN on a Cisco Catalyst 2950 series switch? 1. show spanning-tree vlan vlan-id 2. show vlan database 3. show vlan vlan-id 4. show vlan brief
1. show spanning-tree vlan vlan-id
Which of the following represent valid ranges of access list numbers on a Cisco router for an Internet Protocol (IP) extended access list? 1 - 99 100 - 199 800 - 899 900 - 999 2000 - 2699
100 - 199 2000 - 2699
You have been assigned a network ID of 172.16.0.0/26. If you utilize the first network resulting from this ID, what would be the last legitimate host address in this subnet? 172.16.0.64 172.16.0.63 172.16.0.62 172.16.0.65
172.16.0.62
Which is the valid IP address range that can be assigned to hosts on the subnet that includes the address 172.16.4.6/23? 172.16.2.1 - 172.16.4.254 172.16.3.1 - 172.16.5.254 172.16.4.1 - 172.16.5.254 172.16.4.1 - 172.16.4.254
172.16.4.1 - 172.16.5.254
What is the valid host address range for the subnet 172.25.4.0 /23? 172.25.4.1 to 172.25.5.254 172.25.4.10 to 172.25.5.210 172.25.4.35 to 172.25.5.64 172.25.4.21 to 172.25.5.56
172.25.4.1 to 172.25.5.254
What is the broadcast address for subnet 172.25.4.0/23? 172.25.4.25 172.25.5.255 172.25.6.255 172.25.7.255
172.25.5.255
access-list 101 deny tcp 192.111.16.32 0.0.0.31 host 192.168.5.60 Disregarding the implicit deny at the end of the list, which of the following IP addresses will be blocked because of this single rule in the list ? (Choose all that apply. 192.111.16.67 192.111.16.38 192.168.5.60 192.111.16.49 192.168.111.14
192.111.16.38 192.111.16.49
Which two addresses are in the same subnet? (Choose two.) 192.168.1.55/26 192.168.1.85/26 192.168.1.45/26 192.168.1.203/26
192.168.1.55/26 192.168.1.45/26
A device has an address of 192.168.144.21 and a mask of 255.255.255.240. What will be the broadcast address for the subnet to which this device is attached? 192.168.144.23 192.168.144.28 192.168.144.31 192.168.144.32
192.168.144.32
In which of the following networks does the address 192.168.54.23/27 reside? 192.168.54.0 192.168.54.8 192.168.54.4 192.168.54.16
192.168.54.0
Which is the valid broadcast ID for the IP address 192.24.134.12 with a subnet mask of 255.255.255.128? 192.24.134.127 192.24.134.128 192.24.134.129 192.24.134.131
192.24.134.127
Which is NOT a valid range for private IP addresses? 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 192.255.255.255-193.0.0.0
192.255.255.255-193.0.0.0
You have a class C address range and are planning a network that has an average of 50 hosts per subnet. How many host bits will have to be borrowed for subnetting so that the maximum number of subnets can be implemented? 1 2 3 4 6
2
Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose all that apply.) 1. 10.6.8.35 2. 133.6.5.4 3. 192.168.5.9 4. 127.0.0.1 2. 190.6.5.4
2. 133.6.5.4 2. 190.6.5.4
What is the possible IP range that can be assigned to hosts on a subnet that includes the address 192.168.144.34/29? 1. 192.168.144.32 - 192.168.144.63 2. 192.168.144.33 - 192.168.144.38 3. 192.168.144.33 - 192.168.144.48 4. 192.168.144.28 - 192.168.144.40
2. 192.168.144.33 - 192.168.144.38
Which is the shortest possible notation of the following Internet Protocol version 6 (IPv6) address? 2001:0DB8:0000:0001:0000:0000:0000:F00D 1. 2001:DB8::1::F00D 2. 2001:DB8:0:1::F00D 3. 2001:DB8:0:1:0:0:0:F00D 4. 2001:0DB8:0:1::F00D
2. 2001:DB8:0:1::F00D
Which of the following statements describes split horizon? The router learns from its neighbor that a route has gone down, and the router sends an update back to the neighbor with an infinite metric to that route. 1. For a period of time, the router will ignore any route advertisements with a lower metric to a downed route. 2. A router will not send route information back out the same interface over which it was learned. 3. The moment a router determines a route has gone down, it will immediately send a route update with an infinite metric to that route. 4. The packets are flooded when a topology change occurs, causing network routers to update their topological databases and recalculate routes.
2. A router will not send route information back out the same interface over which it was learned.
Which of the following statements is TRUE about trunk ports? 1. A trunk port connects an end-user workstation to a switch. 2. A trunk port uses 802.1q to identify traffic from different VLANs. 3. A trunk port supports a single VLAN. 4. A trunk port uses a straight-through Ethernet cable when connecting two switches.
2. A trunk port uses 802.1q to identify traffic from different VLANs.
Which of the following fields are in a Transmission Control Protocol (TCP) header? (Choose three.) 1. Length 2. Sequence Number 3. Data Offset 4. Type-of-Service 5. Window
2. Sequence Number 3. Data Offset 5. Window
Which of the following is NOT a characteristic of private Internet Protocol (IP) addressing? 1. These addresses are not routable through the public Internet. 2. These addresses are publicly registered with the Internet Network Information Center (InterNIC). 3. These addresses are reserved by the Internet Assigned Numbers Authority (IANA). 4. The ranges of private IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
2. These addresses are publicly registered with the Internet Network Information Center (InterNIC).
Which of the following is NOT a mode of Dynamic Trunking Protocol (DTP)? 1. dynamic auto 2. dynamic trunk 3. dynamic desirable 4. nonegotiate
2. dynamic trunk
Which Cisco 2950 switch command or set of commands would be used to create a Virtual LAN (VLAN) named MARKETING with a VLAN number of 25? 1. switch(config)# vtp domain MARKETING 25 2. switch(config)# vlan 25 switch(config-vlan)# name MARKETING 3. switch(config-if)# vlan 25 name MARKETING 4. switch(config)# vtp 25 switch(config-vtp)# name MARKETING
2. switch(config)# vlan 25 switch(config-vlan)# name MARKETING
Look at these questions
21 19 17 14 10 4
Which of the following are NOT valid IPv6 addresses? (Choose all that apply) 225.1.4.2 ::10.2.4.1 :: 2001:0:42:3:ff::1 fe80:2030:31:24 2001:42:4:0:0:1:34:0 2003:dead:bef:4dad:ab33:46:abab:62
225.1.4.2 fe80:2030:31:24
Which of the following TCP port numbers is used by Simple Mail Transfer Protocol (SMTP)? 23 21 53 80 57 25
25
A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet. What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client? 255.255.255.0 255.255.255.128 255.255.255.224 255.255.255.252
255.255.255.0
You are the network administrator for your company. You have a Class B address range and are planning for a network that allows 150 hosts per subnet and at least 164 subnets. Which subnet mask should you use to accomplish the task? 1. 255.255.192.0 2. 255.255.255.192 3. 255.255.255.0 4. 255.255.255.252
3. 255.255.255.0
You are the network administrator for your company. You want to use both IPv6 and IPv4 applications in the network. You also want to ensure that routers can route both IPv6 and IPv4 packets. Which deployment model should be implemented to accomplish the task? 1. IPv6 over IPv4 tunnels 2. IPv6 over dedicated Wide Area Network (WAN) links 3. Dual-Stack Backbones 4. Protocol translation
3. Dual-Stack Backbones
Which statement is NOT true regarding Internet Control Message Protocol (ICMP)? 1. ICMP can identify network problems. 2. ICMP is documented in RFC 792. 3. ICMP provides reliable transmission of data in an Internet Protocol (IP) environment. 4. An ICMP echo-request message is generated by the ping command.
3. ICMP provides reliable transmission of data in an Internet Protocol (IP) environment.
Which statements are NOT true regarding Virtual Local Area Networks (VLANs)? (Choose two.) 1. VLANs define broadcast domains. 2. VLANs are logical groups of hosts. 3. VLANs are location-dependent. 4. VLANs are limited to a single switch. 5. VLANs may be subnets of major networks
3. VLANs are location-dependent. 4. VLANs are limited to a single switch.
Which command is used on the Cisco Catalyst 2950 series switch to configure a port as a VLAN trunk port? 1. switchport mode trunk 2. set trunk on 3. switchport trunk on 4. trunk mode on
3. switchport trunk on
With the following equipment list, which of the following network scenarios could be supported? Two IP subnets of 255.255.255.0 Seven 48-port switches Two router interfaces 300 workstations in a single broadcast domain, each workstation in its own collision domain 300 workstations, with 150 workstations in two broadcast domains and each workstation in its own collision domain 300 workstations, with 150 workstations in two broadcast domains and all workstations in the same collision domain 600 workstations, with 300 workstations in two broadcast domains and each workstation in its own collision domain
300 workstations, with 150 workstations in two broadcast domains and each workstation in its own collision domain
You are a network administrator for your organization. Your organization has two Virtual LANs, named Marketing and Production. All switches in the network have both VLANs configured on them. Switches A, C, F, and G have user machines connected for both VLANs, whereas switches B, D, and E have user machines connected to the Production VLAN only. To meet a new requirement, Marketing VLAN users must communicate with Production VLAN users and vice versa. What changes would be required for the network in this scenario? 1. Disable VTP pruning. 2. Convert all switch ports into trunk ports. 3. Create an access list with permit statements. 4. Install a routing device or enable Layer 3 routing on a switch.
4. Install a routing device or enable Layer 3 routing on a switch.
You are the network administrator for your company. You want to upgrade the network, which is currently running on IPv4, to a fully functional IPv6 network. During the transition, you want to ensure that hosts capable only of IPv6 can communicate with hosts capable only of IPv4 on the network. Which solution should you implement to accomplish the task in this scenario? 1. IPv6 over IPv4 tunnels 2. IPv6 over dedicated Wide Area Network (WAN) links 3. Dual-Stack Backbones 4. Protocol translation
4. Protocol translation
Which statement is true regarding Inter-Switch Link (ISL) frame tagging? 1. ISL uses a native VLAN. 2. ISL works with non-Cisco switches. 3. ISL adds a 26-byte trailer and 4-byte header. 4. The original Ethernet frame is not modified.
4. The original Ethernet frame is not modified.
Which command will display the Virtual LAN (VLAN) frame tagging method for a switch link? 1. show vlan 2. show vlan encapsulation 3. show vtp status 4. show interfaces trunk
4. show interfaces trunk
Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? (Choose three.) 1. An IPv6 address is divided into eight 16-bit groups. 2. A double colon (::) can only be used once in a single IPv6 address. 3. IPv6 addresses are 196 bits in length. 4. Leading zeros cannot be omitted in an IPv6 address. 5. Groups with a value of 0 can be represented with a single 0 in IPv6 address.
5. Groups with a value of 0 can be represented with a single 0 in IPv6 address. 2. A double colon (::) can only be used once in a single IPv6 address. 1. An IPv6 address is divided into eight 16-bit groups.
How many IP addresses are available for hosts in the 192.168.16.64 /26 subnet? 14 30 62 126
62
You are configuring an access list to permit Hypertext Transfer Protocol (HTTP) traffic based on the source and destination IP address of the devices. What access list (ACL), protocol, and port number will you configure to permit HTTP traffic? (Choose three.) 23 80 TCP UDP Standard Extended
80 TCP Extended
Which settings represent the proper BITs per second, data bits, and parity settings for a HyperTerminal session to the router? 19200,8,none 9600,8,none 9600,8, even 19200,8,even
9600,8,none
Which three statements are TRUE regarding a Local Area Network (LAN)? (Choose three.) A LAN is confined to one building or campus. A LAN can cover great distances. A LAN provides fast data transmission. A LAN is easily expandable. LANs require the use of a router to communicate between local hosts.
A LAN is confined to one building or campus. A LAN provides fast data transmission. A LAN is easily expandable.
A new trainee is setting up a router in a test lab, and he asks you to describe the use of the connector marked BRI on the router. Which is a correct use for this connecter? A WAN interface for a T1 connection A LAN interface to connect to a switch An interface to connect a console cable A WAN interface for an ISDN connection
A WAN interface for an ISDN connection
Which three statements are TRUE regarding static route assignments? (Choose three.) A single static route cannot respond to network outages. Static routes respond to network outages. Static routes are used to discover the network destinations automatically. Static routes are removed from the routing table if the interface goes down. Static routes are not removed from the routing table if the interface goes down. Static routes are manually configured on the router.
A single static route cannot respond to network outages. Static routes are removed from the routing table if the interface goes down. Static routes are manually configured on the router.
Which of the following accurately describes the purpose of a trunk? A trunk is used to carry traffic for a single VLAN and is typically used between switches. A trunk is used to carry traffic for a single VLAN and is typically used between a switch and an end-user device. A trunk is used to carry multiple VLANs and is typically used between switches. A trunk is used to carry multiple VLANs and is typically used between a switch and a server.
A trunk is used to carry multiple VLANs and is typically used between switches.
If you did not configure IP addresses, how is this information being passed between the two devices? The devices established a connection using default IP addresses. The ip unnumbered command has been issued, which means the interface does not require an IP address to be configured. CDP is a Layer 2 protocol and does not require IP addresses to be configured. CDP uses its own IP addressing system
CDP is a Layer 2 protocol and does not require IP addresses to be configured.
Which Ethernet LAN contention or access method listens for a signal on the channel before transmitting data, and stops transmitting if a collision is detected? CSMA/CA CSMA/CD CSMA/CB CSMA/CS
CSMA/CD
Which media access control method is used by Ethernet technology to minimize collisions in the network? CSMA/CD token passing back-on algorithm full-duplex
CSMA/CD
What two devices can be connected to a router WAN serial interface that can provide clocking? (Choose two.) CSU/DSU switch modem hub
CSU/DSU modem
operator
Can be applied to define how to interpret the value entered as port parameter. Common values include EQ (equal to the port specified), LT (less than the port number specified), and GT (greater than the port number specified).
wildcard-mask
Can be applied to further define the source. A wildcard mask can be used to control access to an entire IP network ID instead of a single IP address. A wildcard mask number 255 means "any" and the number 0 means "match exactly." The keyword host and any may also be used here to more quickly specify a single host or all hosts. The host keyword is the same as the wildcard mask 0.0.0.0. The any keyword is the same as the wildcard mask 255.255.255.255.
wildcard-mask:
Can be used to further define the destination IP addressing.
How would you stop an unauthorized user from establishing a Telnet connection to your router? (Choose two.) Configure an access control list and apply it to the virtual terminal lines using the ip access-group command. Configure a console login process and password. Configure an access control list and apply it to the virtual terminal lines using the access-class command. Configure a virtual terminal login process and password.
Configure an access control list and apply it to the virtual terminal lines using the access-class command. Configure a virtual terminal login process and password.
Which of the following situations could cause a switch to enter initial configuration mode upon booting? Corrupt or missing image file in flash memory Corrupt or missing configuration file in NVRAM memory Corrupt or missing configuration file in flash memory Corrupt or missing configuration file in ROM memory
Corrupt or missing configuration file in NVRAM memory
Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selecting the route to the destination? Data Link Network Application Transport
Data Link
Which of the following can be described as a structured collection of records in a central location? E-mail Web browser Telnet Collaboration Database
Database
Which two statements are TRUE of default routes? (Choose two.) Default routes are used for routing packets destined only for networks that are listed in the routing table. Default routes are used for routing packets destined for networks that are not listed in the routing table. Default routes should not be used in a stub network. Default routes are ideal for use in stub networks. Network security is increased by using default routes.
Default routes are used for routing packets destined for networks that are not listed in the routing table. Default routes are ideal for use in stub networks.
access-list
Denotes an access list
Which service is denoted by TCP/UDP port number 53? Domain Name Service (DNS) File Transfer Protocol (FTP) Telnet HTTP
Domain Name Service (DNS)
Which three are risks that a DoS attack poses to a network? (Choose three.) Downtime and productivity loss Spread of viruses Revenue loss Information theft Spread of spyware
Downtime and productivity loss Revenue loss Information theft
Which of these applications uses the IMAP protocol to transfer information between a server and a host? E-mail FTP Web browser Telnet
Which cable can suffer attenuation if it is bent beyond the minimum bend radius? UTP STP Co-axial Fiber optic
Fiber optic
Protects the network from unauthorized access attempts
Firewall
Regenerates signal when it passes through its ports
Hub
Which organization manages and distributes global public IP addresses? IANA IETF ISP IEEE
IANA
You execute the ping command from a host, but the router does not have a path to its destination. Which of the following ICMP message types will a client receive from the router? ICMP redirect ICMP time exceeded ICMP destination unreachable ICMP echo-reply
ICMP destination unreachable
Which Internet Control Message Protocol (ICMP) message is sent by a host in the network to test connectivity with another host? ICMP redirect message ICMP echo-request message ICMP time-exceeded message ICMP destination-unreachable message
ICMP echo-request message
Which trunk encapsulation defines one VLAN on each trunk as a native VLAN? ISL IEEE 802.1q IEEE 802.11a auto
IEEE 802.1q
Which of the following protocols are used in Voice over IP (VoIP) transmissions? (Choose three.) TCP IP UDP RTP ICMP
IP UDP RTP
Which of the following methods of tunneling Internet Protocol version 6 (IPv6) traffic through an IPv4 network increases protocol overhead because of IPv6 headers? Protocol translation IPv6 over dedicated WAN links Dual-Stack Backbones IPv6 over IPv4 tunnels
IPv6 over IPv4 tunnels
Which of the following statements are TRUE regarding Cisco access lists? (Choose two.) In an inbound access list, packets are filtered as they enter an interface. In an inbound access list, packets are filtered before they exit an interface. Extended access lists are used to filter protocol-specific packets. You must specify a deny statement at the end of each access list to filter unwanted traffic. When a line is added to an existing access list, it is inserted at the beginning of the access list.
In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol-specific packets.
Which type of IP address is a registered IP address assigned by the Internet Service Provider (ISP), and represents one or more inside local IP addresses externally? Inside local address Outside local address Inside global address Outside global address
Inside global addres
Which three statements are TRUE regarding Network Address Translation (NAT)? (Choose three.) It connects different Internet Service Providers (ISPs). It can act as an address translator between the Internet and a local network. It conserves IP addresses. It creates additional IP addresses for the local network. It helps the local network connect to the Internet using unregistered IP addresses
It can act as an address translator between the Internet and a local network. It conserves IP addresses. It helps the local network connect to the Internet using unregistered IP addresses.
Which two are TRUE of straight-through cable? (Choose two.) The wires on the cable are crossed over. It is also known as a patch cable. You can connect two routers using a straight-through cable. You can connect a hub to a switch using a straight through cable. You can connect a switch to a router using a straight through cable.
It is also known as a patch cable. You can connect a switch to a router using a straight through cable.
Two catalyst switches on a LAN are connected to each other with redundant links and have Spanning Tree Protocol (STP) disabled. What problem could occur from this configuration? It may cause broadcast storms. All ports on both switches may change to a forwarding state. It may cause a collision storm. These switches will not forward VTP information.
It may cause broadcast storms.
Which statement is TRUE of the CSMA/CD Ethernet media access method? It requires centralized monitoring and control. It is ideal for a switched network environment. It uses a back-off algorithm to calculate a random time value. Each station is allotted a time slot in which they can transmit data.
It uses a back-off algorithm to calculate a random time value.
Which of the following statements is NOT true regarding flow control? It determines the rate at which the data is transmitted between the sender and receiver. It can help avoid network congestion. It manages the data transmission between devices. It uses a cyclic redundancy check (CRC) to identify and remove corrupted data
It uses a cyclic redundancy check (CRC) to identify and remove corrupted data.
Which two are the limitations of the service password-encryption command? (Choose two.) It uses the MD5 algorithm for password hashing. It uses the Vigenere cipher algorithm. An observer cannot read the password when looking at the administrator's screen. The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
It uses the Vigenere cipher algorithm. The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
Which two fields are present in the output of the show ip interface brief command? (Choose two.) YES? Helper address OK? Method Proxy ARP
OK? Method
Which layer in the Open Systems Interconnection (OSI) model enables coding and conversion functions for application layer data? Presentation layer Session layer Application layer Physical layer
Presentation layer
The command ping R2 fails when executed from R1. What command(s) would allow R1 to ping R2 by name? R1(config)#int S1 R1(config-if)#no ip address 192.168.5.5 R1(config-if)# ip address 192.168.5.9 255.255.255.252 R1(config)#no ip host R1 R1(config)# ip host R2 192.168.5.6 255.255.255.252 R1(config)#no hostname R2 R1(config)# hostname R1 R2(config)#int S1 R1(config-if)#no ip address 192.168.5.5 R1(config-if)# ip address 192.168.5.9 255.255.255.0
R1(config)#no ip host R1 R1(config)# ip host R2 192.168.5.6 255.255.255.252
Which of the following is a classful routing protocol? RIPv1 EIGRP BGPv4 RIPv2
RIPv1
Which type of Category 5 unshielded twisted-pair (UTP) cable is used to work as a trunk between two switches? RJ-45 straight-through RJ-41 crossover RJ-11 straight-through RJ-45 crossover
RJ-45 crossover
Used to connect separate networks and network types
Router
There are 62 private hosts that need Internet access using the private network 10.4.3.64 /26, and all of them will be translated into the public IP address of the serial interface. Which of the following NAT configurations will allow all 62 hosts to have simultaneous Internet access? Router(config)# ip nat pool POOLNAME 10.4.3.64 /26 Router(config)# interface s0 Router(config-if)# ip nat inside source 1 pool POOLNAME overload Router(config)# access-list 1 permit 10.4.3.64 0.0.0.127 Router(config)# interface s0/0 Router(config-if)# ip nat source list 1 pool POOLNAME overload Router(config)# access-list 1 permit 10.4.3.64 /26 Router(config)# ip nat inside source list 1 interface serial 0 Router(config)# access-list 1 permit 10.4.3.64 0.0.0.63 Router(config)# ip nat inside source list 1 interface serial 0 overload
Router(config)# access-list 1 permit 10.4.3.64 0.0.0.63 Router(config)# ip nat inside source list 1 interface serial 0 overload
Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0? Router(config)# router ospf 1 Router(config-router)# network 192.168.10.0 0.0.0.255 area 0 Router(config)# router ospf 1 Router(config-router)# network 192.168.11.0 0.0.0.255 area 0 Router(config)# router ospf 1 Router(config-router)# network 192.168.10.0 255.255.255.0 area 0 Router(config)# router ospf 1 Router(config-router)# network 192.168.10.0 0.0.255.255 area 0
Router(config)# router ospf 1 Router(config-router)# network 192.168.10.0 0.0.0.255 area 0
You need to set the Telnet password to "john" on a Cisco router. Which set of commands would you use? Router(config)#line vty 0 4 Router(config-line)#login Router(config-line)#password john Router(config)#line con 0 Router(config-line)#login Router(config-line)#password john Router(config)#line vty 0 4 Router(config-line)#login Router(config-line)#enable secret john Router(config)#line con 0 Router(config-line)#login Router(config-line)#enable password john
Router(config)#line vty 0 4 Router(config-line)#login Router(config-line)#password john
Which of the following topologies is used in Wide Area Networks (WANs)? FDDI CDDI SONET Token Ring
SONET
destination
Specifies the destination IP addressing information.
port
Specifies the port number. Common port numbers include 21 (FTP), 23 (Telnet), 25 (SMTP), 53 (DNS), 69 (TFTP), and 80 (HTTP).
protocol
Specifies the protocol that will be filtered in the access list. Common values are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
source
Specifies the source IP addressing information.
Provides a separate connection for each node in a companies internal network.
Switch
Which of the following represents the correct method of assigning an IP address and default gateway to a switch? Switch(config)# interface vlan1 Switch(config-if)# ip address 10.0.0.1 255.0.0.0 Switch(config-if)# default-gateway 10.0.0.254 Switch(config)# ip default-gateway 10.0.0.254 Switch(config)# interface vlan1 Switch(config-if)# ip address 10.0.0.1 255.0.0.0 Switch(config)# ip address 10.0.0.1 255.0.0.0 Switch(config)# default-gateway 10.0.0.254 Switch(config)# ip address 10.0.0.1 255.0.0.0 Switch(config)# interface vlan1 Switch(config)# ip default-gateway 10.0.0.254
Switch(config)# ip default-gateway 10.0.0.254 Switch(config)# interface vlan1 Switch(config-if)# ip address 10.0.0.1 255.0.0.0
Which two statements are TRUE regarding switching? (Choose two.) 1. Switching refers to the movement of information from a source to a destination in an internetwork. 2. Switching connects Local Area Networks (LANs). 3. Switching reduces collisions in a segment. 4. Switching occurs at Layer 3 in the Open System Interconnection (OSI) model. 5. The switching process uses a MAC address table to find the segment on which a datagram needs to be sent.
Switching reduces collisions in a segment. The switching process uses a MAC address table to find the segment on which a datagram needs to be sent.
1 Router# configure terminal 2 Router(config)# interface S0 3 Router(config)# ip address 192.168.5.5 4 Router(config-if)# enable interface 5 Router(config-if)# description T1 to Raleigh What part(s) of this submission are incorrect? (Choose all that apply.) The prompt is incorrect on line 1 The IP address is missing a subnet mask The prompt is incorrect on line 5 The prompt is incorrect on line 3 The command on line 4 is incorrect The prompt is incorrect on line 4 The description command must be executed before the interface is enabled
The IP address is missing a subnet mask The prompt is incorrect on line 3 The command on line 4 is incorrect
Which statement is TRUE regarding the switchport protected interface configuration command and its effects? The command is used to configure private VLAN edge ports. The command enables the highest level switch port security. All the traffic through protected port should go via a Layer 2 device such as switch. A protected port can directly communicate with any other port on the same switch.
The command is used to configure private VLAN edge ports
Which of the following statements are true of Class C IP addresses? (Choose 3) The decimal values of the first octet can range from 192 to 223 The decimal values of the first octet can range from 1 to 126 The first octet represents the entire network portion of the address The first three octets represent the entire network portion of the address The value of the first binary place in the first octet must be 0 The value of the first two binary places in the first octet must be 11
The decimal values of the first octet can range from 192 to 223 The first three octets represent the entire network portion of the address The value of the first two binary places in the first octet must be 11
He tells you that there are four different routes to the same network in different routing databases. He asks you which of the routes will be used to populate the routing table. What will your answer be, assuming that all routing protocols are set at the default administrative distance? The route with an R next to it The route with an S next to it The route with a C next to it The route with an I next to it
The route with a C next to it
Based on the interface configuration provided, which two statements are TRUE? (Choose two.) Router-A# show running-configuration s0/0 interface serial0/0 description connected to router A IP address 10.10.10.1 255.0.0.0 encapsulation frame-relay shutdown clock rate 64000 The router's serial interface is connected using a DTE cable. The router's serial interface is connected using a DCE cable. The router's serial interface is administratively down. The router's serial interface connects using the point-to-point protocol.
The router's serial interface is connected using a DCE cable. The router's serial interface is administratively down.
When transmitting to a remote destination, what two things will occur after a host has determined the IP address of the destination to which it is transmitting? (Choose two.) The sending host will perform an ARP broadcast in its local subnet using the IP address of the destination host. The sending host will perform an ARP broadcast in its local subnet using the IP address of the local router interface. The local router interface will respond with the MAC address of the destination host. The local router interface will respond with its own MAC address. The destination host will respond with its own MAC address.
The sending host will perform an ARP broadcast in its local subnet using the IP address of the local router interface. The local router interface will respond with its own MAC address.
Which two statements are TRUE of synchronous serial ports? (Choose two.) These ports can be used to provide leased-line or dial-up communications. These ports do not support the High-Level Data Link Control (HDLC) encapsulation method. An AUI connector is used with serial ports. These ports can be used to configure high-speed lines (E1 or T1). An RJ-45 connector is used with serial ports.
These ports can be used to provide leased-line or dial-up communications. These ports can be used to configure high-speed lines (E1 or T1).
access-list-number
This can be a number between 100 and 199, which is used to denote an extended IP access list.
What are the three types of Internet Protocol version 6 (IPv6) addresses? (Choose three.) Unicast Broadcast Dual-cast Anycast Multicast
Unicast Anycast Multicast
Which two modes are Cisco Internetwork Operating System (IOS) operating modes? (Choose two.) User Privileged mode User EXEC mode Local configuration mode Global configuration mode NVRAM monitor mode
User EXEC mode Global configuration mode
Which of the following splits the network into separate broadcast domains? bridges VLANs switches hubs
VLANs
What does show startup-config do?
View the configuration information stored in NVRAM
What does show running-config do?
View the current configuration information on the terminal
What does show version do?
View the software and hardware on a routing device
What does show interface do?
View the statistics for all interfaces on the router
You would like to be able to Telnet from WS2 to all three of the switches in the diagram below for management purposes. Which of the devices will need to be configured with a default gateway? (Choose all that apply.) Connections are as follows: WS2--SW1--SW2--R1--SW3 WS2 SW1 SW2 R1 SW3
WS2 SW2
permit|deny
Will allow (permit) or disallow (deny) traffic specified in the access list.
Which statement best describes a converged network? a network with real-time applications a network with a mix of voice, video, and data traffic a network with a mix of voice and video traffic a network with mix of data and video traffic
a network with a mix of voice, video, and data traffic
You are purchasing a device to upgrade your network. You need to determine the type of device required, as well as the number and type of required interfaces. The device will host three LAN subnets and a T1 Internet connection. Which of the following device and interface combinations will support this requirement without providing any unnecessary interfaces or using subinterfaces? a switch with one Ethernet interface and three serial interfaces a router with one serial interface and three Ethernet interfaces a router with one serial interface and one Ethernet interface a switch with one modem and three serial interfaces
a router with one serial interface and three Ethernet interfaces
You want to restrict incoming and outgoing connections between a VTY and the address in an access list. Which Cisco Internetwork Operating System (IOS) command should you use to accomplish the task? access-list vty access-list remark ip access-group access-class
access-class
Which access list statement will permit all HTTP sessions to subnet 192.168.144.0/24 containing Web servers? access-list 110 permit udp any 192.168.144.0 eq 80 access-list 10 permit tcp 192.168.144.0 255.255.255.0 eq www access-list 110 permit tcp any 192.168.144.0 0.0.0.255 eq 80 access-list 10 permit udp any 192.168.144.0 255.255.255.0 eq 80 access-list 110 permit tcp 192.168.144.0 0.0.0.255 any eq 80 access-list 110 permit tcp any 192.168.144.0 0.0.0.0 any eq 80 access-list 110 permit tcp any 192.168.144.0 0.0.0.255 any eq 23 access-list 110 permit tcp 192.168.144.0 0.0.0.255 192.168.144.0 0.0.0.255 any eq 80
access-list 110 permit tcp any 192.168.144.0 0.0.0.255 eq 80
Which command will allow host 192.168.144.25 to have Telnet access to network 172.16.0.0? access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 21 access-list 15 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23 access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23 access-list 150 permit udp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
Which Wide Area Network (WAN) switching technology is used by Asynchronous Transfer Mode (ATM)? packet switching virtual switching circuit switching cell switching
cell switching
Which Cisco IOS command allows you to change the setting of the configuration register? boot config configuration-register edit config-register edit configuration-register
config-register
Which Cisco IOS command will enable a switch to copy the configuration from NVRAM to its RAM? copy tftp flash copy running-config flash copy startup-config flash copy startup-config running-config copy running-config startup config
copy startup-config running-config
Which Cisco IOS command enables a router to copy IOS images to a router? copy tftp flash copy flash tftp copy running-config tftp copy running-config startup-config copy tftp running-config
copy tftp flash
Which of the following should be a characteristic of the core layer in the Cisco three-layer hierarchical model? redundant components emphasis on high speed PoE QoS
emphasis on high speed
Which Cisco IOS command is used to configure a password for privileged EXEC mode that will be encrypted when viewing the configuration file.? enable password enable cypher enable secret enable password secret
enable secret
What is the purpose of frame tagging in Virtual LAN (VLAN) configurations? inter-VLAN routing encryption of network packets frame identification over trunk links frame identification over access links
frame identification over trunk links
Which feature is NOT provided by flow control? buffering windowing full duplex transmission source-quench messaging
full duplex transmission
What is the term used for the Ethernet communication mechanism by which hosts can send and receive data simultaneously? full-duplex multiplex half-duplex duplex
full-duplex
You receive the following error message after addressing and enabling an interface: %192.168.16.0 overlaps with FastEthernet0/0 Which two are NOT the causes of the error message? (Choose two.) incorrect subnet mask in the new interface incorrect IP address on the new interface incorrect encapsulation configured failure to issue the no shutdown command
incorrect encapsulation configured failure to issue the no shutdown command
Which of the following NAT terms refers to a registered address that represents an inside host to an outside network? inside global outside global inside local outside local
inside global
The ip nat command is broken down as follows: inside: list 1: interface serial 0: overload:
inside: indicates that packets received on the inside (private) interface will be translated list 1: specifies that access list 1 will be used to determine which private IP addresses will be translated interface serial 0: specifies that NAT will translate private IP addresses into the IP address of the serial 0 interface overload: allows NAT to reuse the IP address of the serial interface for all private IP addresses, providing them simultaneous access to the Internet
You are creating a configuration to use on a switch. The configuration must enable you to remotely manage the switch. What commands should you use in order?
interface vlan 1 ip address 192.168.20.244 255.255.255.240 no shutdown exit ip default-gateway 192.168.20.241 line vty 0 15 password cisco login exit
Which Cisco Internetwork Operating System (IOS) command is used to define an access list by name? ip access-list ip access list ip access-group access-list
ip access-list
A router is running a classful routing protocol. Which command will enable this router to select a default route when routing to an unknown subnet of a network for which it knows the major network? ip classless no ip classless auto-summary no auto-summary
ip classless
Which of the following is the correct command to define a default route using a gateway address of 172.16.0.254? ip default-route 172.16.0.254 255.255.0.0 ip route 0.0.0.0 0.0.0.0 172.16.0.254 default-gateway 172.16.0.254 ip route default 172.16.0.254
ip route 0.0.0.0 0.0.0.0 172.16.0.254
Which of the following statements is (are) true with regard to frame relay? (Choose all that apply.) it allows for a router with a single WAN connection to host multiple virtual circuits it sends data in fixed size calls it uses Layer 2 addresses called DLCIs it is an example of cell switching
it allows for a router with a single WAN connection to host multiple virtual circuits it uses Layer 2 addresses called DLCIs
You are advising a client on the options available to connect a small office to an ISP. Which of the following is an advantage of using an ADSL line? it uses the existing cable TV connection it uses the existing phone line you receive a committed information rate ( CIR) from the provider the upload rate is as good as the download rate
it uses the existing phone line
Which Cisco IOS command is used to activate MD5 authentication on a Transmission Control Protocol (TCP) connection between two Border Gateway Protocol (BGP) peers? service password-encryption neighbor password key-string authentication MD5 BGP
neighbor password
Which command can be issued at the following prompt? Router(config-router)# show interface network interface ip default-gateway
network
Which command is used to disable Cisco Discovery Protocol (CDP) on a Cisco router? disable cdp no cdp run no cdp enable no cdp advertise-v2
no cdp run
You are the network administrator for your company and have configured Cisco Discovery Protocol (CDP) in your network. You recently noticed that when devices send large numbers of CDP neighbor announcements, some devices are crashing. You decide to disable CDP on the router. Which command should you use to achieve the objective? no cdp run set cdp disable no cdp enable no cdp advertise-v2
no cdp run
Which of the following features is used with the ip nat inside command to translate multiple devices in the internal network to the single address in the IP address pool? static override overload dynamic
overload
Which Cisco IOS command would prompt for input in the following format? Protocol [ip]: Target IP address: 10.1.1.1 Repeat count [5]: Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y Source address or interface: 192.142.23.10 Type of service [0]: Set DF bit in IP header? [no]: Validate reply data? [no]: Data pattern [0xABCD]: Loose, Strict, Record, Timestamp, Verbose[none]: Sweep range of sizes [n]: Type escape sequence to abort ping 10.1.1.1 ping traceroute tracert
ping
Which command(s) is based on Internet Control Messaging Protocol (ICMP)? ping telnet ftp ipconfig /all tracert arp-a
ping tracert
Which Cisco IOS command can be issued on a router to test the connectivity of one interface from another interface on the same router? ping ( with no address specified) ping (with an address specified) tracert traceroute
ping ( with no address specified)
What layer are these tools used on? ping show interfaces telnet show cdp neighbor ftp
ping = layer 3 show interfaces = layer 2 telnet = layer 7 show cdp neightbor = layer 2 ftp = layer 7
Which device creates broadcast domains and enables communication across separate broadcast domains? router switch hub access points
router
Which prompt indicates the configuration mode at which Cisco IOS debug commands can be issued? router> router# router(config)# router(config-if)#
router#
You want to restrict all hosts from accessing a Web site at IP address 172.16.201.56. Which command should be executed to implement an access list on the router that will accomplish the task? router(config)# access-list 190 deny tcp any host 172.16.201.56 eq 80 router# access-list 190 deny tcp any host 172.16.201.56 eq 80 router(config)# access-list 190 deny udp any host 172.16.201.56 eq 80 router(config)# access-list 90 deny tcp any host 172.16.201.56 eq 80 router(config)# access-list 190 deny tcp any host 172.16.201.56 eq 20 router(config)# access-list 190 deny tcp any host 172.16.201.56 eq 21
router(config)# access-list 190 deny tcp any host 172.16.201.56 eq 80
Which command would be used to establish static translation between an inside local address and an inside global address? Router(config)# ip nat inside source static local-ip global-ip Router(config)# ip source nat inside static local-ip global-ip Router(config)# ip nat inside static source local-ip global-ip Router(config)# ip nat static inside source local-ip global-ip
router(config)# ip nat inside source static local-ip global-ip
Which command would be used to establish static translation between an inside local address 192.168.144.25 and an inside global address 202.56.63.102? router(config)#ip nat inside source static 192.168.144.25 202.56.63.102 router(config)#ip source nat inside static local-ip 192.168.144.25 global-ip 202.56.63.102 router(config)#ip nat static inside source 192.168.144.25 202.56.63.102 router(config)#ip nat inside static source 192.168.144.25 202.56.63.102
router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
Which Cisco Internetwork Operating System (IOS) command is used to apply an access list to an interface? router(config)# ip access-group router(config-if)# ip access-group router(config)# ip access-list router(config-if)# ip access-list
router(config-if)# ip access-group
Which Cisco IOS command is used to view the information about the interfaces on which Cisco Discovery Protocol (CDP) is enabled? show cdp interface show interfaces show cdp show cdp interfaces
show cdp interface
Which two are NOT valid Cisco IOS commands used for Cisco Discovery Protocol (CDP)? (Choose two.) show cdp show cdp entry * show cdp neighbor entries show cdp neighbors detail show cdp devices
show cdp neighbor entries show cdp devices
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater DeviceID Local Intrfce Holdtme Capability Platform Port ID lab-7206 Eth 0 157 R 7206VXR Fas 0/0/0 lab-as5300-1 Eth 0 163 R AS5300 Fas 0 lab-as5300-2 Eth 0 159 R AS5300 Eth 0 lab-as5300-3 Eth 0 122 R AS5300 Eth 0 lab-as5300-4 Eth 0 132 R AS5300 Fas 0/0 lab-3621 Eth 0 140 R S 3631-telco Fas 0/0 008024 2758E0 Eth 0 132 T CAT3000 1/2 Which Cisco IOS command would produce this output? show cdp neighbors show cdp neighbors detail show cdp traffic show cdp
show cdp neighbors
Which Cisco IOS Cisco Discovery Protocol (CDP) command displays the IP address of the directly connected Cisco devices? show cdp show cdp devices show cdp traffic show cdp neighbors detail
show cdp neighbors detail
You want to view output regarding all of the neighboring devices discovered by CDP. This information should include the network address, enabled protocols, and hold time. Which Cisco Internetwork Operating System (IOS) command would allow you to accomplish this task? show cdp show cdp entry show cdp neighbor entries show cdp neighbors detail
show cdp neighbors detail
Which of the following commands will let you see the current operating mode for a switch port? show interface fastethernet0/1 detail show controllers fastethernet0/1 show interface fastethernet0/1 status show interfaces fastethernet0/1 switchport
show interfaces fastethernet0/1 switchport
Which command would you use to see which interfaces are currently operating as trunks? show interface switchports show trunk interface show interfaces trunk show switchport trunk
show interfaces trunk
Which commands could you use to verify that a newly created access list that prevents Telnet and ICMP access to a server is set on the router? (Choose all that apply.) show ip interface show access-lists show access-group show ip access lists
show ip interface show access-lists
Which Cisco IOS command will display the following partial output? Codes: I - IGRP derived, R - RIP derived, O - OSPF derived, C - Connected, S - static, E - EGP derived, B - BGP derived, * - candidate default route, IA - OSPF inter area route, i - IS-IS derived, ia - IS-IS, U - per-user static route, o - on-demand routing, M - mobile, P - periodic downloaded static route, D - EIGRP, EX - EIGRP external, E1 - OSPF external type 1 route, E2 - OSPF external type 2 route, N1 - OSPF NSSA external type 1 route, N2 - OSPF NSSA external type 2 route Gateway of last resort is 10.30.10.85 to network 10.71.0.0 E 168.28.0.0 [140/8] via 10.212.215.122, 0:03:34, serial0/0 E 172.43.0.0 [140/8] via 10.145.231.221, 0:43:54, Ethernet 2 show ip show ip route show ip route summary show route summary
show ip route
Which Cisco IOS command would you use to troubleshoot IP addressing problems? ipconfig /all show config show running-config show config-file
show running-config
Which Cisco IOS command is used on a Cisco Catalyst 6500 series switch to view the spanning-tree protocol (STP) information for a virtual LAN (VLAN)? show spanning tree show spanning-tree vlan show spantree show spantree vlan
show spanning-tree vlan
From which of the following attacks can Message Authentication Code (MAC) shield your network? DoS DDoS spoofing SYN floods
spoofing
Router(config)# ip access-list {standard | extended} access-list-name
standard: Specifies an standard IP access list. extended: Specifies an extended IP access list. access-list-name: Specifies the name of the access list.
Which type of switching process requires a switch to wait for the entire frame to be received before forwarding it to a destination port? store and forward cut-through fragment free frame-forward
store and forward
Which of the following cables would be used to connect a router to a switch? v.35 crossover rollover straight-through
straight-through
With which type of service is bandwidth and latency the biggest consideration? streaming video telnet sessions FTP transfers VOIP phone calls
streaming video
Which subnet is IP address 172.16.5.2 /23 a member of, and what is the broadcast address for that subnet? subnet: 172.16.4.0, broadcast: 172.16.5.255 subnet: 172.16.5.0, broadcast: 172.16.5.255 subnet: 172.16.2.0, broadcast: 172.16.5.255 subnet: 172.16.0.0, broadcast: 172.16.7.255
subnet: 172.16.4.0, broadcast: 172.16.5.255
You need to provide network connectivity to 200 client computers that will reside in the same sub network, and each client computer must be allocated dedicated bandwidth. Which device should you use to accomplish the task? router hub switch firewal
switch
The conference room has a switch port available for use by the presenter during classes. You would like to prevent that port from hosting a hub or switch. Which of the following commands could be used to prevent that port from hosting a hub or switch? switchport port-security maximum switchport port-security mac address sticky switchport port-security mac address switchport port-security
switchport port-security
Which Cisco IOS interface configuration command is used to configure the private VLAN edge ports on a Cisco Catalyst 2950 switch? switchport protected switchport port-security switchport port-vlan-edge switchport port-security violation
switchport protected
On a Cisco 2950 switch, which status LED and color combination indicates a Power On Self Test (POST) failure? system LED: no color system LED: solid red system LED: solid amber stat LED: no color stat LED: green
system LED: solid amber
You are the network administrator for your company. You have installed a new router in your network. You want to establish a remote connection from your computer to the new router so it can be configured. You are not concerned about security during the remote connection. Which Cisco IOS command should you use to accomplish the task? ssh telnet terminal virtual
telnet
File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) work at which layer in the Open Systems Interconnection (OSI) model? the Session layer the Presentation layer the Application layer the Network layer
the Application layer
At which layer in the Open Systems Interconnection (OSI) model does flow control generally operate? the Network layer the Transport layer the Physical layer the Session layer
the Transport layer
Router78(config)#interfce Serial0 ^ %invalid input detected at '^' marker. Which of the following could be a reason for receiving this message? the command syntax is incorrect the interface type does not exist on this router the command is entered at the wrong prompt the interface is configured already
the command syntax is incorrect (interface)
Which of the following statements are true with regard to the network shown in the exhibit? (Click the Exhibit(s) button. there is one broadcast domain and one collision domain there is one broadcast domain and four collision domains there are two broadcast domains and two collision domains there are two broadcast domains and four collision domains the hosts in VLAN2 could use IP addresses 192.168.5.5/24 and 192.168.6.5/24 the hosts in VLAN1 could use IP addresses 192.168.5.4/24 and 192.168.5.5/24 and the hosts in VLAN2 could use IP addresses 192.168.6.1/24 and 192.168.6.2/24 the hosts in VLAN2 could use IP addresses 192.168.5.5/24 and 192.168.6.5/24 the hosts in VLAN1 could use IP addresses 192.168.5.4/24 and 192.168.5.5/24 and the hosts in VLAN2 could use IP addresses 192.168.5.1/24 and 192.168.5.2/24
there are two broadcast domains and four collision domains the hosts in VLAN1 could use IP addresses 192.168.5.4/24 and 192.168.5.5/24 and the hosts in VLAN2 could use IP addresses 192.168.6.1/24 and 192.168.6.2/24
You want information on the routes taken by packets so that you are able to identify the network points where packets are getting dropped. Which Cisco IOS command should you use to accomplish this task in the most efficient manner? tracert traceroute extended ping ping
traceroute
You are configuring an authenticated connection between two routers named Tacoma and Lansing. The connection on the Lansing end is correctly set up with a password of keypass. You are directing an assistant to configure the name and password on Tacoma. Which of the following commands would be correct to complete this authenticated connection? username Tacoma password keypass username Lansing keypass password username Tacoma keypass password username Lansing password keypass
username Lansing password keypass