EMU IT150/IA150 Networking -- Bemus Final

Ace your homework & exams now with Quizwiz!

You have created a named access list called BlockSales. Which of the following is a valid command for applying this to packets trying to enter interface Fo0/0 of your router?

(config-if)# ip access-group BlockSales in

On a VLSM network, which mask should you use on point-to-point WAN Links in order to reduce the wast of IP addresses?

/30

Which mask should you use on Point-to-point links in order to reduce the waste of IP address

/30

Which of the following is the wildcard (inverse) version of a /27 mask?

0.0.0.31

Which of the following network address correctly summarizes the three networks shown below efficiently? 10.0.0.0.16 10.1.0.0/16 10.2.0.0/16

10.0.0.0/14

Which of the following are private IP addresses? (Choose two)

10.0.0.1 192.168.24.43

In the network shown in the diagram, how many computers could be in Network B?

14

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this interface

172.16.112.0

Your router has the following IP address on the LAN interface: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?

172.16.2.255 172.16.3.0

What is the subnetwork address of a host with IP address of 172.16.66.0/21

172.16.64.0

Which of the following is the best summarization of the following networks: 192.168.128.0 through 192.168.159.0

192.168.128.0/19

You need to configure a server that is on the subnet 192.168.19..24/29. The router has the first available host address. which of the following should you assign to the server?

192.168.19.26 255.255.255.248

You have an interface on a router with the IP address of 192.168.192.10/29. what is the broadcast address the hosts will use on this LAN?

192.168.192.15

Which of the following hexadecimal numbers converts to 28 in decimal

1c

What is the subnetwork address for a host with the IP address 200.10.5.68/28

200.10.5.64

Which of the following is an example of a multicast address?

224.0.0.0

You have a network in your data center that needs 310 hosts. Which mask should you use so you wast the least amount of addresses?

255.255.254.0

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

30

You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many host IP address can there be on the LAN attached to the router interface?

6

What protocol is used to find the hardware address of a local device?

ARP

_____________________ on an Ethernet network is the retransmission delay that's enforced when a collision occurs.

Backoff

What issue arises when redundancy exists between switches shown below:

Broadcast storm

Which class of IP address provides a maximum of only 254 host addresses per network ID?

Class C

In the following diagram, in order to have IP address that's as efficient as possible, which network should use a /29 mask?

D

What network service is the most likely problem if you can ping a computer by IP address but not by name?

DNS

When configuring a terminal emulation program, which of the following is an incorrect setting?

Data bit: 1

What is the effect of this single-line access list? access-list 110 deny ip 172.16.10.0 0.0.0.255 host 1.1.1.1

Denies all traffic

what is the most common attack on a network today?

Dos

In the Ethernet II frame shown here, what is the function of the section labeled "FCS"?

Error Detection

What cable type is shown in the following graphic?

Fiber Optic

Which of the following is NOT an issue address by STP?

Gateway redundancy

Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process?

Gratuitous ARP

Which of the following services are ONLY TCP? (Choose two)

HTTP FTP

On which type of device could the situation shown in the diagram occur?

HUB

If a host is configured with an incorrect default gateway and all the other computers and router are known to be configured correctly, which of the following statements is TRUE?

Host A can communicate with other hosts in the same subnet.

What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI Model?

Host-to-host

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do to your network?

Implement IDS/IPS

what does the command confreg 0x2142 provide?

It is used to bypass the configuration in NVRAM.

Which of the following describe the DHCP discover message? (choose two)

It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. It uses UDP as the transport layer protocol.

The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?

NVRAM should be erased and the router restarted.

In the accompanying graphic, what is the name for the section of the MAC address marked as unknown?

OUI

Which of the following is true regarding access lists applied to an interface?

One access list may be configured, per direction, for each layer 3 protocol configured on an interface

you type the following command into the switch and receive the following output: Switch# show fastethernet 0/1

Part of the command is missing

Which of the following troubleshooting steps, if completed successfully, also confirms that the other steps will succeed as well?

Ping a remote computer.

The output of the show running-config command comes from

RAM

What cable type used the pinout arrangement shown below?

Rolled

The cable used to connect to the console port on a router or switch is called a _____________ Cable.

Rollover

Which of the following Application layer protocols sets up a secure session that's similar to Telnet?

SSH

In the diagram shown, what will the switch do if a frame with a destination MAC address of 000a.f467.63b1 is received on fa0/4 (Choose 3)

Send the frame out of Fa0/5 Send the frame out of Fa0/3 Send the frame out of Fa0/6

______________________ is the loop avoidance mechanism used by switches.

Spanning Tree Protocol (STP)

Which of the following prompts indicates that the switch is currently in privileged mode?

Switch#

Which of the following commands will configure all the default VTY port on a switch?

Switch(config)# line vty 0 4

What command do you type to save the configuration stored in RAM to NVRAM?

Swith# copy run start

You have your laptop directly connected to a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful?

TFTP server software must be running on your laptop. The laptop must be on the same subnet as the router's ethernet interface. The copy flash tftp command must be supplied the ip address of the laptop.

What is the problem with an interface if you type show interface g0/1 and receive the following message? Gigabit 0/1 is administratively down, line protocol is down

The administrator has the interface shut down

What must happen if a DHCP IP conflict occurs?

The administrator must fix the conflict by hand at the DHCP server.

what will be the effect of executing the following command on port F0/1 switch(config-if)# switchport port-security mac-address 00C0.35F0.8301

The command statically defines the MAC address of 00c0.35f0.8301

You type the following into the router and reload. what will the router do? Router (config)# boot system flash c2800nm-advsecurityk9-mz.151-4.M6.bin Router (config)# config-register 0x2101 Router (config)# do sh ver [output cut] configuration register is 0x2102 (Will be 0x2101 at next reload)

The router will load the mini-IOS from the ROM.

Which of the following statements is FALSE with regard to Ethernet?

There are very few collisions in full-duplex mode.

To use VLSM, what capability must the routing protocols in use possess?

Transmission of subnet mask information

Which of the following statements is FALSE when a packet is being compared to an Access List?

Untill all lines have been analyzed, the comparison is not over

If you wanted to deny all Telnet connections to only network 192.168.10.0, which command would you use?

access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23

Which access list will permit all HTTP sessions to network 192.168.144.0/24 containing web servers?

access-list 110 permit tcp any 192.168.144.0 0.0.0.255 eq 80

Which command will copy the IOS to a backup host on your network?

copy flash tftp

Which command loads a new version of the Cisco IOS into a router?

copy tftp flash

Which of the following commands sets the privileged mode password to Cisco and encrypts the password?

enable secret Cisco

Which command will delete the contents of NVRAM on a switch?

erase startup-config

On which default interface have you configured an IP address for a switch?

int vlan 1

Which command will show you the IOS version running on your router.

sh version

A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both current and new images?

show flash

what router command allows you to determine whether an IP access list is enabled on a particular interface?

show ip interfaces

Which command determines the licenses that are active on your system along with several status variables?

show license

Which Cisco IOS command is used to verify the port security configuration of a switch port?

show port-security interface

Which command displays the configuration register settings?

show version

Which command is required to disable the port of a security violation occurs?

switchport port-security violation shutdown

You type Switch# show r and receive a % ambiguous command error. Why did you receive this message?

there is more than one show command that starts with the letter r

Which of the following commands displays the networks traversed on a path to a network destination?

traceroute

Which of the following commands are required when configuring SSH on your router? (Choose Two)

username <name> password <password> IP domain-name <name>


Related study sets

Chapter 12: The Supply of and Demand for Productive Resources

View Set

Microbiology by Bauman Chapter 9 Q & A

View Set

Chapter 12 Oncologic Disorders Prep U

View Set

Chapter 4: Ancient India and China

View Set

questions for laws of Thermodynamics

View Set

PrepU Ch 37: Management of Patients with Musculoskeletal Trauma

View Set

Genetics Chapter 15 - Gene Regulation in Eukaryotes I: Transcriptional and Translational R

View Set

Tardive Dyskinesia & Tourette's Syndrome

View Set

Final Introduction to Computer Applications EHS

View Set