NET 126 Routing & Switching Essentials v6 | Chapters 1-10 Quizzes & Exams

Ace your homework & exams now with Quizwiz!

Refer to the exhibit. Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?

A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2

REFER TO THE EXHIBIT. What media issue might exist on the link connected to Fa0/1 based on the show interface command?

There could be too much electrical interference and noise on the link.

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router?

This message is a level 5 notification message. This message indicates that service timestamps have been configured.

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

broadcast DHCPREQUEST

Refer to the exhibit. What two commands will change the next-hop address of the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2?

A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2 A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2

An administrator issues the commands: Router(config)# interface g0/1 Router(config-if)# ip address dhcp What is the administrator trying to achieve?

Configuring the router to obtain IP parameters from a DHCPv4 server

What is the destination address in the header of a broadcast frame?

FF-FF-FF-FF-FF-FF

In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host?

IP Address Subnet Mask Default Gateway

OPEN THE PT ACTIVITY. PERFORM THE TASKS IN THE ACTIVITY INSTRUCTIONS AND THEN ANSWER THE QUESTION. Which PCs will receive the broadcast sent by PC-C?

PC-D, PC-E

A production switch is reloaded and finished with a Switch> prompt. What two facts can be determined?

POST occurred normally. A full version of the Cisco IOS was located and loaded.

What is a possible cause of runt Ethernet frames when a switch is being used?

Malfunctioning NIC

Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access plan 30 is entered on the Fa0/11 interface, what will happen?

Port Fa0/11 will be returned to VLAN 1

What is the purpose of port forwarding?

Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN.

When a customer purchases a Cisco IOS 15.0 software package, what serves as the receipt for that customer and is used to obtain the license as well?

Product Variation Key

On a switch that is configured with multiple VLANs, which command will remove only VLAN 100 from the switch?

Switch(config)# no vlan 100

Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

console

OPEN THE PT ACTIVITY. PERFORM THE TASKS IN THE ACTIVITY INSTRUCTIONS AND THEN ANSWER THE QUESTION. Which ping command from PC0 to PC1 completes successfully?

ping 192.168.2.3

A network technician is configuring port security on switches. The interfaces on the switch are configured in such a way that when a violation occurs, packets with unknown source addresses are dropped and no notification is sent. Which violation mode is configured on interfaces?

protect

Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

recursive static route

Which command produced the following output? R1# 10 permit 192.168.1.56 0.0.0.7 20 permit 192.168.1.64 0.0.0.63 (4 match(es)) 30 deny any (8 match(es))

show access-lists

FILL IN THE BLANK. The ________ command displays the VLAN assignment for all ports as well as the existing VLANs on the switch.

show vlan

Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach 10.10.0.0/16 network?

1

REFER TO THE EXHIBIT. A switch receives a Layer 2 frame that contains a source MAC address of 000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Place the switch steps in teh order they occur. 1) 2)

1) The switch adds the source MAC address to the MAC address table. 2) Because the destination is not known, the switch forwards the frame out all ports except the port through which the frame arrived.

Refer to the exhibit. Fill in the blank. On R1, the command to configure a static route to network 172.16.2.0 by specifying the next-hop IP address ip route 172.16.2.0 255.255.255.0 ________.

192.168.2.2

A company has several networks with the following IP address requirements: IP phones - 50, PCs - 70, IP cameras - 10, Wireless Access points - 10, Network Printers - 10, Network Scanners - 2. Which block of addresses would be the minimum to accommodate all of these devices if each type of devices was on its own network?

172.16.0.0/24

To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in running configuration file to identify this network?

192.168.5.0

What network address and subnet mask combination would be used to create a default static route that matches any IPv4 destination?

0.0.0.0 0.0.0.0

PT Activity. When PC0 pings the webserver, which MAC address is the source MAC address in the frame from R2 to the web server?

0001.C972.4202

What is the factory default setting for the configuration register on Cisco routers?

0x2102

Fill in the blank. In IPv6, all routes are level ________ ultimate routes.

1

REFER TO THE EXHIBIT. FILL IN THE BLANK. How many broadcast domains are in the topology?

1

Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?

10.120.160.0 to 10.120.167.255

Refer to the exhibit. Which address or addresses represent the inside global address?

209.165.20.25

FILL IN THE BLANK. Using legacy inter-VLAN routing, how many physical router interfaces have to be configured to support 5 VLANs?

5

What is the major release number in the IOS image name c1900-universalk9-mz.SPA.152-3.T.bin?

15

An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?

100

What is the bandwidth utilization efficiency of full-duplex Ethernet?

100%

A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?

172.16.45.2

Refer to the exhibit. A company has an internal network of 192.168.10.0/24 for their employee workstations and a DMZ network of 192.168.3.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT?

192.168.10.35

Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?

192.168.12.16

Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?

2

Refer to the exhibit. NAT is configured on R1 and R2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between R2 and the web server?

209.165.200.245

A college offers classes at a nearby naval base where a remote switch is located. In order for network administrators at the college main office to manage a remote switch for SSH traffic, which destination port number should be opened and tracked on the college firewall?

22

What is the destination IP address when an IPv4 host sends a DCHPDISCOVER message?

255.255.255.255

Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?

5

REFER TO THE EXHIBIT. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many sub interfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

4

Which service is provided by an automated attendant feature on a converged network?

Call routing

Fill in the blank. Use a number. The syslog protocol uses UDP port ________ to send event notification messages across IP networks to even message collectors.

514

How long is the evaluation license period for Cisco IOS Release 15.0 software packages?

60 days

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

REFER TO THE EXHIBIT. How many broadcast domains are displayed?

8

A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?

A 192.168.14.0/26 route that is learned via RIP

Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?

A cable has not been attached to the port.

What is a collapsed core in a network design?

A combination of the functionality of the distribution and core layers.

A network administrator is asked to provide the UDI in order to obtain a license for the DATA technology package for the IOS 15.0 on a Cisco 1900 router. What is a UDI?

A combination of the product ID. the serial number, and the hardware version.

Which solution would help a college alleviate network congestion due to collisions?

A high port density switch

A destination route in the routing table is indicated with a code D. Which kind of route entry is this?

A route dynamically learned through the EIGRP routing protocol

REFER TO THE EXHIBIT. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0. What conclusion can be drawn based on the partial output in the exhibit?

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

Which type of standard ACL is easiest to modify on a production router?

A named ACL that has not been applied yet.

A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing?

A router with at least two LAN interfaces should be used.

If an organization is changing to include Cisco IP phones in its network, what design feature must be considered to ensure voice quality?

A separate VLAN is needed for voice traffic.

Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify?

A standard access list numbered 1 was used as part of the configuration process. Two types of NAT are enabled. Address translation is working.

A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?

A switch with a port that is configured as a trunk is needed when connecting to the router.

Fill in the blank. An ________ permits or denies traffic through a router based on specific defined criteria.

ACL (Access-list)

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is removed from the running configuration.

What are two uses of an access control list?

ACLs provide a basic level of security for network access. ACLs can control which areas a host can access on a network.

What are the three layers of the switch hierarchical design model?

Access Core Distribution

MATCH THE FUNCTIONS TO THE CORRESPONDING LAYERS Access Layer 1) 2) Distribution Layer 1) 2) Core Layer 1) 2)

Access Layer 1) Represents the network edge 2) Provides network access to the user Distribution Layer 1) Implements network access policy 2) Establishes Layer 3 routing boundaries Core Layer 1) Provides high-speed backbone connectivity 2) Functions as an aggregator for all the campus blocks

Refer to the exhibit. Router R1 is configured for PAT. What is a possible reason that the addresses in the network are not translated?

Access-list 1 is misconfigured.

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

Access-list 1 permit 192.168.10.96 0.0.0.31

What single access list statement matches all of the following networks? 192.168.16.0 192.168.17.0 192.168.18.0 192.168.19.0

Access-list 10 permit 192.168.16.0 0.0.3.255

REFER TO THE EXHIBIT. The PC that is attached to port Fa0/1 is sending a packet that has the destination MAC address of 0050.0fae.299c. Based on the current S1 MAC address table, what will S1 do first when the packet arrives at the switch?

Add the MAC address of the PC that is attached to Fa0/1 to the MAC address table.

Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?

Add the ipv6 dhcp relay command to interface Fa0/0

Which statement is true about broadcast and collision domains?

Adding a switch to a network will increase the size of the broadcast domain.

What is a basic function of the Cisco Borderless Architecture distribution layer?

Aggregating Layer 3 routing boundaries.

Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?

All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.

REFER TO THE EXHIBIT. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are not able to send traffic to workstations on SW2. What could be done to remedy the problem?

Allow VLAN 20 on the trunk link.

What is the purpose of the passive-interface command?

Allows a router to receive routing updates on an interface but not send updates via that interface

Which three statements accurately describe VLAN types? (Choose three).

An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic. After the initial boot of an unconfigured switch, all ports are members of the default VLAN. A management VLAN is any VLAN that is configured to access management feature of the switch.

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. Which ACL is required to be configured in order for this command to function?

An access list that is numbered 4 that defines the private addresses that are affected by NAT.

Which three statements describe ACL processing of packets?

An implicit deny any rejects any packet that does not match any ACE. A packet can either be rejected or forwarded as directed by the ACE that is matched. Each statement is checked only until a match is detected or until the end of the ACE list.

Which impact does adding a Layer 2 switch have on a network?

An increase in the size of the broadcast domain.

Which type of route will require a router to perform a recursive lookup?

An ultimate route that is using a next hop IP address on a router that is not using CEF

Refer to the exhibit. How did the router obtain the last route that is shown?

Another router in the same organization provided the default route by using a dynamic routing protocol.

Fill in the blank. Do not use abbreviations. NAT overload is also known as ________.

Port Address Translation

Which scenario would cause an ACL misconfiguration and deny all traffic?

Apply an ACL that has all deny ACE statements.

MATCH THE ACTION TO THE CORRESPONDING COMMAND. Assigns VLAN 10 for untagged traffic. Activates the current interface as trunk. Prohibits LVAN 10 on the trunk interface.

Assigns VLAN 10 for untagged traffic - Switch(config-if)#switchport trunk native vlan 10 Activates the current interface as trunk - Switch(config-if)#switchport mode trunk Prohibits LVAN 10 on the trunk interface - Switch(config-if)#switchport trunk allowed vlan remove 10

Which dynamic routing protocol was developed to interconnect different Internet service providers?

BGP

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?

Between two switches that utilize multiple VLANs Between a switch and a server that has an 802.1Q NIC

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

Boot System

What is different between IPv6 routing table entries compared to IPv4 routing table entries?

By design IPv6 is classless so all routes are effectively level 1 ultimate routes

Which two route source codes are automatically created within a routing table whenever a router interface is configured with an IP address and activated?

C L

Which route would be automatically created when a router interface is activated and configured with an IP address?

C 192.168.0.0/24 is directly connected fastethernet0/0

Which statement is true about CDP on a Cisco device?

CDP can be disabled globally or on a specific interface.

Which address does a DHCPv4 server target when sending a DHCPOFFER message to a client that makes an address request?

Client hardware address

A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?

Clients must use all configuration information that is provided by a DHCPv6 server.

A network administrator has configured VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?

Connect a host to an interface associated with VLAN 99.

What is the primary purpose of NAT?

Conserve IPv4 addresses

What is used as the default event logging destination for Cisco routers and switches?

Console Line

Which two requirements are used to determine if a route can be considered as an ultimate route in a router's routing table?

Contain an exit interface Contain a next-hop IP address

FILL IN THE BLANK A ________ network is one that uses the same infrastructure to carry voice, data, and video signals.

Converged

After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?

Copy the running configuration to the startup configuration.

MATCH THE FORWARDING CHARACTERISTIC TO ITS TYPE Cut-Through 1) 2) 3) Store-And-Forward 1) 2) 3)

Cut-Through 1) Appropriate for high performance computing applications 2) Forwarding process can begin after receiving the destination address. 3) May forward invalid frames Store-And-Forward 1) Error checking before forwarding 2) Forwarding process only begins after receiving the entire frame. 3) Only forwards valid frames

Refer to the exhibit. This network has two connections to the ISP, one via router C and on via router B. The serial link between router A and router C supports EIGRP and is the primary link to the Internet. If the primary link fails, the administrator needs a a floating static route that avoids recursive route lookups and any potential next-hop issues caused by the multiaccess nature of the Ethernet segment with router B. What should the administrator configure?

Create a fully specified static route pointing to Fa0/0 with an AD of 95.

Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?

Cut-through

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface?

DAD

Which three software packages are available for Cisco IOS Release 15.0?

DATA Security Unified Communications

In addition to IPBase, what are the three technology packs that are shipped within the universal Cisco IOS Software Release 15 image?

DATA Security Unified Communications

Which DHCP IPv4 message contains the following information? Destination address: 255.255.255.255 Client IPv4 address: 0.0.0.0 Default gateway address: 0.0.0.0 Subnet mask: 0.0.0.0

DHCPDISCOVER

As a DHCPv4 client lease is about to expire, what is the message that the client sends the DHCP server?

DHCPREQUEST

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

DHCPREQUEST

A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After the workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?

DHCPv6 INFORMATION-REQUEST

Match the dynamic routing protocol component to the characteristic.

Data Structures: tables or database that are stored in RAM Routing Protocol Messages: Exchanges routing information and maintains accurate information about networks Algorithm: A finite list of steps used to determine the best path

What are two of the required steps to configure PAT?

Define a pool of global addresses to be used for overload translation. Identify the inside interface.

Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

Defines which addresses can be translated.

What is one function of a Layer 2 switch?

Determines which interface is used to forward a frame based on the destination MAC address.

MATCH THE LINK STATE TO THE INTERFACE AND PROTOCOL STATUS. Disabled Layer 1 Problem Layer 2 Problem Operational

Disabled - Administratively Down Layer 1 Problem - Down/Down Layer 2 Problem - Up/Down Operational - Up/Up

What is a definition of a two-tier LAN network design?

Distribution and core layers collapsed into one tier, and the access layer on a separate tier.

What is a disadvantage of using router-on-a-stick inter-VLAN routing?

Does not scale well beyond 50 VLANs.

A company designs its network so that the PCs in the internal network are assigned IP addresses from DHCP servers, and the packets that are sent to the Internet are translated through a NAT-enabled router. What type of NAT enables the router to populate the translation table from a pool of unique public addresses, as the PCs send packets through the router to the Internet?

Dynamic NAT

Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?

Dynamic allocaiton

Which two statements are true regarding switch port security?

Dynamically learned secure MAC addresses are lost when the switch reboots. If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

What two methods can be used to generate an interface ID by an IPv6 host that is using SLAAC?

EUI-64 Random Generation

A network designer must provide a rationale to a customer for a design which will move enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice?

Easier to provide redundant links to ensure higher availability. Simpler deployment for additional switch equipment.

What is the effect of using the switch port port-security command?

Enables port security on an interface.

What is a disadvantage when both sides of a communication use PAT?

End-to-end IPv4 traceability is lost

What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?

Enter the switchport access vlan 3 command in interface configuration mode.

Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?

Extended Star

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF 255.255.255.255

Which destination IP address is used when an IPv6 host sends a DHCPv6 SOLICIT message to locate a DHCPv6 server?

FF02::1:2

MATCH THE BORDERLESS SWITCHED NETWORK GUIDELINE DESCRIPTION TO THE PRINCIPLE Allows intelligent traffic load sharing by using all network resources. Allows seamless network expansion and integrated service enablement on an on-demand basis. Facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier. Satisfies user expectation for keeping the network always on.

FLEXIBILITY - Allows intelligent traffic load sharing by using all network resources. HIERARCHICAL - Facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier. MODULARITY - Allows seamless network expansion and integrated service enablement on an on-demand basis. RESILIENCY - Satisfies user expectation for keeping the network always on.

True or False? A standard ACL filters network traffic based on the destination MAC address.

False

Which three statements are generally considered to be best practices in the placement of ACLs?

Filter unwanted traffic before it travels onto a low-bandwidth link. Place extended ACLs close to the source IP address of the traffic. Place standard ACLs close to the destination IP address of the traffic.

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?

Fixed configuration

In which location are the normal range VLANs stored on a Cisco switch by default?

Flash memory

Refer to the following output. What is the significance of the 4 match(es) statement? R1# <output omitted> 10 permit 192.168.1.56 0.0.0.7 20 permit 192.168.1.64 0.0.0.63 (4 match(es)) 30 deny any (8 match(es))

Four packets have been allowed through the router from PCs in the network of 192.168.1.64.

Which statement correctly describes how a LAN switch forwards frames that it receives?

Frame forwarding decisions are based on MAC address and port mappings in the CAM table.

Match each statement with the example subnet and wildcard that it describes.

Hosts in a subnet with the subnet mask 255.255.252.0 - 192.168.5.0 0.0.3.255 All IP address bits must match exactly - host 192.168.15.2 The first valid host address in a subnet - 192.168.15.65 255.255.255.240 Subnetwork addresses of a subnet with 14 valid host addresses - 192.168.15.144 0.0.0.15 Addresses with a subnet mask of 255.255.255.248 - 192.168.3.64 0.0.0.7

OPEN THE PT ACTIVITY. PERFORM THE TASKS IN THE ACTIVITY INSTRUCTIONS AND THEN ANSWER THE QUESTION. FILL IN THE BLANK. Do not use abbreviations. What is the missing command on S1?

IP Address 192.168.99.2 255.255.255.0

Beginning with the Cisco IOS software Release 15.0, which license is a prerequisite for installing additional technology pack lineses?

IPBase

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

If the LED is green, the port is operating at 100 Mb/s.

Which statement describes a difference between the operation of inbound and outbound ACLs?

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

What are two advantages of modular switches over fixed-configuration switches?

Increased scalability Need for fewer power outlets

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames?

Ingress port Destination MAC address

What is a function of the distribution layer?

Interconnection of large-scale networks in wiring closets

Refer to the exhibit. A technician is configuring R2 for static NAT to allow the client to access the web server. What is a possible reason that the client PC cannot access the web server?

Interface S0/0/0 should be identified as the outside NAT interface.

Which action will bring an error-disabled switch port back to an operational state?

Issue the shutdown then then no shutdown interface commands.

What is the major benefit of using NAT with Port Address Translation?

It allows many internal hosts to share the same public IPv4 address.

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?

It allows only VLAN 30 on Fa0/5.

What is the purpose of entering the command ip nat inside source static tcp 192.168.10.2 80 209.165.200.223 8080 at the global configuration prompt?

It binds the inside local address and local port to the specified inside global address and global port.

What is an advantage of configuring a Cisco router as a relay agent?

It can provide relay services for multiple UDP services

What is the purpose of the network command when configuring RIPv2 as the routing protocol?

It identifies the interfaces that belong to a specified network.

What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP?

It is a SOHO or home broadband router.

What is correct in relation to NAT for IPv6?

It is a temporary mechanism to assist in the migration from IPv4 to IPv6.

What statement describes a Cisco IOS image with the "universalk9_npe" designation for Cisco ISR G2 routers?

It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.

Which network device can serve as a boundary to divide a Layer 2 broadcast domain?

Router

A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.

Which statement accurately describes dynamic NAT?

It provides an automated mapping of inside local to inside global IP addresses.

What are two benefits of NAT?

It saves public IP addresses It adds a degree of privacy and security to a network.

How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method?

It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address.

A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.

Which method is used by a PAT-enabled router to send incoming packets to the correct inside hosts?

It uses the destination TCP or UDP port number on the incoming packet.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which code is displayed on the web browser?

It works!

Refer to the exhibit. Which two types of routes could be used to describe the 192.168.200.0/30 route?

Level 2 child route Ultimate route

What are two license states would be expected on a new Cisco router once the license has been activated?

License State: Active, In Use License Type: Permanent

Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features?

License accept end user agreement

REFER TO THE EXHIBIT. Which implementation of inter-VLAN routing does this topology use?

Router-on-a-stick

What is the first action in the boot sequence when a switch is powered on?

Load a power-on-self-test program

Refer to to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.

An administrator issued the following commands on router R1. R1(config)# logging 192.168.10.2 R1(config)# logging trap 5 What conclusion can be drawn from this configuration?

Messages with severity level of 6 or higher appear only on the router console output.

Identifies the value assigned to reach the remote network.

Metric

REFER TO THE EXHIBIT. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Modify the transport input command.

When the appropriate switch form factor for a network is being determined, what type of switch should be selected when future expansion is important and cost is not a limiting factor?

Modular switch

Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

NAT-POOL2 is not bout to ACL 1

Which two statements are true about NTP servers in an enterprise network?

NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time stamp on logging and debugging information.

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

Native

Which function is supplied by the access layer in a three-layer network design?

Network access

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

No shutdown

Refer to the exhibit. The NAT configuration applied to the router is as follows: ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255 ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224 ERtr(config)# ip nat inside source list 1 pool corp overload ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4 ERtr(config)# interface gigabitethernet 0/0 ERtr(config-if)# ip nat inside ERtr(config-if)# interface serial 0/0/0 ERtr(config-if)# ip nat outside Based on the configuration and the output shown, what can be determined about the NAT status within the organization?

Not enough information is given to determine if both static and dynamic NAT are working.

When would it be more beneficial to use static routing instead of dynamic routing protocols?

On a network where dynamic updates would pose a security risk.

When would it be more beneficial to use a dynamic routing protocol instead of static routing?

On a network where there is a lot of topology changes

If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

On the half-duplex end of the connection.

On which router should the show access-lists command be executed?

On the router that has the ACL configured.

Which statement describes a syslog server characteristic?

One advantage of viewing syslog messages on a syslog server is the ability to perform detailed searches through the data.

Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

Outbound on the R1 G0/1 interface

Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?

PAT using an external interface.

An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?

Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED.

OPEN THE PT ACTIVITY. PERFORM THE TASKS IN THE ACTIVITY INSTRUCTIONS AND THEN ANSWER THE QUESTION. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

REFER TO THE EXHIBIT. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Which two statements are true about using full-duplex Fast Ethernet?

Performance is improved with bidirectional data flow. Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.

What is an advantage of deploying IPv4 NAT technology for internal hosts in an organization?

Provides flexibility in designing the IPv4 addressing scheme.

A network administrator is configuring a static NAT on the border router for a web server located in the DMZ network. The web server is configured to listen on TCP port 8080. The web server is paired with the internal IP address of 192.168.5.25 and the external IP address of 209.165.200.230. For easy access by hosts on the Internet, external users do not need to specify the port when visiting the web server. Which command will configure the static NAT?

R1(config)# ip nat inside source static tcp 192.168.5.25 8080 209.165.200.230 80

Which series of commands will cause access list 15 to restrict Telnet access on a router?

R1(config)# line vty 0 4 R1(config)# access-class 15 in

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

Refer to the exhibit. A network administrator wants to create a standard ACL to prevent network 1 traffic from being transmitted to the Research and Development network. On which router interface and in which direction should the standard ACL be applied?

R2 Gi0/0 outbound

The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?

RAM

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switch port port-security mac-address sticky command?

RAM

Which routing protocol is limited to smaller network implementations because it does not accommodate growth for larger networks?

RIP

Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol?

RIP version 2 is running on this router and its RIP neighbor The command no auto-summary has been used on the RIP neighbor router

Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing the problem?

RIPv2 is misconfigured on router R2

Which step should be performed first when deleting a VLAN that has member switch ports?

Reassign all VLAN member ports to a different VLAN.

What is defined by the ip nat pool command when configuring dynamic NAT?

The pool of global address

Order the steps of configuring a router as a DHCPv4 server.

STEP 1 - Exclude IP addresses STEP 2 - Configure a DHCP pool STEP 3 - Define the default gateway router

A network engineer purchases, installs, and activates a license key on a Cisco 2911 ISR G2 router. What is the next step in the installation process?

Reload the router.

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

Remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

IDENTIFY THE STEPS NEEDED TO CONFIGURE A SWITCH FOR SSH. THE ANSWER ORDER DOES NOT MATTER. Required steps for SSH configuration 1) 2) 3) 4) 5)

Required steps for SSH configuration 1) Create a local user 2) Generate RSA keys 3) Configure a domain name 4) Use the login local command 5) Use the transport input ssh command

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

Restrict

Refer to the exhibit. Match the description with the routing table entries.

Route Source Protocol - D Destination Network - 10.3.0.0 Metric - 21024000 Administrative Distance - 1 Next Hop - 172.16.2.2 Route Timestamp - 00:22:15

Identifies from when the route was last heard.

Route Timestamp

Typically, which network device would be used to perform NAT for a corporate environment?

Router

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and teh other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2?

Router R1 is the master, and R2 is the client. The IP address of R1 is 192.168.1.2

Refer to the exhibit. From what location have the syslog messages been retrieved?

Router RAM

Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?

Router# show ip dhcp binding

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

Router# show ip nat translations

Which two commands will configure a standard ACL?

Router(config)# access-list 90 permit 192.168.10.5 0.0.0.0 Router(config)# access-list 35 permit host 172.31.22.7

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used?

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 Router(config)# access-list 95 permit any

A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps will accomplish this?

Router(config)# no cdp run Router(config-if)# cdp enable

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task?

Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

FILL IN THE BLANK. In an Ethernet network, frames smaller than 64 bytes are called ________?

Runts

Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?

S 10.0.2.0/24 [1/0] via 192.168.2.2

Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?

S 10.16.0.0/24 [1/0] via 192.168.0.9

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

SLAAC

What code in the Cisco IOS 15 image filename c1900-univseralk9-mz.SPA.153-3.M.bin indicates that the file is digitally signed by Cisco?

SPA

FILL IN THE BLANK. The initialism _________ refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.

SSH

Match the descriptions to the corresponding DHCPv6 server type.

STATELESS DHCPv6 Enabled in RA messages with the ipv6 nd other-config-flag command Clients send only DHCPv6 INFORMATION-REQUEST messages to the server Enabled on the client with the ipv6 address autoconfig command STATEFUL DHCPv6 The M flag is set to 1 in RA messages Uses the address command to create a pool of addresses for clients Enabled on the client with the ipv6 address dhcp command

Match the DHCP message types to the order of the DHCPv4 process.

STEP 1 - DHCPDISCOVER STEP 2 - DHCPOFFER STEP 3 - DHCPREQUEST STEP 4 - DHCPACK

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router.

STEP 1 - The client uses the inside global address of the web server as the destination address to send a packet to the web server. STEP 2 - R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table. STEP 3 - R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server. STEP 4 - The web server uses the outside global address of the client as the destination address when responding. STEP 5 - R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet.

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT.

STEP 5 - R1 replaces the address 192.168.10.10 with a translated inside global address. STEP 2 - R1 checks the NAT configuration to determine if this packet should be translated. STEP 4 - R1 selects an available global address from the dynamic address pool. STEP 1 - The host sends packets that request a connection to the server at the address 209.165.200.254 STEP 3 - If there is not translation entry for this IP address, R1 determines that the source address 192.168.10.10 must be translated.

REFER TO THE EXHIBIT. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

SW1 floods the frame on all ports of SW1, excluding the port through which the frame entered the switch.

What are three primary benefits of using VLANs?

Security Cost Reduction Improved IT staff efficiency

REFER TO THE EXHIBIT. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals? No one is allowed to disconnect the IP phone or the PC and connect some other wired device. If a different device is connected, port Fa0/2 is shut down. The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?

Segment the LAN into smaller LANs and route between them.

Which two statements are true regarding classless routing protocols?

Sends subnet mask information in routing updates Allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology

Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?

Serial0/0/1

Fill in the blank. Do not abbreviate. An administrator is troubleshooting a DHCPv4 issue on a router. By issuing the debug IP DHCP ________ command, the administrator can watch, in real time, the IP address assignments that are performed by the router.

Server Events

Which command would a network engineer use to find the unique device identifier of a Cisco router?

Show license udi

Which type of address does a switch use to build the MAC address table?

Source MAC address

When an appropriate switch form factor for a network is being determined, what should be selected when fault tolerance and bandwidth availability are desired but the budget is limited?

Stackable switch

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?

Stateless DHCPv6

Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?

Stateless DHCPv6

Match the characteristic to the corresponding type of routing.

Static Routing: Typically used on stub network, Less routing overhead Dynamic Routing: New networks are added automatically to the routing table, Best choice for large networks

MATCH THE STEP TO EACH SWITCH BOOT SEQUENCE DESCRIPTION. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Step 1 - Execute POST Step 2 - Load the boot loader from ROM Step 3 - CPU register initializations Step 4 - Flash file system initialization Step 5 - Load the IOS Step 6 - Transfer switch control to the IOS

Which option correctly describes a switching method?

Store-and-forward: ensures that the frame is free of physical and data-link errors.

Fill in the blank. A ________ network is a network that is accessed by a single router.

Stub

Which two characteristics describe a converged network?

Support of voice and video both using the same switch. Affordability for small and medium businesses.

Which network device can be used to eliminate collisions on an Ethernet network?

Switch

REFER TO THE EXHIBIT. DLS1 is connected to another switch , DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?

Switchport trunk native vlan 66.

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

Synchronizes the system clock with the time source with IP address 10.1.1.1

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?

The ACEs of access list 10 will be renumbered.

A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

The ACL does not perform as designed.

What is the effect of configuring an ACL with only ACEs that deny traffic?

The ACL will block all traffic.

Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1?

The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.

Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?

The IP address of the default gateway router is not contained in the excluded address list.

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

The IP address of the neighbor.

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

The MAC address of the IPv6 enabled interface.

What is the meaning of the number 10 in the encapsulation dot1Q 10 native router subinterface command?

The VLAN ID

REFER TO THE EXHIBIT. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

Which feature will require the use of a named standard ACL rather than a numbered standard ACL?

The ability to add additional ACEs in the middle of the ACL without deleting and re-recreating the list.

An administration wants to send log messages for all severity levels from a router to its console. Which procedure should the administrator follow to accomplish this?

The administrator needs to do nothing, because Cisco routers send log messages for all severity levels to the console by default.

Which statement describes a result after multiple Cisco LAN switches are interconnected?

The broadcast domain expands to all switches.

After booting, a client receives an ICMPv6 RA message with the M flag set to 0 and the O flag set to 1. What does this indicate?

The client automatically configure an IPv6 address and then contact a DHCPv6 server for more information.

When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast?

The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers.

A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload. Why did the engineer use the overload option?

The company has more private IP addresses than available public IP addresses.

REFER TO THE EXHIBIT. What is the cause of the error that is displayed in the configuration of inter-VLAN routing on router CiscoVille?

The encapsulation dot1Q 20 command has not been configured.

What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?

The port becomes inactive.

Refer to the exhibit. PC-A is unable to receive an IPv6 address from the stateful DHCPv6 server. What is the problem?

The ipv6 dhcp relay command should be applied to interface Gig0/0.

While configuring RIPv2 on an enterprise network, an engineer enters the command network 192.168.10.0 into router configuration mode. What is the result of entering this command?

The interface of the 192.168.10.0 network is sending only version 2 updates

An administrator has configured a DHCPv4 relay router and issued these commands: Router(config)# interface g0/0 Router(config-if)# ip address 10.0.1.1 255.255.255.0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# ip dhcp pool RELAY Router(dhcp-config)# end The clients are not receiving IP parameters from the DHCPv4 server. What is the possible cause?

The ip helper-address

A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client used as its default gateway?

The link-local address of the router interface that is attached to the network

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

The network administrator want to verify Layer 2 connectivity.

What does the term "port density" represent for an Ethernet switch?

The number of available ports.

A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?

The port is operational and ready to transmit packets.

REFER TO THE EXHIBIT. What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has security enabled.

Refer to the exhibit. What two statements describe the NTP status of the router?

The router is attached to a stratum 2 device. The IP address of the time source for the router is 192.168.1.1.

When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?

The request to the server for the seventh user fails

Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the Internet. What is a possible reason for this lack of connectivity?

The router NAT configuration has an incorrect inside local address.

Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?

The router is configured for stateless DHCPv6 operation

Refer to the exhibit. A network administrator is configuring a router for DHCPv6 operation. Which conclusion can be drawn based on the commands?

The router is configured for stateless DHCPv6 operation.

Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

The router is configured for stateless DHCPv6 operation.

Under which two circumstances would a router usually be configured as a DHCPv4 client?

The router is intended to be used as a SOHO gateway. This is an ISP requirement.

What is a characteristic of legacy inter-VLAN routing?

The router requires one Ethernet link for each VLAN.

REFER TO THE EXHIBIT. Router RA receives a packet with a source address of 192.168.1.35 and a destination address of 192.168.1.85. What will the router do with this packet?

The router will forward the packet out interface FastEthernet 0/1.2.

A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universal9-mz.SPA.152-4.M3bin R1(config)# boot system rom What is the effect of the command sequence?

The router will load IOS from the TFTP server. If the image fails to load, it will load from the IOS image from ROM.

A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence?

The router will load IOS from the TRTP server. If the image fails to load, it will load from the IOS image from ROM.

Refer to the exhibit. What does the number 17:46:26. 143 represent?

The time when the syslog message was issued.

Which configuration must be in place for the auto-MDIX feature to function on a switch interface?

The speed and duplex of the interface must be configured for auto detect.

What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured.

The sticky secure MAC address remain part of the address table but are removed from the running configuration.

What would be the most common reason that a network technician would see the following Cisco switch prompt after the switch boots? switch:

The switch operating system cannot be found.

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?

The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.

REFER TO THE EXHIBIT. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0/24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0/24 network. Which error is most likely causing this problem?

There is an incorrect IP address configured on GigabitEthernet 0/0.30.

What is a disadvantage of NAT?

There is no end-to-end addressing.

Which requirement should be checked before a network administrator performs an IOS image upgrade on a router?

There is sufficient space in flash memory.

What is a characteristic of unique local addresses?

They allow sites to be combined without creating any address conflicts.

Which statement describes IPv6 ULAs?

They are not routable across the Internet.

Which two characteristics match extended range VLANs?

They are saved in the running-config file by default. VLAN IDs exist between 1006 to 4094

What is a disadvantage of using dynamic routing protocols?

They send messages about network status insecurely across networks by default.

REFER TO THE EXHIBIT. What can be determined from the partial output of the show running-config command?

This appears to be the default configuration of the switch.

REFER TO THE EXHIBIT. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 request. To which port will SW1 forward this request?

To Fa0/1, Fa0/2, and Fa0/3 only

What is the purpose of the switch command switchport access vlan 99?

To assign the port to a particular VLAN.

Why would a network administrator issue the show cdp neighbors command on a router?

To display device ID and other information about directly connected Cisco devices.

What are two reasons a network administrator would segment a network with a Layer 2 switch?

To enhance user bandwidth To isolate traffic between segments

What is the minimum configuration for a router interface that is participating in IPv6 routing?

To have only a link-local IPv6 address

What are two functions of dynamic routing protocols?

To maintain routing tables To discover the network

What is a function of the switch boot loader?

To provide an environment to operate in when the switch operating system cannot be found.

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned?

To the subinterface

For what reason would a network administrator use the show interfaces trunk command on a switch?

To view the native VLAN.

In applying an ACL to a router interface, which traffic is designated as outbound?

Traffic that is leaving the router and going toward the destination host

True or False? The name of a named standard ACL is case sensitive.

True

REFER TO THE EXHIBIT. In what switch mode should port G0/1 be assigned if Cisco best practices are being used?

Trunk

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown? R1# <output omitted> Standard IP access list 2 10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches) 20 deny any (1 match)

Two devices were able to use SSH or Telnet to gain access to the router

MATCH THE IEEE 802.1Q STANDARD VLAN TAG FIELD WITH THE DESCRIPTION. Type VLAN ID User Priority Canonial Format Identifier

Type - A value for the tag protocol ID value. VLAN ID - A VLAN number. User Priority - A value that supports level or service implementation. Canonial Format Identifier - An identifier that enables Token Ring frames to be carried across Ethernet links.

What two tasks do dynamic routing protocols perform?

Update and maintain routing tables Network Discovery

A network administrator configures a static route on the edge router of a network to assign a gateway of last resort. How would a network administrator configure the edge router to automatically share this route within RIP?

Use the default-information originate command

What is the quickest way to remove a single ACE from a named ACL?

Use the no keyword and the sequence number of the ACE to be removed.

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure?

User data traffic VoIP phone traffic

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using TFTP server?

Verify connectivity between the router and TFTP server using the ping command. Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

A network administrator has entered the following command: ip route 192.168.10.64 255.255.255.192 serial0/0/1 When the network administrator enters the command show ip route, the route is not in the routing table. What should the administrator do next?

Verify that the serial 0/0/1 interface is active and available

In which situation would a technician use the show interfaces switch command?

When packets are being dropped from a particular directly attached host.

The would a network designer be concerned with RUs?

When purchasing a specific number of switches for a network rack.

In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?

When the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface.

When would a network administrator use the clear access-list counters command?

When troubleshooting an ACl and needing to know how many packets matched.

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. What is required to be configured in order for this particular command to be functional?

a NAT pool named corp that defines the starting and ending public IP addresses.

What is the name of the layer in the Cisco borderless switch network design that would have more switches deployed than other layers in the network design of a large organization?

access

Which command is issued in the VTY line configuration mode to apply a standard ACL that will control Telnet access to a router?

access-class 11 in

A network engineer is configuring PAT on a router and has issued the command: ip nat source list 1 interface serial 0/1/0 overload Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses?

access-list 1 permit 192.168.128.0 0.0.63.255

Which syslog message type is accessible only to an administrator and only via the Cisco CLI?

debugging

Fill in the blank. Type a command to exclude the first fifteen useable IP addresses from a DHCPv4 address pool of the network 10.0.15.0/24. Router(config)# ip dhcp ________

excluded-address 10.0.15.1 10.0.15.15

Which type of static route typically uses the distance parameter in the ip route global configuration command?

floating static route

Which type of ACL statements are commonly reordered by Cisco IOS as the first ACEs?

host

Which command should be configured on a router interface to set the router as a stateful DHCPv6 client?

ipv6 address dhcp

Refer to the exhibit. Which type of route is 172.16.0.0/16?

level 1 parent route

Which distinct type of VLAN is used by an administrator to access and configure a switch?

management VLAN

A lab in a network management software company is configuring a testing environment to verify the performance of new software with different network connectivity speeds, including FastEthernet, GigabitEthernet, and 10 GigabitEthernet, and with copper and fiber optic connections. Which type of switch should the software company purchase to perform the tests?

modular configuration

Which network design principle focuses on the capability of on-demand seamless network expansion in a switched network?

modularity

Refer to the exhibit. Match the components of the IOS image name to their description. mz - 15 - c1900 - bin - universalk9 - 1 - 4 - M4 -

mz - Where the image runs and if the file is compressed. 15 - Major release number c1900 - Platform on which the image runs bin - File Extension universalk9 - Specifying the feature set 1 - Minor release number 4 - New feature release number M4 - Maintenance release and rebuild number

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default?

native VLAN ID

Which command is used to remove only VLAN 20 from a switch?

no vlan 20

Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?

router on a stick

A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?

show flash0:

Which address is required in the command syntax of a standard ACL?

source IP address

What information is added to the switch table from incoming frames?

source MAC address and incoming port number

A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?

sticky secure MAC addresses

Which switching method provides error-free data transmission?

store-and-forward

Which protocol or service allows network administrators to receive system messages that are provided by network devices?

syslog

Which technology via the syslog protocol enhances real-time debugging by displaying the date and time associated with each monitored event?

syslog service timestamps

Which technology allows syslog messages to be filtered to different devices based on event importance?

syslog severity levels

What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?

the ipv6 unicast-routing command

What occurs next in the router lookup process after a router identifies a destination IP address and locates a matching level 1 parent route?

the level 2 child routes are examined

Which Cisco IOS 15 technology package would be needed to implement voice over IP?

uck9

Fill in the blank. The acronym ________ describes the type of traffic that requires a separate VLAN, strict QoS requirements, and a one-way overall delay less than 150 ms across the network. These restrictions help to ensure traffic quality.

voip

Which type of router connection can be secured by the access-class command?

vty

A network administrator is examining a RIPv2 routing table and notices that several subnets are advertised in individual entries. What can an administrator do to enable a RIPv2 router to automatically group multiple directly attached subnetworks into a single network statement?

Use the auto-summary command

Fill in the blank. A ________ static route can be used to provide a backup route to a dynamically learned route.

Floating

What type of static route is created when the next-hop IP address and exit interface are specified?

Fully specified static route

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

Gateway of Last Resort

Which three IOS troubleshooting commands can help to isolate problems with a static route?

ping show ip route show ip interface brief

Refer to the exhibit. What is the administrative distance value of the route for router R1 to reach the destination IPv6 address of 2001:DB8:CAFÉ:4::A?

120

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E240:BFF:FED4:9DD?

2682112

What address and prefix length is used when configuring an IPv6 default static route?

::/0

What are two common types of static routes in routing tables?

A default static route A static route to a specific network

What route would have the lowest administrative distance?

A directly connected network

Consider the following command: IP route 192.168.10.0 255.255.255.0 10.10.10.2 5. Which route would have to go down in order for this static route to appear in the routing table?

A static route to the 192.168.10.0/24 network

Consider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5. Which route would have to go down in order for this static route to appear in the routing table?

A static route to the 192.168.10.0/24 network

The output of the show IP route command contains the following entry: S 10.2.0.0 [1/0] via 172.16.2.2. What value is indicated by the 1 in the [1/0] portion of the output?

Administrative Distance

Which two statements correctly describe the concepts of administrative distance and metric?

Administrative distance refers to the trustworthiness of a particular route Routes with the smallest metric to a destination indicate the best path

Which two parameters are used by EIGRP as metrics to select the best path to reach a network?

Bandwidth Delay

Refer to the exhibit. The network administrator needs to configure a default route on the Border route. Which command would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets?

Border(fonfig)# ip route 0.0.0.0 0.0.0.0 s0/0/1

During the process of encapsulation, how does the PC determine if the packet is destined for a host on a remote network?

By performing the AND operation of the destination IP address and its own subnet mask

Which packet-forwarding method does a router use to make switching decisions when it is using a forwarding information base and an adjacency table?

Cisco Express Forwarding

Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?

Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1

A new junior network intern connects a laptop to an access layer switch in the wiring closet. After configuring a terminal emulation program, the intern presses the Enter key, and the S1_ATC_E2> prompt appears. What could have been done to better protect the switch?

Create a console password

What code is used in the routing table to identify routes learned through EIGRP?

D

What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?

Default Route

Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network?

Destination IP address Subnet mask

Which type of static route that is configured on a router uses only the exit interface?

Directly connected static route

The Purpose of Dynamic Routing Protocols?

Discovery of remote networks; Maintaining up-to-date routing information; Choosing the best path to destination networks; Ability to find a new best path if the current path is no longer available

Fill in the blank. In the process of building and maintaining a larger network, you will find that _______ routing is simpler to configure than static routing.

Dynamic/Dynamic Routing/Dynamic Routing Protocols

A network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 s0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet?

Encapsulates the packet into a frame for the WAN link and forwards the packet out of the S0/1/0 interface

What command, or set of commands, would be used to determine if the following configuration on router HQ works as designed? Ip route 0.0.0.0 0.0.0.0 serial 0/0/0 10 ip route 0.0.0.0 0.0.0.0 serial 0/1/0

HQ(config)# interface serial 0/1/0 HQ(config-if)# shutdown HQ(config-if)# end HQ# show ip route

What two pieces of information are displayed in the output of the show IP interface brief command?

IP addresses Layer 1 statuses

Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?

IP route 0.0.0.0 0.0.0.0 s0/0/0 IP route 0.0.0.0 0.0.0.0 s0/1/0 10

What is the correct syntax of a floating static route?

IP route 209.165.200.228 255.255.255.248 10.0.0.1 120

Match the routing table entry to the corresponding function.

Identifies how the route was learned - Route Source Identifies the address of a remote network - Destination Network Identifies the value assigned to reach a remote network - Metric Identifies the trustworthiness of a route source - Administrative Distance

Refer to the exhibit. What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B?

If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request.

What is the purpose of a routing protocol?

It allows a router to share information about known networks with other routers

What are two functions of a router?

It connects multiple IP networks It determines the best path to send packets

What is a characteristic of a default static route?

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

What is a characteristic of a static route that matches all packets?

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?

It is a logical interface internal to the router

Consider the following routing table entry for R1: D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0. What is the significance of the Serial0/0/0?

It is the interface on R1 used to send data that is destined for 10.1.1.0/24

A route with a subnet mask equal to or less than the classful mask of the network address.

Level 1 Route

A route with a subnet mask greater than the classful mask of the network address.

Level 2 Child Route

Which two statements describe characteristics of load balancing?

Load balancing allows a router to forward packets over multiple paths to the same destination network Unequal cost load balancing is supported by EIGRP

Consider the following command: IP route 192.168.10.0 255.255.255.0 10.10.10.2 5. How would an administrator test this configuration?

Manually shut down the router interface used as a primary route

A network administrator enters the command copy running-config startup-config. Which types of memory will the startup configuration be placed into?

NVRAM

Refer to the exhibit. Which set of commands will configure static routes that will allow the Park and Alta routers to a0 forward packets to each LAN and b0 direct all other traffic to the Internet?

Park(config)# IP Route 0.0.0.0 0.0.0.0 192.168.14.1 Alta(config)# IP Route 10.0.234.0 255.255.255.0 192.168.14.2 Alta(config)# IP Route 0.0.0.0 0.0.0.0 s0/0/0

A network administrator notices that a correctly entered static route is not in the routing table. What two router commands would an administrator use to determine if the exit interface was up and the next hop address is available?

Ping Show IP interface brief

Which route would be used to forward a packet with a source IPv6 address 2001:DB8:F00D:1::1 and a destination IPv6 address of 2001:DB8:CAFÉ:2:1?

R 2001:DB8:CAFÉ:2::/64 [120/3] via FE80::201:84FF:FEAC:8501, GigabitEthernet0/0

Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table?

R1 does not know a route to any remote networks The interface Fa0/1 is configured with IPv6 address 2001:DB8:ACAD:A::12

Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?

R1 needs a static route to the R2 LAN

Refer to the exhibit. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?

R1(config)# ipv6 route ::/0 G0/1 fe80::2

Which two statements correctly describe the components of a router?

ROM contains diagnostics executed on hardware modules Flash memory does not lose its contents during a reboot

Which IPv6 static route would serve as a backup route to a dynamic route learned through OSPF?

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

Fill in the blank. When a router receives a packet, it examines the destination address of the packet and looks in the ________ table to determine the best path to use to forward the packet.

Routing

Fill in the blank. ________ protocols are used to dynamically exchange routing information between routers.

Routing/Dynamic Routing

The network administrator configures the router with the IP route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

S 172.1.6.1.0 [1/0] via 172.16.2.2

Refer to the exhibit. The routing table for R2 is as follows: Gateway of last resort is not set...What will router R2 do with a packet destined for 192.168.10.129?

Send the packet out interface Serial0/0/1

Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

Send the packet out the Serial0/0/0 interface

A network administrator has entered a static route to an Ethernet LAN that is connected to an adjacent router. However, the route is not shown in the routing table. Which command would the administrator use to verify that the exit interface is up?

Show ip interface brief

What are two reasons why an administrator might choose to use static routing rather than dynamic routing?

Static routing is more secure Static routing uses less router processing and bandwidth

What are two advantages of static routing over dynamic routing?

Static routing is more secure because it does not advertise over the network Static routing uses fewer router resources than dynamic routing

Why would a summarized static route be configured on a router?

To reduce the size of the routing table

Match the steps that are taken by a router in the route look up process when it receives a packet, there is no match, and the packet is eventually dropped.

Step 1 - Examining Level 1 network routes for the best match Step 2 - Examining child routes of the parent route for the best match Step 3 - Searching level 1 supernet routes for the best match Step 4 - Determining if a default route exists Step 5 - Dropping the packet

A route with a subnet mask less than the classful mask of the network address.

Supernet Route

Which software is used for a network administrator to make the initial router configuration securely?

Terminal emulation client software

What is the gateway of last resort?

The IP address of another router

Prevents the forwarding of RIP updates out all interfaces.

The Passive-Interface Demand Command

What two pieces of information are needed in a fully specified static route to eliminate recursive lookups?

The interface ID exit interface The IP address of the next-hop neighbor

A network administrator configures the interface fa0/o on the router R1 with the command IP address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show IP route, the routing table does not show the directly connected network. What is the possible cause of the problem?

The interface fa0.0 has not been activated

When a router learns that multiple paths are available to a destination network from the same routing protocol, which factor is considered by a router to choose the best path to forward a packet?

The lowest metric

A network administrator has examined the routing table of a router and noted that the entry for the destination network 172.16.4.0/24 begins with the letter D. What does this letter signify?

The route source was learned dynamically

What occurs next in the router lookup process after a router identifies a destination IPv6 address and locates a matching level 1 network route?

The router forwards the packet

What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?

The static route is removed from the routing table

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why are the pings from PC0 to Server0 not successful?

The static route to network 192.168.2.0 is misconfigured on Router1

Which two statements describe static routes?

They require manual reconfiguration to accommodate network changes They are identified in the routing table with the prefix S

Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?

To be used as a backup route

Refer to the exhibit. What is the purpose of the router port that is shown?

To configure the router

What is the effect of configuring the ipv6 unicast-routing command on a router?

To enable the router as an IPv6 router

What is the purpose of classifying Cisco IP routing table entries as ultimate route, level 1 route, level 1 parent route, and level 2 child routes?

To explain the operation of the hierarchical structure of the routing table

Why are routers needed in networking?

To forward network traffic to remote networks

A network administrator configures a router by the command IP route 0.0.0.0 0.0.0.0 209.165.200.226. What is the purpose of this command?

To provide a route to forward packets for which there is no route in the routing table

What type of route has a network address with a subnet mask that is less than the classful equivalent?

a Supernet route

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What IPv6 static route can be configured on router R1 to make a fully converged network?

ipv6 route 2001:db8:10:12::/64 S0/0/1

Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?

ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2

Which static route statement shows a recursive IPv6 static route?

ipv6 route 2001db8:café:1::/56 2001:db8:1000:10::1

Which command would create a valid IPv6 default route?

ipv6 route ::/0 2001:db8:acad:2::a


Related study sets

Auditing Quiz 10-11 and Auditing Quiz 12, 16-17

View Set

FIND SLOPE/Y-INTERCEPT FROM AN EQUATION

View Set

FFJJFJFJFJJFJfjjfjfjfjfjjfjfjfjfjfjfjffjfjfjfjfjfjfjfjfjfjfjfjjfjjfjfjfjfjffjfjfjfjffjfffjfjfjfjjfjfjfjfjfjfjjfjjfjfjfjjfjjfjfjffjfjfjjffjjJFJFJJFJFJFJFJFJFJFJFJFJFJJFJJFFJFJFJFJFJFJFJFJFJFJFJJFJFJFJFJFJFJJFJFJFJFJFJFJFFJFJFJFJFJJFJFJFJFJFJFJFFJJFJJFJJFJF

View Set

Диалог врача с больным

View Set

ATI RN Fundamentals Online Practice 2023 A

View Set

Natural Hazards and Disasters: Chapter 1 - Introduction

View Set

Operator 1 chapter 10 Disinfection

View Set