Network+

Ace your homework & exams now with Quizwiz!

The commands used to enable a telnet connection with the password login for a Cisco router are A. router (config)#vty 0 4

...

Switches use bridge protocol data units for which of the following A. ports that are part of the STP are selected B. election of a root switch for the spanning tree topology C. removing redundant data paths D. the longest distance to a root switch is calculated

A, B, C

Examples of top level domains are A. .com B. .org C. .biz D. .ca

A, B, C, D

The five spanning tree protocol states are A. blocking E. forwarding B. listening F. disabled C. selecting G. passing D. learning H. cut through

A, B, D, E, F

OSPF is (select all that apply) A. open shortest path first routing protocol B. an open protocol C. developed specifically for TCP/IP networking D. Link state protocol

A,B,C,D

The broadcast address for a host at 192.168.20.15 using a subnet mask of 255.255.255.192 is A. 192.168.20.63 B. 192.168.20.0 C. 192.168.20.157 D. 192.168.20.255 E. none of the above

A. 192.168.20.63

The network address for a host with IP address 192.168.50.146 using a subnet mask of 255.255.255.192 is A. 192.168.50.128 B. 192.168.50.191 C. 192.168.50.0 D. 192.168.50.192 E. none of the above

A. 192.168.50.192

A network address of 192.168.6.0 and a subnet mask of 255.255.254.0 can be written in CIDR as. A. 192.168.6.0/23 B. 192.168.6.0/12 C. 192.168.6.0/15 D. 192.168.6.0/20

A. 192.168.6.0/23

Determine the router hop count from a host connected to Router 1 to a host connected to Router 5 in the network shown for the route with the fewest hops A. 2 hops B. 3 hops C. 4 hops D .5 hops

A. 2 hops

The subnet mask for a CIDR of /22 is A. 255.255.252.0 B. 255.255.255.252 C. 255.255.255.254 D. none of the above

A. 255.255.252.0

The IP address of 10.0.0.0 is a class ___ address and with a CIDR of /13 has a subnet mask of ___ with ___ usable subnets and ___ hosts/ subnet. A. A,255.248.0.0,30,52486 B.A, 255.255.255.248,2097150,6 C. A,255.255.0.0,62,262142 D. none of the above

A. A,255.248.0.0,30,52486

Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port. A. Application B. Internet C. Transport D. none of the above

A. Application

Converting 1011011011110001 yields A. B6F1 B. A6F1 C. AAF1 D. BAF1 e. none the above

A. B6F1

The ports for the BOOTP -server and BOOTP clients are A. BOOTP server 67 - BOOTP 68 B. BOOTP server 68 - BOOTP 67 C. BOOTP server 21- BOOTP 22

A. BOOTP server 67 - BOOTP client 68

The IP address of 192.12.1.0 is a class __ address and with a CIDR of /30 has a subnet mask of ___ with ___ usable subnets and ___ host/ subnets. A. C, 255.255.255.252,62,2 B. C, 255.255.248.0,30,2046 C. C,255.255.255.240,14,14 D none of the above

A. C,255.255.255.252,62,2

Which OSI layer is considered the media access control layer. A. Data Link B. Transport C.Presentation D. Application E. None of the above

A. Data Link

Select possible steps for preventing password cracking (select three) A. Don't use password that are dictionary words B. Don't use your name C. Limit the number of login attempts D. Limit the number of login attempts to five E. use numeric entries for your password

A. Don't use password that are dictionary words B. Don't use your name C, Limit number of login attempts

Which is not an advantage of OSPF. A. Easy to implement B.Uses VLSM C. Link-state are immediately reported D. Not a proprietary

A. Easy to implement

This is a suite of protocol that defines how voice and video are transported over IP networks A. H.323 B. SS7 C. RTP D. RTCP

A. H.323

An access list that can be used to block any data traffic from IP address 192.168.12.129 to anywhere is A. IP access list extended border router deny IP host 192.168.12.129 any permit any any B. IP access list extended border router deny IP host 192.168.12.129 any permit any any C. IP access list extended border router deny IP host 192.168.12.129 any permit any all D. IP access list extended border router allow IP host 192.168.12.129 none permit any any

A. IP access list extended border router deny IP host 192.168.12.129 any permit any any

Signatures are A. Indicators of known attacks B. IP addresses of known attacks C. the email address of known attackers D. none of the above

A. Indicators of known attacks

What type of problem does jitter cause A. It produces a poorly reconstructed signal B. It produces 300 to 3000 Hz hum C. It interferes with V.92 data connections D. It is not an issue with VoIP

A. It produces a poorly reconstructed signal

The NIC operates at what layer of the OSI model. A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7 E. None of the above

A. Layer 1 (Physical)

TCP functions at what layer of the OSI model. A. Layer 4 B. Layer 2 C. Layer 3 D. Layer 5 E. Layer 7

A. Layer 4 (Transport)

In OSPF, router updates are sent in the form of A. Link-state advertisements B. Exchanging routing tables every 30 seconds C. Exchanging routing tables every 90 seconds D. IETF packets E.LAS

A. Link-state advertisements

The router ID (RID) in OSPF hello packets is chosen from (select all that apply) A. loop back address B. OSPF 16P_Router C. Highest IP address on an interface D. All the above E none of the above

A. Loop back address C. Highest IP address on an interface

The purpose of variable length subnet masks is. A. Minimizes wasted IP address space when interconnecting subnets B. Are not recommended in modern computer networks C. Reduces the number of bits required in a subnet mask from 32 to 24 D. Is the same as classful addressing

A. Minimizes wasted IP address space when interconnecting subnets

Which OSI layer combines messages or segments into packets. A. Network B. Physical C. Transport D. Data Link E. None of the above

A. Network

The OSI layer responsible for compression and encryption is. A. Presentation B. Transport C. Application D. Network E.None of the above

A. Presentation

This returns a hostname for an IP address A. Reverse DNS B. Reverse DHCP C. Forward DNS D. none of the above

A. Reverse DNS

The command to enable the DHCP relay on a Cisco router is A. Router(config-if)#IP helper [IP address of the DHCP server] B. Router(config)# IP helper [IP address of the DHCP server] C. Router# IP helper [IP address of the DHCP server] D. Router(config-DHCP)# IP helper [IP address of the DHCP server]

A. Router (config-if)# IP helper[ip address of the DHCP server]

The three packet exchanged at the beginning of a TCP connection between two ports are . A. SYN, SYN+ACK, ACK B. SYN,SYN,ACK C. SYN, ACK, ACK D. TCP does not use SYN packets

A. SYN, SYN+ACK, ACK

STP , the spanning -tree protocol is which of the following (select all that apply) A. link-management protocol B. replaces RIP as the routing protocol for switches C. used to minimize hops D. used to prevent hops

A. link-management protocol D. used to prevent hops

Intrusion detection is A. the monitoring of data packets passing the network to catch potential attacks B. the monitoring of data packets passing the network to catch ongoing attacks C. the monitoring of data packets with invalid IP address that pass through the network d. none of the above

A. monitoring of data packets passing the network to catch potential attacks B. monitoring of data packets passing through the network to catch ongoing attacks

Intrusion detection is A. the monitoring of data packets passing through the network to catch potential attacks B. the monitoring of data packets passing through the network to catch ongoing attacks C. the monitoring of data packets packets with invalid IP addresses that pass through the network D. none of the above

A. monitoring of data packets passing through the network to catch potential attacks B. the monitoring of data packets passing through the network to catch ongoing attacks

Identify the command used to display currently open ports on a Windows operating system. A. netstat -a B. netstat -r C. netstat -o D. netstat - a

A. netstat -a

In regards to firewalls, packets filtering A. not all network services can be filtered B. a limit is placed on the amount of information that can enter a network C. simplifies creating access lists D. all the above

A. not all network services can be filtered

There are three types of VLANs A. port-based B. tag-based C. pd-based D. protocol-based

A. port-based B. tag-based D. protocol- based

DDOS attacks can be stopped by A. preventing intrusions B. can't be stopped C. brute force attacks D. buffer overflow

A. preventing intrusions

The goal of WEP is A. to provide the same security of a wireless connection that a wired connection provides B. provide a wireless connection that has no threats of intrusion C. provide the same security of a wireless connection that a server has D. prevent worms

A. provide the same security of a wireless connection that a wired connection provides

This is used to establish and terminate telephone calls A. signaling B. H.323 C. codec D. RTCP

A. signaling

The purpose of the CODEC is A. to structure the PCM data for inputting into frames B. initiate SIP C. facilitate H.323 D. simplify the PBX to PSTN interface

A. structure the PCM data for inputting into frames

The Hello intervals is A. The time between "hello" packets B. The timing of the "hello" header C. The timing of the router dead interval D. none of the above

A. the time between "hello" packets

SS7 provides the following enhanced features: (select all that apply) A. toll-free services B. roaming C. local number portability D. Worldwide communications

A. toll free services C. local number portability D. worldwide communications

A piece of malicious computer code that when opened starts a program that attacks a computer is called A. virus B. overflow C. worm D. denial of service

A. virus

This technique uses wireless equipment to detect wireless management packets A. war driving B. snooping C. wireless driving D. wireless snooping

A. war driving

Which OSI layer is responsible for adding a header that includes routing information. A. Network B. Application C. Physical D. Data Link

A.Network

The QoS issues for a VoIP network include A. jitter B. network latency C. packet loss D. queuing E. noise loss

A.jitter B. network latency C. packet loss D. queuing

The commands used to display the router's current running configuration is A. show run B. show routing C. show interface D. show controller E. SH config

A.show run

IP is an example of a protocol that operates in what layer of the OSI model. A. Layer 7 B. Layer 6 C. Layer 5 D. Layer 2 E. none of the above

E. None of the above (Layer 3)

The subnet mask 255.255.255.0 is applied to the IP addess 10.20.35.12. What subnet is the packet sent to. A. 10.20.35.32 B. 10.20.0.0 C. 10.0.0.0 D. 10.20.35.192 E. none of the above

E. none of the above

A computer with an IP address of 10.10.5.1 sends a data packet with a destination IP address of 10.5.10.20 using a subnet mask of 255.255.255.0. The packet stays in the LAN. True/ False

False

All subnets that are attached to Router 2 for the network shown are: 10.20.100.0 10.50.10.0 True/ False

False

All subnets connected to Router 3 in the network shown are 10.10.10.0 10.50.10.0 10.10.200.0 True/ False

True

The router commands used ton configure and enable an Ethernet 1 router interface with the IP address of 10.10.20.250 and a subnet mask of 255.255.0.0 are Router# conf t Router(config)# int e1 Router(config-if)# IP address 10.10.20.250 255.255.0.0 Router(config-if)# no shut A. True B. False

A. True

What information does "show ip route igrp" provide. A. View the routing table for only the IGRP protocol. B. View the routing table for all protocols except IGRP C. Enable ip routing with IGRP. D. Instruct the router to use IP routing

A. View the routing table for only the IGRP protocol

What is the 6 to 4 prefix A. a technique that enable IPv6 hosts to communicate over the IPv4 Internet. B. a technique that enable IPv4 host to communicate over the IPv6 Internet. C. this is used to separate the IPv6 address from the hex MAC address. D. this is used to separate the MAC address from the IPv4 address

A. a technique that enable IPv6 host to communicate over the IPv4 Internet.

The command permit IP any any A. is an instruction added to the last line of an access list to allow all other data packets to enter and exit the router B. is an instruction added to the first line of an access list to allow all other data packets to enter and exit the router C. an instruction added to the access list to allow all other data packets to enter and exit the router and to enable firewall protection D. all the above

A. an instruction added to the line of an access list to allow all other data packets to enter and exit the router

This happens when a program tries to put more data into a buffer than it was configured to hold A. buffer overflow B. program overflow C. data overflow D. DDR overflow

A. buffer overflow

Which of the following commands is used to copy the running configuration from the tftp server. A. copy tftp run B. save run tftp C. copy run tftp D. copy run ttfp

A. copy tftp run

A service is being denied to a computer can be a result of A. denial of service B. improperly configured WEP C. spoofing D. directed broadcast

A. denial of service

The name for a broadcast sent to a specific subnet is called A. directed broadcast B. multicast C. broadcast D. sweep

A. directed broadcast

RIP is classified as a (select all that apply) A. distance vector protocol B. dynamic routing protocol C. link-state protocol D. multi vendor protocol

A. distance vector protocol B. dynamic routing protocol

Rootservers (select all that apply) A. exist using well-known IP address B. are queried by campus DNS servers to find name servers C. exist using well-known MAC address D. are only used by ISP's

A. exist using well-known IP addresses B. are queried by campus DNS servers to find name servers

BGP is considered to be A. external routing protocol B. internal routing protocol C. used for routing between the same network D. outdated

A. external routing protocolexist

An advantage of running power over Ethernet is (select all that apply) A. It is not necessary to run external power to all networking devices B. PoE allows an improvement in data throughput C. PoE works with all networking devices regardless of the manufacturer D. You can run power and data over one cable

A. it is not necessary to run external power to all networking devices D. you can run power and data over one cable

A stateful firewall A, keeps track of the data packet flow B. keep track of data collisions C. enable the access list D. prevent unnecessary pings

A. keep track of the data packet flow

A stateful firewall A. keeps tracks of the data packets flow B. keeps tracks of the data collisions C. enables the access list D. prevent unnecessary pings

A. keeps tracks of the data packet flow

The port number for TFTP is A. 1102 B. 69 C. 23 D. 56401

B. 69

All possible routes from Router B to Router D in the network shown are as follows Router B- Router C- Router D Router B- Router E- Router D Router B- Router A- Router E- Router D A. True B. False

B. False

Areas in the OSPF protocol are A. not used B. Used to partition a large network into small network C. Used to combine small network into one large network D, an inefficient use of bandwidth

B. Used to partition a large network into a small network

The router command used to copy the running-configuration to NVRAM is. A. copy run tftp B. copy run start C. copy run flash D. copy run show

B. copy run start

The OSPF routing protocol uses these to verify that a link between routers is active and the routers are communicating. A. LSA B. Hello packets C. ARP messages D. Ping

B. hello packets

A multi-homed customer has A. a single Internet connection B. more than one Internet connection C. static routes D. none of the above

B. more than one internet connection

Area 0 is A. used to hide data packets B. root or the backbone for the network C. inverse mask bits D. route selection bits

B. root or the backbone for the network

The command for enabling IGRP routing is A. router IGRP [0#] B. router IGRP [as number] C.router IGRP D. router IGRP [area]

B. router IGRP [as number]

What is the router command to enable the RIP routing protocol on a router A. config router RIP B. router rip C. router rip (area) D. router rip (as number)

B. router rip

Power to PoE devices is provided using which of the following pairs (select all that apply) A. 1-3/4-6 B. 1-6/5-8 C. 1-2/3-6 D. 4-5/7-8

C. 1-2/3-6 D. 4-5/7-8

The command "show ip route" is used on a router to (select all that apply) A. Set a static route B. Configure a static route C. display the configured routes on a router D. Display how often routing updates are sent

C. Display the configured routes on a router

The command "show ip protocol" is used to A. Display the routing protocols that can run on the the printer B. Display the IP address of the routers running an IP protocol C. Display the routing protocol running on the router D. none of the above

C. Display the routing protocol running on the router

You can verify that the IGRP routing protocol is running on a router by A. show run B. SH IP INT brief C. show IP protocol D show flash E. show IGRP

C. Show IP protocol

Which of the following is used to look specifically at the assignments for the Administrator VLAN A. Switch(config)# sh VLAN name Administrstor B. Switch(Vlan) #sh Vlan name Administrator C. Switch #sh VLan Administrator D. Switch #sh Vlan Administrator

C. Switch #sh VLan Administator

The command used on a Cisco switch for creating a Administrator VLAN 2 is which of the following A. Switch A #VLAN database Switch #VLAN 2 name Administrator B. Switch A #VLAN database Switch (data) #VLAN 2 name Administrator C. Switch A #VLAN database Switch (VLAN) #2name Administrator D. Switch A #VLAN database Switch (VLAN) #VLAN name Administrator

C. Switch A #VLAN database Switch (VLAN) #2 name Administrator

This simplifies the interconnection between the IP-PBX and the PSTN A. Codec B. Sip C. Virtual Tie Lines D. H.323

C. Virtual tie lines

The command "show IP route OSPF A.is not valid in OSPF B. displays only the OSPF IGRP C. displays only the OSPF routes D. enables OSPF routing

C. displays only the OSPF routes

Which of the following is not a correct statement for configuring a router to run OSPF. A. network 10.10.20.1/ 1.1.1.1 area 0 B. network 10.10.20.1/ 1.0.0.0 area 0 C. network 10.0.0.0/ 1.0.0.0.0 area 0 D. network 10.10.100.1/ 1.0.0.0 area 0

C. network 10.0.0.0/ 1.0.0.0.0.area 0

A static VLAN is basically which of the following A. seldom used B. MAC VLAN C. port-based VLAN D. none of the above

C. port-based VLAN

The command for enabling EIGRP on a router is A. router IGRP (as number) B. router EIGRP C. router EIGRP (as number) D. router EIGRP enable E. router EIGRP (area)

C. router EIGRP (as number)

OSPF "hello" packets are sent out every A. 30 seconds B. 90 seconds C. 10 seconds D. none of the above

C.10 seconds

Identfy the subnets connected to Router 3 A. AGD B. FGHI C. GDH D. GGH

C.GDH

The default gateway can be set on a Cisco switch using which of the following commands. IP address for the default gateway is 172.16.35.1 A. SwitchA(config-if)# ip default-gateway 172.16.35.1 B. SwitchA#ip default-gateway 172.16.35.1 C. SwitchA(config-gate)# ip default-gateway 172.16.35.1 D. SwitchA(config)#ip default-gateway 172.16.35.1 .

D SwitchA(config)# ip default-gateway 172.16.35.1

Which of the following commands is used to copy the running- configuration to the tftp server. A. copy tftp run B. copy run ttfp C. save run tftp D. copy run tftp

D copy run tftp

The IP address of 153.35.0.0 is a class ___ address and with a CIDR of /21 has a subnet mask of ___ with usable subnets and ___hosts/ subnet. A. B,255.255.255.252,16382,2 B. B, 255.255.255.125,510,126 C. B,255.255.255.240,14,14 D. none of the above

D. None of the above

Which OSI layer is responsible for the mechanical connection to the network. A. Network B. Transport C. Data Link D. None of the above (Physical)

D. None the above

The command structure for enabling OSPF routing on a router is A. Routing OSPF B. Router OSPF (area) C. Routing protocol OSPF D. Router OSPF (number)

D. Router OSPF (number)

OSPF muticasts are sent out as what class of address A. class A B. class B C class C D. class D E, IPv6

D. class D

What router commands will display the configured routes on a router. A. show run B. show IP INT Brief C. show list D. show IP route

D. show IP route

What router command can be used to verify that EIGRP is running on the router. A. show run B. show ip int brief C. show history D. show ip protocol

D. show ip protocol

What router command will show how many subnets are configured. A. show run B. show ip int brief C. show list D. show ip route

D. show ip route

What is the command for displaying the startup configuration A. show run B. show flash C. show history D. show start

D. show start


Related study sets

Exam 4 (Chapter 49) Assessment and MGMT of Pt's w/Hepatic Disorders

View Set

AP Computer Science Principles S1 Final Exam

View Set

FoE9 wbp.20 match the word with its definition

View Set

ECON 101 Final Material (UMICH - Wolfers)

View Set

Official Cert Guide CCNA 200-301 Part 2

View Set