Вы находитесь на странице: 1из 49

This is used between a network device

and server or other device that is


Trunks
equipped with an appropriate 802.1Q-
capable NIC.
A switch forwarding method that makes
Store-and-forward a forwarding decision on a frame after it
switching has received the entire frame and then
checked the frame for errors.
A protocol that provides an encrypted
SSH
connection to a remote device.
This layer provides intelligent switching,
routing, and network access policy
Distribution layer
functions to access the rest of the
network.
SSH protocol by default uses Port
22
______.
Access, distribution and What are the 3 layers of the distribution
Core layer access?
The _____ switches typically come with
different sized chassis that allow for the
Modular configuration
installation of different numbers of line
card.
If the port is assigned to the wrong
VLAN, what command to be command
Switchport access vlan
to change the VLAN membership on a
particular port?
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
Brute force password This attack tries to crack a password on
attack another device. The first phase of this
attack starts with the attacker using a
list of common passwords and a
program designed to try to establish a
Telnet session using each word on the
dictionary list.
The port is operating at What is the status of the Port speed LED
1000 Mbps. if the LED light is blinking green?
This layer is considered as the network
Core layer
backbone.
A type of VLAN that is configured to
Data VLAN
carry user-generated traffic.
The port is operating at What is the status of the Port speed LED
100 Mbps. if the LED light is green?
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
A collection of interconnected switches
Broadcast domain
forms a _______________________.
This type of attack takes advantage of
the way that hardware on most switches
operates. Most switches perform only
Double Tagging Attack
one level of 802.1Q de- encapsulation,
which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
Telnet protocol by default uses Port
23
______.
Which of the following is the command
Ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
Dividing Layer 1,2 and 3
networks into multiple
physical workgroups Which of the following is NOT a benefit
reduces unnecessary traffic of VLAN?
on the network and boosts
performance.
Which of the following is NOT a feature
None of the choices
of a Switched Network
In this attack, the attacker exploits a
flaw in the Telnet server software
running on the switch that renders the
Telnet service unavailable. This sort of
attack prevents an administrator from
remotely accessing switch management
Telnet DoS attack
functions. This can be combined with
other direct attacks on the network as
part of a coordinated attempt to prevent
the network administrator from
accessing core devices during the
breach.
Global configuration mode is used to
configure system globally, or to enter
specific configuration modes to
configure terminal
configure specific elements such as
protocols. What is the command to
enter global configuration mode?
between 1006 and 4094 The extended range of VLAN ID is
Which of the following is NOT an
None of the choices
element of converged network?
A switch forwarding method that begins
the forwarding process after the
Cut-through switch method destination MAC address of an incoming
frame and the egress port has been
determined.
The default VLAN for Cisco switches is
VLAN 1
____________________.
The ________________ switches do
not support features or options beyond
Fixed configuration
those that originally came with the
switch.
This is a conduit for multiple VLANs
Trunks
between switches and routers.
show vlan In troubleshooting VLANs, what
command should be used to check
whether the port belongs to the
expected VLAN?
This is a protocol that is used to
synchronize the clocks of computer
Network Time Protocol
systems over packet-switched, variable-
latency data networks.
The primary function of this layer is to
Access layer
provide network access to the user.
The network segments that share the
Collision domain
same bandwidth between devices.
This is a proprietary protocol that all
Cisco devices can be configured to use.
This checks other Cisco devices that are
Cisco Discovery Protocol
directly connected, which allows the
devices to auto-configure their
connection.
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
This is a security technology that
determines which devices attached to
switch ports can respond to DHCP
requests. This can be used to prevent
DHCP Snooping
unauthorized DHCP messages that
contain information such as IP address
related data being provided to legitimate
network devices.
VLAN IDs 1002 through 1005 are
All of the Choices
reserved for
What is the command to assign the port
switchport access vlanvlan-
to a particular VLAN when the interface
id
is in access mode?
DHCP spoofing attack What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
Which of the following is the command
Ip default-gateway
to configure the switch default gateway
172.10.90.1
with IP address of 172.10.90.1?
Sometimes switch ports must manually
have their duplex mode manually
configured. This duplex mode increases
Full duplex mode
effective bandwidth by allowing both
ends of a connection to transmit and
receive data simultaneously.
What is the command to create a VLAN
Vlan 30
with a valid VLAN ID number 30?
This layer provide fault isolation and
Core layer
high-speed backbone connectivity.
A type of VLAN that is defined in the
IEEE 802.1Q specification to maintain
Native VLAN
backward compatibility with untagged
traffic common to legacy LAN scenarios.
The following are switch port modes
Remote
that DTP offers EXCEPT
This is the practice of inserting a VLAN
ID into a packet header in order to
VLAN tagging
identify which VLAN (Virtual Local Area
Network) the packet belongs to.
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
Dynamic Trunking Protocol Which of the following describes
is disable by default. Dynamic Trunking Protocol?
What type of DHCP attack where in an
attacker floods the DHCP server with
DHCP requests to use all the available IP
addresses that the DHCP server can
DHCP starvation attack issue. After these IP addresses are
issued, the server cannot issue any more
addresses, and this situation produces a
denial-of-service (DoS) attackas new
clients cannot obtain network access.
What is the command to configure the
speed auto interface to automatically negotiate
speed with the connected device?
If an error occurs while loading the
operating system because of missing or
damaged system files, the load loader
Mode can be access through a console
connection. What button in the switch
you need to press while reconnecting the
power cord?
The following are VLAN best practices
Join native VLAN to VLAN.
EXCEPT?
Configurations are stored within a VLAN
vlan.dat
database file, called
What is the command to set the IP
ip address 192.168.10.2 address (192.168.10.2) and subnet mask
255.255.0.0 (255.255.0.0) for specific Fast Ethernet
interface?
There is activity and the In the Switch port LED status, if the LED
port is sending or receiving is blinking green what is the status of
data. switch?
This is used to connect a PC to the
Console cable console port of a switch for
configuration.
Which of the following is the command
name employee to specify a VLAN name? Name of VLAN
is employee.
VLANs are based on logical
Which of the following describes a
connections, instead of
VLAN?
physical connections.
What is the command used to determine
show ip interface brief the status of both physical and virtual
interfaces including IP address?
A switch populates the
MAC address table based Which of the following statement is
on destination MAC INCORRECT?
addresses.
Which is the VLAN not tagged by
Native VLAN
802.1q?
A router has two FastEthernet interfaces
and needs to connect to four vlans in the
Implement a router-on-a- local network. How can you accomplish
stick configuration. this task, using the fewest physical
interfaces and without decreasing
network performance?
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
logical topology This is the path over which the data is
transferred in a network. It describes
how the network devices appear
connected to network users.
The following are VLAN best practices
None of the choices
EXCEPT?
This layer provide fault isolation and
Core layer
high-speed backbone onnectivity.
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
"Which two network parameters are
used by EIGRP as metrics to select the
2&5 best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5.
delay 6. confidentiality"
This is a conduit for multiple VLANs
Trunks
between switches and routers.
Refer to the exhibit. A router-on-a-stick
configuration was implemented for
VLANs 15, 30, and 45, according to the
There is an incorrect IP show running-config command output.
address configured on PCs on VLAN 45 that are using the
GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
If the port is assigned to the wrong
VLAN, what command to be command
switchport access vlan
to change the VLAN membership on a
particular port?
Double Tagging Attack This type of attack takes advantage of
the way that hardware on most switches
operates. Most switches perform only
one level of 802.1Q de- encapsulation,
which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
Routers compare metrics Which statement is true regarding
to determine the best path. routing metrics?
This memory provides temporary
storage for various applications and
RAM processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
The primary function of this layer is to
Access layer
provide network access to the user.
Which of the following is the command
ip default-gateway
to configure the switch default gateway
172.10.90.1
with IP address of 172.10.90.1?
A protocol that provides an encrypted
SSH
connection to a remote device.
"Which of the following are 2 primary
functions of a router? 1. Packet
2&4 switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
Refer to the exhibit below. Which two
1&5 statements about the configuration of
the switch interface are correct?
If your routing table has a static, a RIP,
and an OSPF route to the same network,
Static route
which route will be used to route
packets by default?
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
The network segments that share the
Collision domain
same bandwidth between devices.
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
A type of VLAN that is configured to
Data VLAN
carry user-generated traffic.
"To enable network access to a remote
destination, what three pieces of
information must be configured on a
1, 5, 6
host? 1. default gateway 2. hostname 3.
DNS server address 4. DHCP server
address 5. IP address 6. subnet mask"
What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
DHCP spoofing attack Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
This is the practice of inserting a VLAN
ID into a packet header in order to
VLAN tagging
identify which VLAN (Virtual Local Area
Network) the packet belongs to.
DHCP starvation attack What type of DHCP attack where in an
attacker floods the DHCP server with
DHCP requests to use all the available IP
addresses that the DHCP server can
issue. After these IP addresses are
issued, the server cannot issue any more
addresses, and this situation produces a
denial-of-service (DoS) attackas new
clients cannot obtain network access.
This is used between a network device
and server or other device that is
Trunks
equipped with an appropriate 802.1Q-
capable NIC.
Which of the following is the command
ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
Which of the following describes a
None of the choices
VLAN?
"Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
2&3 The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
A directly connected What route would have the lowest
network administrative distance?
The ________________ switches do
not support features or options beyond
Fixed configuration
those that originally came with the
switch.
Cisco Discovery Protocol This is a proprietary protocol that all
Cisco devices can be configured to use.
This checks other Cisco devices that are
directly connected, which allows the
devices to auto-configure their
connection.
It is a logical interface What is a characteristic of an IPv4
internal to the router. loopback interface on a Cisco IOS router?
Which protocolis used to configure
802.1q
trunking on a switch?
Which protocols are used to configure
802.1q
trunking on a switch?
"Which two link protocols are used to
2&4 carry multiple VLANs over a single link?
1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
"Which two statements correctly
describe the concepts of administrative
distance and metric? (Choose two.) 1.
The metric varies depending which Layer
3 protocol is being routed, such as IP. 2.
A router first installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
This is a conduit for multiple VLANs
Trunks
between switches and routers.
It is a logical interface What is a characteristic of an IPv4
internal to the router. loopback interface on a Cisco IOS router?
1&5 Refer to the exhibit below. Which two
statements about the configuration of
the switch interface are correct?
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
Which of the following is the command
ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
Which is the VLAN not tagged by
Native VLAN
802.1q?
"Which of the following are 2 primary
functions of a router? 1. Packet
2&4 switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
A directly connected What route would have the lowest
network administrative distance?
DHCP spoofing attack What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
The following are VLAN best practices
None of the choices
EXCEPT?
If the port is assigned to the wrong
VLAN, what command to be command
switchport access vlan
to change the VLAN membership on a
particular port?
Network infrastructure devices require IP
addresses to enable remote
management. Using the device IP
None in the choices
address, the network administrator can
remotely connect to the device using any
of the following EXCEPT
Which of the following is NOT a
All of the choices
characteristics of a network?
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
Refer to the exhibit. A router-on-a-stick
configuration was implemented for
VLANs 15, 30, and 45, according to the
There is an incorrect IP show running-config command output.
address configured on PCs on VLAN 45 that are using the
GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
Trunks This is used between a network device
and server or other device that is
equipped with an appropriate 802.1Q-
capable NIC.
This is a protocol that is used to
synchronize the clocks of computer
Network Time Protocol
systems over packet-switched, variable-
latency data networks.
"Which three elements must be used
when you configure a router interface for
VLAN trunking? 1. one physical interface
for each subinterface 2. one IP network
or subnetwork for each subinterface 3. a
2, 4, 5 management domain for each
subinterface 4. subinterface
encapsulation identifiers that match
VLAN tags 5. one subinterface per VLAN
6. subinterface numbering that matches
VLAN tags"
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
If your routing table has a static, a RIP,
and an IGRP route to the same network,
Static route
which route will be used to route
packets by default?
The FastEthernet 0/0
Refer to the exhibit. Which statement
interface on Router1 must
are true about interVLAN routing in the
be configured with
topology that is shown in the exhibit?
subinterfaces.
"The primary functions of a router are
the following? 1. Packet switching 2.
1&4
Flow control 3. Domain name resolution
4. Path selection 5. Microsegmentation"
Refer to the exhibit. The two connected
ports on the switch are not turning
2, 4, 6 orange or green. What would be the
most effective steps to troubleshoot
this physical layer problem?
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
This is the path over which the data is
transferred in a network. It describes
logical topology
how the network devices appear
connected to network users.
"Which two features are characteristics
of flash memory? 1. Flash receives a
copy of the IOS from RAM when a device
is powered on. 2. Flash provides
2&3 nonvolatile storage. 3. The contents of
flash may be overwritten. 4. Flash is a
component in Cisco switches but not in
Cisco routers. 5. The contents of flash
may be lost during a power cycle."
Which protocols are used to configure
802.1q
trunking on a switch?
A router has two FastEthernet interfaces
and needs to connect to four vlans in the
Implement a router-on-a- local network. How can you accomplish
stick configuration. this task, using the fewest physical
interfaces and without decreasing
network performance?
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not 255.255.255.0. However, when the
been activated. administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
"Which two link protocols are used to
2&4 carry multiple VLANs over a single link?
1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
This memory stores router bootup
ROM instructions and basic diagnostic
software.
The AJ company has a small network.
The network consists of one switch and
one router. The switch has been
configured with two VLANs. The router
has been configured as a router-on- a-
two stick to allow inter-VLAN routing. A
trunk is configured to connect the switch
to the router. Whatis the minimum
number of router subinterfaces that are
required for all the VLANs to
communicate?
The ________________ switches do
not support features or options beyond
Fixed configuration
those that originally came with the
switch.
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
What is the command to create a VLAN
vlan 30
with a valid VLAN ID number 30?
This layer provide fault isolation and
Core layer
high-speed backbone onnectivity.
"Which two link protocols are used to
2&4 carry multiple VLANs over a single link?
1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
All of the choices Which of the following is an element of
converged network?
Refer to the exhibit. The user at
The gateway for Server A is Workstation B reports that Server A
not on the same subnet. cannot be reached. What is preventing
Workstation B from reaching Server A?
Telnet protocol by default uses Port
23
______.
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
Which of the following is the command
name employee to specify a VLAN name? Name of VLAN
is employee.
In troubleshooting VLANs, what
command should be used to check
show vlan
whether the port belongs to the
expected VLAN?
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
There is an incorrect IP Refer to the exhibit. A router-on-a-stick
address configured on configuration was implemented for
GigabitEthernet 0/0.30.* VLANs 15, 30, and 45, according to the
show running-config command output.
PCs on VLAN 45 that are using the
172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
ISL & IEEE 802.1q Which are the 2 trunking protocols?
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
This memory stores router bootup
ROM instructions and basic diagnostic
software.
"To enable network access to a remote
destination, what three pieces of
information must be configured on a
1, 5, 6
host? 1. default gateway 2. hostname 3.
DNS server address 4. DHCP server
address 5. IP address 6. subnet mask"
A protocol that provides an encrypted
SSH
connection to a remote device.
There is an activity and the In the Switch port LED status, if the LED
port is sending or receiving is blinking green what is the status of
data. switch?
Load balancing allows a
router to forward packets Which statement describe a
over multiple paths to the characteristicof load balancing?
same destination network.
Configurations are stored within a VLAN
vlan.dat
database file, called
2&3 "Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
This memory provides temporary
storage for various applications and
RAM processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
Load balancing allows a
router to forward packets Which of the statements describe
over multiple paths to the characteristic of load balancing?
same destination network.
This is a protocol that is used to
synchronize the clocks of computer
Network Time Protocol
systems over packet-switched, variable-
latency data networks.
The FastEthernet 0/0
Refer to the exhibit. Which statement
interface on Router1 must
are true about interVLAN routing in the
be configured with
topology that is shown in the exhibit?
subinterfaces.
Routers compare metrics Which statement is true regarding
to determine the best path. routing metrics?
The default VLAN for Cisco switches is
VLAN 1
____________________.
DHCP spoofing attack What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
Which is the VLAN not tagged by
Native VLAN
802.1q?
Which of the following is NOT a
All of the choices
characteristics of a network?
"Which of the following are 2 primary
functions of a router? 1. Packet
2&4 switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
"Refer to the exhibit. According to the
routing table, where will the router send
a packet destined for 10.1.5.65?
Network Interface Next-hop 10.1.1.0/24
e0 directly connected 10.1.2.0/24 e1
10.1.3.3 directly connected 10.1.3.0/25 s0
directly connected 10.1.4.0/24 s1
directly connected 10.1.5.0/24 e0
10.1.1.2 10.1.5.64/28 e1 10.1.2.2
10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1
10.1.4.4"
Which protocolis used to configure
802.1q
trunking on a switch?
"Which three elements must be used
when you configure a router interface for
VLAN trunking? 1. one physical interface
for each subinterface 2. one IP network
or subnetwork for each subinterface 3. a
2, 4, 5 management domain for each
subinterface 4. subinterface
encapsulation identifiers that match
VLAN tags 5. one subinterface per VLAN
6. subinterface numbering that matches
VLAN tags"
Which of the following is the command
ip default-gateway
to configure the switch default gateway
172.10.90.1
with IP address of 172.10.90.1?
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not 255.255.255.0. However, when the
been activated. administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
Which of the following describes
All of the choices
Dynamic Trunking Protocol?
A directly connected What route would have the lowest
network administrative distance?
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not 255.255.255.0. However, when the
been activated. administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
Telnet DoS attack In this attack, the attacker exploits a
flaw in the Telnet server software
running on the switch that renders the
Telnet service unavailable. This sort of
attack prevents an administrator from
remotely accessing switch management
functions. This can be combined with
other direct attacks on the network as
part of a coordinated attempt to prevent
the network administrator from
accessing core devices during the
breach.
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
In troubleshooting VLANs, what
command should be used to check
show vlan
whether the port belongs to the
expected VLAN?
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
no shutdown
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
"True of False. Ingress is used to
The correct answer is
describe frames leaving the device
'False'.
through a particular port."
"Which three elements must be used
when you configure a router interface for
VLAN trunking? 1. one physical interface
for each subinterface 2. one IP network
or subnetwork for each subinterface 3. a
2, 4, 5 management domain for each
subinterface 4. subinterface
encapsulation identifiers that match
VLAN tags 5. one subinterface per VLAN
6. subinterface numbering that matches
VLAN tags"
1&4 "The primary functions of a router are
the following? 1. Packet switching 2.
Flow control 3. Domain name resolution
4. Path selection 5. Microsegmentation"
What is the command to create a VLAN
vlan 30
with a valid VLAN ID number 30?
Which of the following describes a
None of the choices
VLAN?
"Which two statements correctly
describe the concepts of administrative
distance and metric? 1. The metric varies
depending which Layer 3 protocol is
being routed, such as IP. 2. A router first
installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
A switch is configured with all ports
assigned to vlan 2 with full duplex
An additional broadcast FastEthernet to segment existing
domain will be created. departmental traffic. What is the effect
of adding switch ports to a new VLAN on
the switch?
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
The correct answer is VLAN is a switching technology that
'True'. reduces the size of a broadcast domain.
Refer to the exhibit. The two connected
ports on the switch are not turning
2, 4, 6 orange or green. What would be the
most effective steps to troubleshoot
this physical layer problem?
A type of VLAN that is configured to
Data VLAN
carry user-generated traffic.
The network segments that share the
Collision domain
same bandwidth between devices.
"Which two statements correctly
describe the components of a router? 1.
RAM permanently stores the
configuration file used during the boot
sequence. 2. ROM contains diagnostics
executed on hardware modules. 3.
NVRAM stores a backup copy of the IOS
2&4
used during the boot sequence. 4. Flash
memory does not lose its contents
during a reboot. 5. ROM contains the
most current and most complete version
of the IOS. 6. Flash contains boot system
commands to identify the location of the
IOS"
This layer provides intelligent switching,
routing, and network access policy
Distribution layer
functions to access the rest of the
network.
Which protocolis used to configure
802.1q
trunking on a switch?
no shutdown Refer to the exhibit. A network
administrator has configured R1 as
shown. When the administrator checks
the status of the serial interface, the
interface is shown as being
administratively down. What additional
command must be entered on the serial
interface of R1 to bring the interface up?
"Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
2&3 The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
The following are VLAN best practices
None of the choices
EXCEPT?
The correct answer is Router On Stick is a method used for
'True'. communicating inter-vlan using a router.
"Which two link protocols are used to
2&4 carry multiple VLANs over a single link?
1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
This is used between a network device
and server or other device that is
Trunks
equipped with an appropriate 802.1Q-
capable NIC.
"Which of the following are 2 primary
functions of a router? 1. Packet
2&4 switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
4&5 "Which two statements correctly
describe the concepts of administrative
distance and metric? (Choose two.) 1.
The metric varies depending which Layer
3 protocol is being routed, such as IP. 2.
A router first installs routes with higher
administrative distances. 3. The value of
the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
ISL & IEEE 802.1q Which are the 2 trunking protocols?
Configurations are stored within a VLAN
vlan.dat
database file, called
This memory provides temporary
storage for various applications and
RAM processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
The port is operating at What is the status of the Port speed LED
1000 Mbps. if the LED light is blinking green?
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
The primary function of this layer is to
Access layer
provide network access to the user.
"Refer to the exhibit. According to the
routing table, where will the router send
a packet destined for 10.1.5.65?
Network Interface Next-hop 10.1.1.0/24
e0 directly connected 10.1.2.0/24 e1
10.1.3.3 directly connected 10.1.3.0/25 s0
directly connected 10.1.4.0/24 s1
directly connected 10.1.5.0/24 e0
10.1.1.2 10.1.5.64/28 e1 10.1.2.2
10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1
10.1.4.4"
The correct answer is VLANis a switching technology that
'True'. reduces the size of a broadcast domain.
Static route If your routing table has a static, a RIP,
and an OSPF route to the same network,
which route will be used to route
packets by default?
Which of the following is the command
ip default-gateway
to configure the switch default gateway
172.10.90.1
with IP address of 172.10.90.1?
Load balancing allows a
router to forward packets Which of the statements describe
over multiple paths to the characteristic of load balancing?
same destination network.
Which of the following is NOT a
All of the choices
characteristics of a network?
Which of the following is an element of
All of the choices
converged network?
This is the path over which the data is
transferred in a network. It describes
logical topology
how the network devices appear
connected to network users.
This type of attack takes advantage of
the way that hardware on most switches
operates. Most switches perform only
Double Tagging Attack
one level of 802.1Q de- encapsulation,
which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
What is the command to set the IP
ip address 192.168.10.2 address (192.168.10.2) and subnet mask
255.255.0.0 (255.255.0.0) for specific Fast Ethernet
interface?
The AJ company has a small network.
The network consists of one switch and
one router. The switch has been
configured with two VLANs. The router
has been configured as a router-on- a-
two stick to allow inter-VLAN routing. A
trunk is configured to connect the switch
to the router. Whatis the minimum
number of router subinterfaces that are
required for all the VLANs to
communicate?
A protocol that provides an encrypted
SSH
connection to a remote device.
This is the practice of inserting a VLAN
ID into a packet header in order to
VLAN tagging
identify which VLAN (Virtual Local Area
Network) the packet belongs to.
"Which two statements correctly
describe the components of a router? 1.
RAM permanently stores the
configuration file used during the boot
sequence. 2. ROM contains diagnostics
executed on hardware modules. 3.
NVRAM stores a backup copy of the IOS
2&4
used during the boot sequence. 4. Flash
memory does not lose its contents
during a reboot. 5. ROM contains the
most current and most complete version
of the IOS. 6. Flash contains boot system
commands to identify the location of the
IOS"
The FastEthernet 0/0
Refer to the exhibit. Which statement
interface on Router1 must
are true about interVLAN routing in the
be configured with
topology that is shown in the exhibit?
subinterfaces.
Telnet DoS attack In this attack, the attacker exploits a
flaw in the Telnet server software
running on the switch that renders the
Telnet service unavailable. This sort of
attack prevents an administrator from
remotely accessing switch management
functions. This can be combined with
other direct attacks on the network as
part of a coordinated attempt to prevent
the network administrator from
accessing core devices during the
breach.
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
ISL & IEEE 802.1q Which are the 2 trunking protocols?
If your routing table has a static, a RIP,
and an IGRP route to the same network,
Static route
which route will be used to route
packets by default?
4&5 "Which two statements correctly
describe the concepts of administrative
distance and metric? (Choose two.) 1.
The metric varies depending which Layer
3 protocol is being routed, such as IP. 2.
A router first installs routes with higher
administrative distances. 3. The value of
the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
DHCP spoofing attack Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
This is the path over which the data is
transferred in a network. It describes
logical topology
how the network devices appear
connected to network users.
This is used between a network device
and server or other device that is
Trunks
equipped with an appropriate 802.1Q-
capable NIC.
ISL & IEEE 802.1q Which are the 2 trunking protocols?
This type of attack takes advantage of
the way that hardware on most switches
operates. Most switches perform only
Double Tagging Attack
one level of 802.1Q de- encapsulation,
which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
The default VLAN for Cisco switches is
VLAN 1
____________________.
This memory provides temporary
storage for various applications and
RAM processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
"Which two network parameters are
used by EIGRP as metrics to select the
2&5 best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5.
delay 6. confidentiality"
"Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
2&3 The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
Which of the following is the command
ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not 255.255.255.0. However, when the
been activated. administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
Which protocols are used to configure
802.1q
trunking on a switch?
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
There is an activity and the In the Switch port LED status, if the LED
port is sending or receiving is blinking green what is the status of
data. switch?
The _____ switches typically come with
different sized chassis that allow for the
Modular configuration
installation of different numbers of line
card.
Which of the following is an element of
All of the choices
converged network?
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
If the port is assigned to the wrong
VLAN, what command to be command
switchport access vlan
to change the VLAN membership on a
particular port?
This is a conduit for multiple VLANs
Trunks
between switches and routers.
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
Implement a router-on-a- A router has two FastEthernet interfaces
stick configuration. and needs to connect to four vlans in the
local network. How can you accomplish
this task, using the fewest physical
interfaces and without decreasing
network performance?
Routers compare metrics Which statement is true regarding
to determine the best path. routing metrics?
Which of the following is the command
ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
Refer to the exhibit. A router-on-a-stick
configuration was implemented for
VLANs 15, 30, and 45, according to the
There is an incorrect IP show running-config command output.
address configured on PCs on VLAN 45 that are using the
GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
"Which of the following are 2 primary
functions of a router? 1. Packet
2&4 switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
The primary function of this layer is to
Access layer
provide network access to the user.
Which of the following is NOT a
All of the choices
characteristics of a network?
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
ISL & IEEE 802.1q Which are the 2 trunking protocols?
The port is operating at What is the status of the Port speed LED
1000 Mbps. if the LED light is blinking green?
2, 4, 5 "Which three elements must be used
when you configure a router interface for
VLAN trunking? 1. one physical interface
for each subinterface 2. one IP network
or subnetwork for each subinterface 3. a
management domain for each
subinterface 4. subinterface
encapsulation identifiers that match
VLAN tags 5. one subinterface per VLAN
6. subinterface numbering that matches
VLAN tags"
This layer provides intelligent switching,
routing, and network access policy
Distribution layer
functions to access the rest of the
network.
The ________________ switches do
not support features or options beyond
Fixed configuration
those that originally came with the
switch.
Which protocols are used to configure
802.1q
trunking on a switch?
This memory stores router bootup
ROM instructions and basic diagnostic
software.
A switch is configured with all ports
assigned to vlan 2 with full duplex
An additional broadcast FastEthernet to segment existing
domain will be created. departmental traffic. What is the effect
of adding switch ports to a new VLAN on
the switch?
ISL & IEEE 802.1q Which are the 2 trunking protocols?
Refer to the exhibit below. Which two
1&5 statements about the configuration of
the switch interface are correct?
The interface fa0/0 has not A network administrator configures the
been activated. interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
255.255.255.0. However, when the
administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
"Which two statements correctly
describe the concepts of administrative
distance and metric? 1. The metric varies
depending which Layer 3 protocol is
being routed, such as IP. 2. A router first
installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
Which of the following is the command
name employee to specify a VLAN name? Name of VLAN
is employee.
two The AJ company has a small network.
The network consists of one switch and
one router. The switch has been
configured with two VLANs. The router
has been configured as a router-on- a-
stick to allow inter-VLAN routing. A
trunk is configured to connect the switch
to the router. Whatis the minimum
number of router subinterfaces that are
required for all the VLANs to
communicate?
Refer to the exhibit. The two connected
ports on the switch are not turning
2, 4, 6 orange or green. What would be the
most effective steps to troubleshoot
this physical layer problem?
If your routing table has a static, a RIP,
and an IGRP route to the same network,
Static route
which route will be used to route
packets by default?
This is a protocol that is used to
synchronize the clocks of computer
Network Time Protocol
systems over packet-switched, variable-
latency data networks.
This memory provides temporary
storage for various applications and
RAM processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
Which of the following is the command
ip default-gateway
to configure the switch default gateway
172.10.90.1
with IP address of 172.10.90.1?
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
Telnet DoS attack In this attack, the attacker exploits a
flaw in the Telnet server software
running on the switch that renders the
Telnet service unavailable. This sort of
attack prevents an administrator from
remotely accessing switch management
functions. This can be combined with
other direct attacks on the network as
part of a coordinated attempt to prevent
the network administrator from
accessing core devices during the
breach.
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
Which two link protocols are used to
802.1q & ISL
carry multiple VLANs over a single link?
The _____ switches typically come with
different sized chassis that allow for the
Modular configuration
installation of different numbers of line
card.
"Which two network parameters are
used by EIGRP as metrics to select the
2&5 best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5.
delay 6. confidentiality"
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
A router has two FastEthernet interfaces
and needs to connect to four vlans in the
Implement a router-on-a- local network. How can you accomplish
stick configuration. this task, using the fewest physical
interfaces and without decreasing
network performance?
Which of the following describes a
None of the choices
VLAN?
This layer provide fault isolation and
Core layer
high-speed backbone onnectivity.
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
Refer to the exhibit. A router-on-a-stick
configuration was implemented for
VLANs 15, 30, and 45, according to the
There is an incorrect IP show running-config command output.
address configured on PCs on VLAN 45 that are using the
GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
There is an activity and the In the Switch port LED status, if the LED
port is sending or receiving is blinking green what is the status of
data. switch?
What is the command to set the IP
ip address 192.168.10.2 address (192.168.10.2) and subnet mask
255.255.0.0 (255.255.0.0) for specific Fast Ethernet
interface?
Which is the VLAN not tagged by
Native VLAN
802.1q?
If the port is assigned to the wrong
VLAN, what command to be command
switchport access vlan
to change the VLAN membership on a
particular port?
A directly connected What route would have the lowest
network administrative distance?
4&5 "Which two statements correctly
describe the concepts of administrative
distance and metric? 1. The metric varies
depending which Layer 3 protocol is
being routed, such as IP. 2. A router first
installs routes with higher
administrative distances. 3. The value of
the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
ISL & IEEE 802.1q Which are the 2 trunking protocols?
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
DHCP spoofing attack Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
ISL & IEEE 802.1q Which are the 2 trunking protocols?
logical topology This is the path over which the data is
transferred in a network. It describes
how the network devices appear
connected to network users.
If your routing table has a static, a RIP,
and an IGRP route to the same network,
Static route
which route will be used to route
packets by default?
"Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
2&3 The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
"Which two network parameters are
used by EIGRP as metrics to select the
2&5 best path to reach a network? 1. Jitter 2.
bandwidth 3. resiliency 4. hop count 5.
delay 6. confidentiality"
Which of the following is the command
ip domain-name
to configure the IP domain name of the
mycompany.com
network (mycompany.com)
This is the practice of inserting a VLAN
ID into a packet header in order to
VLAN tagging
identify which VLAN (Virtual Local Area
Network) the packet belongs to.
2, 4, 6 Refer to the exhibit. The two connected
ports on the switch are not turning
orange or green. What would be the
most effective steps to troubleshoot
this physical layer problem?
If the port is assigned to the wrong
VLAN, what command to be command
switchport access vlan
to change the VLAN membership on a
particular port?
Network infrastructure devices require IP
addresses to enable remote
management. Using the device IP
None in the choices
address, the network administrator can
remotely connect to the device using any
of the following EXCEPT
The primary function of this layer is to
Access layer
provide network access to the user.
Which is the VLAN not tagged by
Native VLAN
802.1q?
"To enable network access to a remote
destination, what three pieces of
information must be configured on a
1, 5, 6
host? 1. default gateway 2. hostname 3.
DNS server address 4. DHCP server
address 5. IP address 6. subnet mask"
This is a conduit for multiple VLANs
Trunks
between switches and routers.
A network administrator configures the
interface fa0/0 on the router R1 with the
command ip address 172.16.1.254
The interface fa0/0 has not 255.255.255.0. However, when the
been activated. administrator issues the command show
ip route, the routing table does not show
the directly connected network. What is
the possible cause of the problem?
The gateway for Server A is Refer to the exhibit. The user at
not on the same subnet. Workstation B reports that Server A
cannot be reached. What is preventing
Workstation B from reaching Server A?
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
The FastEthernet 0/0
Refer to the exhibit. Which statement
interface on Router1 must
are true about interVLAN routing in the
be configured with
topology that is shown in the exhibit?
subinterfaces.
Configurations are stored within a VLAN
vlan.dat
database file, called
"Which two statements correctly
describe the concepts of administrative
distance and metric? 1. The metric varies
depending which Layer 3 protocol is
being routed, such as IP. 2. A router first
installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
Which of the following is an element of
All of the choices
converged network?
This layer provide fault isolation and
Core layer
high-speed backbone onnectivity.
The _____ switches typically come with
different sized chassis that allow for the
Modular configuration
installation of different numbers of line
card.
The _____ switches typically come with
different sized chassis that allow for the
Modular configuration
installation of different numbers of line
card.
"Which two statements correctly
describe the concepts of administrative
distance and metric? 1. The metric varies
depending which Layer 3 protocol is
being routed, such as IP. 2. A router first
installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
This is the arrangement of the cables,
network devices, and end systems. It
physical topology describes how the network devices are
actually interconnected with wires and
cables.
RAM This memory provides temporary
storage for various applications and
processes, including the running IOS, the
running configuration file, IP routing
table, Ethernet ARP table.
Which command is used to configure an
IPv6 address on a router interface so
ipv6 address ipv6-
that the router will combine a manually
address/prefix-length eui-
specified network prefix with an
64
automatically generated interface
identifier?
This layer provide fault isolation and
Core layer
high-speed backbone onnectivity.
Refer to the exhibit. A router-on-a-stick
configuration was implemented for
VLANs 15, 30, and 45, according to the
There is an incorrect IP show running-config command output.
address configured on PCs on VLAN 45 that are using the
GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having
trouble connecting to PCs on VLAN 30 in
the 172.16.30.0 /24 network. Which
error is most likely causing this problem?
Do not use the dynamic What is the best practice relative to
auto or dynamic desirable. switch port modes?
The following are VLAN best practices
None of the choices
EXCEPT?
"Which two statements correctly
describe the components of a router? 1.
RAM permanently stores the
configuration file used during the boot
sequence. 2. ROM contains diagnostics
executed on hardware modules. 3.
NVRAM stores a backup copy of the IOS
2&4
used during the boot sequence. 4. Flash
memory does not lose its contents
during a reboot. 5. ROM contains the
most current and most complete version
of the IOS. 6. Flash contains boot system
commands to identify the location of the
IOS"
ISL & IEEE 802.1q Which are the 2 trunking protocols?
The AJ company has a small network.
The network consists of one switch and
one router. The switch has been
configured with two VLANs. The router
has been configured as a router-on- a-
two stick to allow inter-VLAN routing. A
trunk is configured to connect the switch
to the router. Whatis the minimum
number of router subinterfaces that are
required for all the VLANs to
communicate?
Refer to the exhibit. The user at
The gateway for Server A is Workstation B reports that Server A
not on the same subnet. cannot be reached. What is preventing
Workstation B from reaching Server A?
This is a point-to-point link between two
Trunks network devices that carries more than
one VLAN.
This is a protocol that is used to
synchronize the clocks of computer
Network Time Protocol
systems over packet-switched, variable-
latency data networks.
Process, Fast, Cisco Express Routers support three packet-
Forwarding forwarding mechanisms. These are
There is an activity and the In the Switch port LED status, if the LED
port is sending or receiving is blinking green what is the status of
data. switch?
This type of attack takes advantage of
the way that hardware on most switches
operates. Most switches perform only
Double Tagging Attack
one level of 802.1Q de- encapsulation,
which allows an attacker to embed a
hidden 802.1Q tag inside the frame.
Telnet DoS attack In this attack, the attacker exploits a
flaw in the Telnet server software
running on the switch that renders the
Telnet service unavailable. This sort of
attack prevents an administrator from
remotely accessing switch management
functions. This can be combined with
other direct attacks on the network as
part of a coordinated attempt to prevent
the network administrator from
accessing core devices during the
breach.
"Which two link protocols are used to
2&4 carry multiple VLANs over a single link?
1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"
Routers support a variety of
interface types. Switches What is one feature that distinguishes
typically support Ethernet routers from Layer 2 switches?
interfaces.
"Which two features are characteristics
of flash memory? 1. The contents of
flash may be lost during a power cycle. 2.
Flash provides nonvolatile storage. 3.
2&3 The contents of flash may be
overwritten. 4. Flash is a component in
Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from
RAM when a device is powered on."
Stackable that are arranged one on top
of the other with cables linking the
Daisy Chain
switches in a _____________
connection.
To troubleshoot issues when a trunk is
not forming or when VLAN leaking is
show interfaces trunk occurring, what command to be used to
check whether the local and peer native
VLANs match?
What type of DHCP attack where in an
attacker configures a fake DHCP server
on the network to issue DHCP addresses
to clients. The normal reason for this
attack is to force the clients to use false
DHCP spoofing attack Domain Name System (DNS) or
Windows Internet Naming Service
(WINS) servers and to make the clients
use the attacker, or a machine under the
control of the attacker, as their default
gateway.
"Which two statements correctly
describe the concepts of administrative
distance and metric? (Choose two.) 1.
The metric varies depending which Layer
3 protocol is being routed, such as IP. 2.
A router first installs routes with higher
administrative distances. 3. The value of
4&5 the administrative distance can not be
altered by the network administrator. 4.
Routes with the smallest metric to a
destination indicate the best path. 5.
Administrative distance refers to the
trustworthiness of a particular route. 6.
The metric is always determined based
on hop count."
Network infrastructure devices require IP
addresses to enable remote
management. Using the device IP
None in the choices
address, the network administrator can
remotely connect to the device using any
of the following EXCEPT
Configurations are stored within a VLAN
vlan.dat
database file, called
2&4 "Which of the following are 2 primary
functions of a router? 1. Packet
switching 2. Microsegmentation 3.
Domain name resolution 4. Path
selection 5. Flow control"
Which of the following is an element of
All of the choices
converged network?
"The primary functions of a router are
the following? 1. Packet switching 2.
1&4
Flow control 3. Domain name resolution
4. Path selection 5. Microsegmentation"

Вам также может понравиться