Trunks equipped with an appropriate 802.1Q- capable NIC. A switch forwarding method that makes Store-and-forward a forwarding decision on a frame after it switching has received the entire frame and then checked the frame for errors. A protocol that provides an encrypted SSH connection to a remote device. This layer provides intelligent switching, routing, and network access policy Distribution layer functions to access the rest of the network. SSH protocol by default uses Port 22 ______. Access, distribution and What are the 3 layers of the distribution Core layer access? The _____ switches typically come with different sized chassis that allow for the Modular configuration installation of different numbers of line card. If the port is assigned to the wrong VLAN, what command to be command Switchport access vlan to change the VLAN membership on a particular port? This is a point-to-point link between two Trunks network devices that carries more than one VLAN. Brute force password This attack tries to crack a password on attack another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list. The port is operating at What is the status of the Port speed LED 1000 Mbps. if the LED light is blinking green? This layer is considered as the network Core layer backbone. A type of VLAN that is configured to Data VLAN carry user-generated traffic. The port is operating at What is the status of the Port speed LED 100 Mbps. if the LED light is green? To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? A collection of interconnected switches Broadcast domain forms a _______________________. This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only Double Tagging Attack one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Telnet protocol by default uses Port 23 ______. Which of the following is the command Ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) Dividing Layer 1,2 and 3 networks into multiple physical workgroups Which of the following is NOT a benefit reduces unnecessary traffic of VLAN? on the network and boosts performance. Which of the following is NOT a feature None of the choices of a Switched Network In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management Telnet DoS attack functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure terminal configure specific elements such as protocols. What is the command to enter global configuration mode? between 1006 and 4094 The extended range of VLAN ID is Which of the following is NOT an None of the choices element of converged network? A switch forwarding method that begins the forwarding process after the Cut-through switch method destination MAC address of an incoming frame and the egress port has been determined. The default VLAN for Cisco switches is VLAN 1 ____________________. The ________________ switches do not support features or options beyond Fixed configuration those that originally came with the switch. This is a conduit for multiple VLANs Trunks between switches and routers. show vlan In troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN? This is a protocol that is used to synchronize the clocks of computer Network Time Protocol systems over packet-switched, variable- latency data networks. The primary function of this layer is to Access layer provide network access to the user. The network segments that share the Collision domain same bandwidth between devices. This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are Cisco Discovery Protocol directly connected, which allows the devices to auto-configure their connection. Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent DHCP Snooping unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices. VLAN IDs 1002 through 1005 are All of the Choices reserved for What is the command to assign the port switchport access vlanvlan- to a particular VLAN when the interface id is in access mode? DHCP spoofing attack What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. Which of the following is the command Ip default-gateway to configure the switch default gateway 172.10.90.1 with IP address of 172.10.90.1? Sometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases Full duplex mode effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously. What is the command to create a VLAN Vlan 30 with a valid VLAN ID number 30? This layer provide fault isolation and Core layer high-speed backbone connectivity. A type of VLAN that is defined in the IEEE 802.1Q specification to maintain Native VLAN backward compatibility with untagged traffic common to legacy LAN scenarios. The following are switch port modes Remote that DTP offers EXCEPT This is the practice of inserting a VLAN ID into a packet header in order to VLAN tagging identify which VLAN (Virtual Local Area Network) the packet belongs to. Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. Dynamic Trunking Protocol Which of the following describes is disable by default. Dynamic Trunking Protocol? What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can DHCP starvation attack issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access. What is the command to configure the speed auto interface to automatically negotiate speed with the connected device? If an error occurs while loading the operating system because of missing or damaged system files, the load loader Mode can be access through a console connection. What button in the switch you need to press while reconnecting the power cord? The following are VLAN best practices Join native VLAN to VLAN. EXCEPT? Configurations are stored within a VLAN vlan.dat database file, called What is the command to set the IP ip address 192.168.10.2 address (192.168.10.2) and subnet mask 255.255.0.0 (255.255.0.0) for specific Fast Ethernet interface? There is activity and the In the Switch port LED status, if the LED port is sending or receiving is blinking green what is the status of data. switch? This is used to connect a PC to the Console cable console port of a switch for configuration. Which of the following is the command name employee to specify a VLAN name? Name of VLAN is employee. VLANs are based on logical Which of the following describes a connections, instead of VLAN? physical connections. What is the command used to determine show ip interface brief the status of both physical and virtual interfaces including IP address? A switch populates the MAC address table based Which of the following statement is on destination MAC INCORRECT? addresses. Which is the VLAN not tagged by Native VLAN 802.1q? A router has two FastEthernet interfaces and needs to connect to four vlans in the Implement a router-on-a- local network. How can you accomplish stick configuration. this task, using the fewest physical interfaces and without decreasing network performance? To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? logical topology This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users. The following are VLAN best practices None of the choices EXCEPT? This layer provide fault isolation and Core layer high-speed backbone onnectivity. This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. "Which two network parameters are used by EIGRP as metrics to select the 2&5 best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" This is a conduit for multiple VLANs Trunks between switches and routers. Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the There is an incorrect IP show running-config command output. address configured on PCs on VLAN 45 that are using the GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? If the port is assigned to the wrong VLAN, what command to be command switchport access vlan to change the VLAN membership on a particular port? Double Tagging Attack This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? Routers compare metrics Which statement is true regarding to determine the best path. routing metrics? This memory provides temporary storage for various applications and RAM processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. The primary function of this layer is to Access layer provide network access to the user. Which of the following is the command ip default-gateway to configure the switch default gateway 172.10.90.1 with IP address of 172.10.90.1? A protocol that provides an encrypted SSH connection to a remote device. "Which of the following are 2 primary functions of a router? 1. Packet 2&4 switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" Refer to the exhibit below. Which two 1&5 statements about the configuration of the switch interface are correct? If your routing table has a static, a RIP, and an OSPF route to the same network, Static route which route will be used to route packets by default? Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. The network segments that share the Collision domain same bandwidth between devices. Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? A type of VLAN that is configured to Data VLAN carry user-generated traffic. "To enable network access to a remote destination, what three pieces of information must be configured on a 1, 5, 6 host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask" What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false DHCP spoofing attack Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? This is the practice of inserting a VLAN ID into a packet header in order to VLAN tagging identify which VLAN (Virtual Local Area Network) the packet belongs to. DHCP starvation attack What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests to use all the available IP addresses that the DHCP server can issue. After these IP addresses are issued, the server cannot issue any more addresses, and this situation produces a denial-of-service (DoS) attackas new clients cannot obtain network access. This is used between a network device and server or other device that is Trunks equipped with an appropriate 802.1Q- capable NIC. Which of the following is the command ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. Which of the following describes a None of the choices VLAN? "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. 2&3 The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." A directly connected What route would have the lowest network administrative distance? The ________________ switches do not support features or options beyond Fixed configuration those that originally came with the switch. Cisco Discovery Protocol This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection. It is a logical interface What is a characteristic of an IPv4 internal to the router. loopback interface on a Cisco IOS router? Which protocolis used to configure 802.1q trunking on a switch? Which protocols are used to configure 802.1q trunking on a switch? "Which two link protocols are used to 2&4 carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." This is a conduit for multiple VLANs Trunks between switches and routers. It is a logical interface What is a characteristic of an IPv4 internal to the router. loopback interface on a Cisco IOS router? 1&5 Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct? Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? Which of the following is the command ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? Which is the VLAN not tagged by Native VLAN 802.1q? "Which of the following are 2 primary functions of a router? 1. Packet 2&4 switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. A directly connected What route would have the lowest network administrative distance? DHCP spoofing attack What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. The following are VLAN best practices None of the choices EXCEPT? If the port is assigned to the wrong VLAN, what command to be command switchport access vlan to change the VLAN membership on a particular port? Network infrastructure devices require IP addresses to enable remote management. Using the device IP None in the choices address, the network administrator can remotely connect to the device using any of the following EXCEPT Which of the following is NOT a All of the choices characteristics of a network? Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the There is an incorrect IP show running-config command output. address configured on PCs on VLAN 45 that are using the GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? Trunks This is used between a network device and server or other device that is equipped with an appropriate 802.1Q- capable NIC. This is a protocol that is used to synchronize the clocks of computer Network Time Protocol systems over packet-switched, variable- latency data networks. "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 5 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? If your routing table has a static, a RIP, and an IGRP route to the same network, Static route which route will be used to route packets by default? The FastEthernet 0/0 Refer to the exhibit. Which statement interface on Router1 must are true about interVLAN routing in the be configured with topology that is shown in the exhibit? subinterfaces. "The primary functions of a router are the following? 1. Packet switching 2. 1&4 Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation" Refer to the exhibit. The two connected ports on the switch are not turning 2, 4, 6 orange or green. What would be the most effective steps to troubleshoot this physical layer problem? Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? This is the path over which the data is transferred in a network. It describes logical topology how the network devices appear connected to network users. "Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides 2&3 nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle." Which protocols are used to configure 802.1q trunking on a switch? A router has two FastEthernet interfaces and needs to connect to four vlans in the Implement a router-on-a- local network. How can you accomplish stick configuration. this task, using the fewest physical interfaces and without decreasing network performance? A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not 255.255.255.0. However, when the been activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? "Which two link protocols are used to 2&4 carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" This is a point-to-point link between two Trunks network devices that carries more than one VLAN. This memory stores router bootup ROM instructions and basic diagnostic software. The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a- two stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? The ________________ switches do not support features or options beyond Fixed configuration those that originally came with the switch. This is a point-to-point link between two Trunks network devices that carries more than one VLAN. What is the command to create a VLAN vlan 30 with a valid VLAN ID number 30? This layer provide fault isolation and Core layer high-speed backbone onnectivity. "Which two link protocols are used to 2&4 carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" All of the choices Which of the following is an element of converged network? Refer to the exhibit. The user at The gateway for Server A is Workstation B reports that Server A not on the same subnet. cannot be reached. What is preventing Workstation B from reaching Server A? Telnet protocol by default uses Port 23 ______. Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? Which of the following is the command name employee to specify a VLAN name? Name of VLAN is employee. In troubleshooting VLANs, what command should be used to check show vlan whether the port belongs to the expected VLAN? Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? There is an incorrect IP Refer to the exhibit. A router-on-a-stick address configured on configuration was implemented for GigabitEthernet 0/0.30.* VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? ISL & IEEE 802.1q Which are the 2 trunking protocols? Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? This memory stores router bootup ROM instructions and basic diagnostic software. "To enable network access to a remote destination, what three pieces of information must be configured on a 1, 5, 6 host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask" A protocol that provides an encrypted SSH connection to a remote device. There is an activity and the In the Switch port LED status, if the LED port is sending or receiving is blinking green what is the status of data. switch? Load balancing allows a router to forward packets Which statement describe a over multiple paths to the characteristicof load balancing? same destination network. Configurations are stored within a VLAN vlan.dat database file, called 2&3 "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." This memory provides temporary storage for various applications and RAM processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. Load balancing allows a router to forward packets Which of the statements describe over multiple paths to the characteristic of load balancing? same destination network. This is a protocol that is used to synchronize the clocks of computer Network Time Protocol systems over packet-switched, variable- latency data networks. The FastEthernet 0/0 Refer to the exhibit. Which statement interface on Router1 must are true about interVLAN routing in the be configured with topology that is shown in the exhibit? subinterfaces. Routers compare metrics Which statement is true regarding to determine the best path. routing metrics? The default VLAN for Cisco switches is VLAN 1 ____________________. DHCP spoofing attack What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. Which is the VLAN not tagged by Native VLAN 802.1q? Which of the following is NOT a All of the choices characteristics of a network? "Which of the following are 2 primary functions of a router? 1. Packet 2&4 switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" "Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 10.1.3.3 directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4" Which protocolis used to configure 802.1q trunking on a switch? "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 5 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" Which of the following is the command ip default-gateway to configure the switch default gateway 172.10.90.1 with IP address of 172.10.90.1? A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not 255.255.255.0. However, when the been activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? Which of the following describes All of the choices Dynamic Trunking Protocol? A directly connected What route would have the lowest network administrative distance? A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not 255.255.255.0. However, when the been activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? Telnet DoS attack In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? In troubleshooting VLANs, what command should be used to check show vlan whether the port belongs to the expected VLAN? This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the no shutdown interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? "True of False. Ingress is used to The correct answer is describe frames leaving the device 'False'. through a particular port." "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a 2, 4, 5 management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" 1&4 "The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation" What is the command to create a VLAN vlan 30 with a valid VLAN ID number 30? Which of the following describes a None of the choices VLAN? "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." A switch is configured with all ports assigned to vlan 2 with full duplex An additional broadcast FastEthernet to segment existing domain will be created. departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? The correct answer is VLAN is a switching technology that 'True'. reduces the size of a broadcast domain. Refer to the exhibit. The two connected ports on the switch are not turning 2, 4, 6 orange or green. What would be the most effective steps to troubleshoot this physical layer problem? A type of VLAN that is configured to Data VLAN carry user-generated traffic. The network segments that share the Collision domain same bandwidth between devices. "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS 2&4 used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS" This layer provides intelligent switching, routing, and network access policy Distribution layer functions to access the rest of the network. Which protocolis used to configure 802.1q trunking on a switch? no shutdown Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up? "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. 2&3 The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." The following are VLAN best practices None of the choices EXCEPT? The correct answer is Router On Stick is a method used for 'True'. communicating inter-vlan using a router. "Which two link protocols are used to 2&4 carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" This is used between a network device and server or other device that is Trunks equipped with an appropriate 802.1Q- capable NIC. "Which of the following are 2 primary functions of a router? 1. Packet 2&4 switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" 4&5 "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." ISL & IEEE 802.1q Which are the 2 trunking protocols? Configurations are stored within a VLAN vlan.dat database file, called This memory provides temporary storage for various applications and RAM processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. The port is operating at What is the status of the Port speed LED 1000 Mbps. if the LED light is blinking green? Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are The primary function of this layer is to Access layer provide network access to the user. "Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65? Network Interface Next-hop 10.1.1.0/24 e0 directly connected 10.1.2.0/24 e1 10.1.3.3 directly connected 10.1.3.0/25 s0 directly connected 10.1.4.0/24 s1 directly connected 10.1.5.0/24 e0 10.1.1.2 10.1.5.64/28 e1 10.1.2.2 10.1.5.64/29 s0 10.1.3.3 10.1.5.64/27 s1 10.1.4.4" The correct answer is VLANis a switching technology that 'True'. reduces the size of a broadcast domain. Static route If your routing table has a static, a RIP, and an OSPF route to the same network, which route will be used to route packets by default? Which of the following is the command ip default-gateway to configure the switch default gateway 172.10.90.1 with IP address of 172.10.90.1? Load balancing allows a router to forward packets Which of the statements describe over multiple paths to the characteristic of load balancing? same destination network. Which of the following is NOT a All of the choices characteristics of a network? Which of the following is an element of All of the choices converged network? This is the path over which the data is transferred in a network. It describes logical topology how the network devices appear connected to network users. This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only Double Tagging Attack one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. What is the command to set the IP ip address 192.168.10.2 address (192.168.10.2) and subnet mask 255.255.0.0 (255.255.0.0) for specific Fast Ethernet interface? The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a- two stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? A protocol that provides an encrypted SSH connection to a remote device. This is the practice of inserting a VLAN ID into a packet header in order to VLAN tagging identify which VLAN (Virtual Local Area Network) the packet belongs to. "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS 2&4 used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS" The FastEthernet 0/0 Refer to the exhibit. Which statement interface on Router1 must are true about interVLAN routing in the be configured with topology that is shown in the exhibit? subinterfaces. Telnet DoS attack In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? This is a point-to-point link between two Trunks network devices that carries more than one VLAN. ISL & IEEE 802.1q Which are the 2 trunking protocols? If your routing table has a static, a RIP, and an IGRP route to the same network, Static route which route will be used to route packets by default? 4&5 "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false DHCP spoofing attack Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. This is the path over which the data is transferred in a network. It describes logical topology how the network devices appear connected to network users. This is used between a network device and server or other device that is Trunks equipped with an appropriate 802.1Q- capable NIC. ISL & IEEE 802.1q Which are the 2 trunking protocols? This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only Double Tagging Attack one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. The default VLAN for Cisco switches is VLAN 1 ____________________. This memory provides temporary storage for various applications and RAM processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. "Which two network parameters are used by EIGRP as metrics to select the 2&5 best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. 2&3 The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." Which of the following is the command ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not 255.255.255.0. However, when the been activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? Which protocols are used to configure 802.1q trunking on a switch? Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? There is an activity and the In the Switch port LED status, if the LED port is sending or receiving is blinking green what is the status of data. switch? The _____ switches typically come with different sized chassis that allow for the Modular configuration installation of different numbers of line card. Which of the following is an element of All of the choices converged network? This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are If the port is assigned to the wrong VLAN, what command to be command switchport access vlan to change the VLAN membership on a particular port? This is a conduit for multiple VLANs Trunks between switches and routers. Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. Implement a router-on-a- A router has two FastEthernet interfaces stick configuration. and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance? Routers compare metrics Which statement is true regarding to determine the best path. routing metrics? Which of the following is the command ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the There is an incorrect IP show running-config command output. address configured on PCs on VLAN 45 that are using the GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? "Which of the following are 2 primary functions of a router? 1. Packet 2&4 switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? The primary function of this layer is to Access layer provide network access to the user. Which of the following is NOT a All of the choices characteristics of a network? Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are ISL & IEEE 802.1q Which are the 2 trunking protocols? The port is operating at What is the status of the Port speed LED 1000 Mbps. if the LED light is blinking green? 2, 4, 5 "Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags" This layer provides intelligent switching, routing, and network access policy Distribution layer functions to access the rest of the network. The ________________ switches do not support features or options beyond Fixed configuration those that originally came with the switch. Which protocols are used to configure 802.1q trunking on a switch? This memory stores router bootup ROM instructions and basic diagnostic software. A switch is configured with all ports assigned to vlan 2 with full duplex An additional broadcast FastEthernet to segment existing domain will be created. departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? ISL & IEEE 802.1q Which are the 2 trunking protocols? Refer to the exhibit below. Which two 1&5 statements about the configuration of the switch interface are correct? The interface fa0/0 has not A network administrator configures the been activated. interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." Which of the following is the command name employee to specify a VLAN name? Name of VLAN is employee. two The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a- stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? Refer to the exhibit. The two connected ports on the switch are not turning 2, 4, 6 orange or green. What would be the most effective steps to troubleshoot this physical layer problem? If your routing table has a static, a RIP, and an IGRP route to the same network, Static route which route will be used to route packets by default? This is a protocol that is used to synchronize the clocks of computer Network Time Protocol systems over packet-switched, variable- latency data networks. This memory provides temporary storage for various applications and RAM processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. Which of the following is the command ip default-gateway to configure the switch default gateway 172.10.90.1 with IP address of 172.10.90.1? This is a point-to-point link between two Trunks network devices that carries more than one VLAN. Telnet DoS attack In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are Which two link protocols are used to 802.1q & ISL carry multiple VLANs over a single link? The _____ switches typically come with different sized chassis that allow for the Modular configuration installation of different numbers of line card. "Which two network parameters are used by EIGRP as metrics to select the 2&5 best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. A router has two FastEthernet interfaces and needs to connect to four vlans in the Implement a router-on-a- local network. How can you accomplish stick configuration. this task, using the fewest physical interfaces and without decreasing network performance? Which of the following describes a None of the choices VLAN? This layer provide fault isolation and Core layer high-speed backbone onnectivity. Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the There is an incorrect IP show running-config command output. address configured on PCs on VLAN 45 that are using the GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? There is an activity and the In the Switch port LED status, if the LED port is sending or receiving is blinking green what is the status of data. switch? What is the command to set the IP ip address 192.168.10.2 address (192.168.10.2) and subnet mask 255.255.0.0 (255.255.0.0) for specific Fast Ethernet interface? Which is the VLAN not tagged by Native VLAN 802.1q? If the port is assigned to the wrong VLAN, what command to be command switchport access vlan to change the VLAN membership on a particular port? A directly connected What route would have the lowest network administrative distance? 4&5 "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." ISL & IEEE 802.1q Which are the 2 trunking protocols? Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false DHCP spoofing attack Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. ISL & IEEE 802.1q Which are the 2 trunking protocols? logical topology This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users. If your routing table has a static, a RIP, and an IGRP route to the same network, Static route which route will be used to route packets by default? "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. 2&3 The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. "Which two network parameters are used by EIGRP as metrics to select the 2&5 best path to reach a network? 1. Jitter 2. bandwidth 3. resiliency 4. hop count 5. delay 6. confidentiality" Which of the following is the command ip domain-name to configure the IP domain name of the mycompany.com network (mycompany.com) This is the practice of inserting a VLAN ID into a packet header in order to VLAN tagging identify which VLAN (Virtual Local Area Network) the packet belongs to. 2, 4, 6 Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? If the port is assigned to the wrong VLAN, what command to be command switchport access vlan to change the VLAN membership on a particular port? Network infrastructure devices require IP addresses to enable remote management. Using the device IP None in the choices address, the network administrator can remotely connect to the device using any of the following EXCEPT The primary function of this layer is to Access layer provide network access to the user. Which is the VLAN not tagged by Native VLAN 802.1q? "To enable network access to a remote destination, what three pieces of information must be configured on a 1, 5, 6 host? 1. default gateway 2. hostname 3. DNS server address 4. DHCP server address 5. IP address 6. subnet mask" This is a conduit for multiple VLANs Trunks between switches and routers. A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 The interface fa0/0 has not 255.255.255.0. However, when the been activated. administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? The gateway for Server A is Refer to the exhibit. The user at not on the same subnet. Workstation B reports that Server A cannot be reached. What is preventing Workstation B from reaching Server A? Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. This is a point-to-point link between two Trunks network devices that carries more than one VLAN. The FastEthernet 0/0 Refer to the exhibit. Which statement interface on Router1 must are true about interVLAN routing in the be configured with topology that is shown in the exhibit? subinterfaces. Configurations are stored within a VLAN vlan.dat database file, called "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." Which of the following is an element of All of the choices converged network? This layer provide fault isolation and Core layer high-speed backbone onnectivity. The _____ switches typically come with different sized chassis that allow for the Modular configuration installation of different numbers of line card. The _____ switches typically come with different sized chassis that allow for the Modular configuration installation of different numbers of line card. "Which two statements correctly describe the concepts of administrative distance and metric? 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." This is the arrangement of the cables, network devices, and end systems. It physical topology describes how the network devices are actually interconnected with wires and cables. RAM This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table. Which command is used to configure an IPv6 address on a router interface so ipv6 address ipv6- that the router will combine a manually address/prefix-length eui- specified network prefix with an 64 automatically generated interface identifier? This layer provide fault isolation and Core layer high-speed backbone onnectivity. Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the There is an incorrect IP show running-config command output. address configured on PCs on VLAN 45 that are using the GigabitEthernet 0/0.30.* 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem? Do not use the dynamic What is the best practice relative to auto or dynamic desirable. switch port modes? The following are VLAN best practices None of the choices EXCEPT? "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS 2&4 used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS" ISL & IEEE 802.1q Which are the 2 trunking protocols? The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a- two stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate? Refer to the exhibit. The user at The gateway for Server A is Workstation B reports that Server A not on the same subnet. cannot be reached. What is preventing Workstation B from reaching Server A? This is a point-to-point link between two Trunks network devices that carries more than one VLAN. This is a protocol that is used to synchronize the clocks of computer Network Time Protocol systems over packet-switched, variable- latency data networks. Process, Fast, Cisco Express Routers support three packet- Forwarding forwarding mechanisms. These are There is an activity and the In the Switch port LED status, if the LED port is sending or receiving is blinking green what is the status of data. switch? This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only Double Tagging Attack one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Telnet DoS attack In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach. "Which two link protocols are used to 2&4 carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u" Routers support a variety of interface types. Switches What is one feature that distinguishes typically support Ethernet routers from Layer 2 switches? interfaces. "Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. 2&3 The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on." Stackable that are arranged one on top of the other with cables linking the Daisy Chain switches in a _____________ connection. To troubleshoot issues when a trunk is not forming or when VLAN leaking is show interfaces trunk occurring, what command to be used to check whether the local and peer native VLANs match? What type of DHCP attack where in an attacker configures a fake DHCP server on the network to issue DHCP addresses to clients. The normal reason for this attack is to force the clients to use false DHCP spoofing attack Domain Name System (DNS) or Windows Internet Naming Service (WINS) servers and to make the clients use the attacker, or a machine under the control of the attacker, as their default gateway. "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of 4&5 the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count." Network infrastructure devices require IP addresses to enable remote management. Using the device IP None in the choices address, the network administrator can remotely connect to the device using any of the following EXCEPT Configurations are stored within a VLAN vlan.dat database file, called 2&4 "Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" Which of the following is an element of All of the choices converged network? "The primary functions of a router are the following? 1. Packet switching 2. 1&4 Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation"