The first Network:
Two devices are in network if:
Which of the following is true when describing a unique local address?
When creating a pool of global addresses, which of the following can be used instead of the netmask command?
Which of the following is an IEEE standard for frame tagging?
If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface?
A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images?
You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?
What is the subnetwork address for a host with the IP address 200.10.5.68/28?
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?
1.Half-duplex Ethernet operates in a shared collision domain.
2.Half-duplex Ethernet operates in a private collision domain.
3.Half-duplex Ethernet has higher effective throughput.
4.Half-duplex Ethernet has lower effective throughput.
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?
1.Switch
2.NIC
3.Hub
4.Repeater
5.RJ45 transceiver
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational?
Which of the following command options are displayed when you use the Router# show frame-relay ? command?
1.dlci
2.neighbors
3.lmi
4.pvc
5.map
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
Which of the following is true regarding access lists applied to an interface?
Which statement describes a spanning-tree network that has converged?
The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?
Corp#sh ip route
[output cut]
R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C 192.168.20.0 is directly connected, Serial0/0
C 192.168.214.0 is directly connected, FastEthernet0/0
If you delete the contents of NVRAM and reboot the router, what mode will you be in?
Which of the following services use TCP?
1.DHCP
2.SMTP
3.HTTP
4.TFTP
5.FTP
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
The first Network:
Your Answer : (Not Answered)
Correct Answer : D
None.
Two devices are in network if:
Your Answer : (Not Answered)
Correct Answer : A
None.
Which of the following is true when describing a unique local address?
Your Answer : (Not Answered)
Correct Answer : D
These addresses are meant for nonrouting purposes like link-local, but they are almost globally unique so it is unlikely they will have an address overlap. Unique local addresses were designed as a replacement for site-local addresses.
When creating a pool of global addresses, which of the following can be used instead of the netmask command?
Your Answer : (Not Answered)
Correct Answer : B
Instead of the netmask command, you can use the prefix-length
Which of the following is an IEEE standard for frame tagging?
Your Answer : (Not Answered)
Correct Answer : C
802.1Q was created to allow trunked links between disparate switches.
If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback interface?
Your Answer : (Not Answered)
Correct Answer : B
At the moment of OSPF process startup, the highest IP address on any active interface will be the Router ID (RID) of the router. If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically.
A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images?
Your Answer : (Not Answered)
Correct Answer : A
The show flash command will provide you with the current IOS name and size and the size of flash memory.
You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?
Your Answer : (Not Answered)
Correct Answer : C
If you save a configuration and reload the router and it comes up either in setup mode or as a blank configuration, chances are you have the configuration register setting incorrect.
What is the subnetwork address for a host with the IP address 200.10.5.68/28?
Your Answer : (Not Answered)
Correct Answer : C
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
Your Answer : (Not Answered)
Correct Answer : A
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet.
Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?
1.Half-duplex Ethernet operates in a shared collision domain.
2.Half-duplex Ethernet operates in a private collision domain.
3.Half-duplex Ethernet has higher effective throughput.
4.Half-duplex Ethernet has lower effective throughput.
Your Answer : (Not Answered)
Correct Answer : C
Unlike full duplex, half-duplex Ethernet operates in a shared collision domain, and it has a lower effective throughput than full duplex.
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment?
1.Switch
2.NIC
3.Hub
4.Repeater
5.RJ45 transceiver
Your Answer : (Not Answered)
Correct Answer : C
Not that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this for you.
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational?
Your Answer : (Not Answered)
Correct Answer : B
If you have a router in your Frame Relay network that does not support IARP, you must create Frame Relay maps on your router, which provide known DLCI-to-IP address mappings.
Which of the following command options are displayed when you use the Router# show frame-relay ? command?
1.dlci
2.neighbors
3.lmi
4.pvc
5.map
Your Answer : (Not Answered)
Correct Answer : C
The show frame-relay ? command provides many options, but the options available in this question are lmi, pvc, and map.
You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
Your Answer : (Not Answered)
Correct Answer : A
First, you must know that a /19 is 255.255.224.0, which is a block size of 32 in the third octet. Counting by 32, this makes our subnet 192 in the third octet, and the wildcard for the third octet would be 31 since the wildcard is always one less than the block size.
Which of the following is true regarding access lists applied to an interface?
Your Answer : (Not Answered)
Correct Answer : C
A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface.
Which statement describes a spanning-tree network that has converged?
Your Answer : (Not Answered)
Correct Answer : C
Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.
The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?
Corp#sh ip route
[output cut]
R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C 192.168.20.0 is directly connected, Serial0/0
C 192.168.214.0 is directly connected, FastEthernet0/0
Your Answer : (Not Answered)
Correct Answer : A
Since the routing table shows no route to the 192.168.22.0 network, the router will discard the packet and send an ICMP destination unreachable message out interface FastEthernet 0/0, which is the source LAN where the packet originated from.
If you delete the contents of NVRAM and reboot the router, what mode will you be in?
Your Answer : (Not Answered)
Correct Answer : C
If you delete the startup-config and reload the router, the router will automatically enter setup mode. You can also type setup from privileged mode at any time.
Which of the following services use TCP?
1.DHCP
2.SMTP
3.HTTP
4.TFTP
5.FTP
Your Answer : (Not Answered)
Correct Answer : B
SMTP, HTTP and FTP use TCP.
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
We'll write only best content for you