Routing Protocols
Switch Theory
OSI Model
Cisco Security
Subnetting
100
What does EIGRP stand for?
What is Enhanced Interior Gateway Routing Protocol.
100
(Finish the Statement) By default, all the switch interfaces are _________ so that the devices can connect?
What is Turned on
100
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? A. session B. transport C. network D. data link E. physical
What is D. Data Link
100
How does using the service password-encryption command on a router provide additional security? A. by encrypting all passwords passing through the router B. by encrypting passwords in the plain text configuration file C. by requiring entry of encrypted passwords for access to the device D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges E. by automatically suggesting encrypted passwords for use in configuring the router
What is B.
100
What is the class D addressing range?
What is 224.0.0.0 - 239.255.255.255
200
What is the default Encapsulation type for a Cisco router? A. ANSI Annex D B. Q9333-A C. Frame Relay D. HDLC
What is D.
200
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used? A. standard B. extended C. dynamic D. reflexive
What is C
200
Where does routing occur within the DoD TCP/IP reference model? A. application B. internet C. network D. Data Link
What is B. Internet TCP/IP not OSI
200
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This is a 10 Mb/s switch port. B. This is a 100 Mb/s switch port. C. This is an Ethernet port operating at half duplex. D. This is a port on a network interface card in a PC.
What is C. Ethernet port at half duplex
200
What is the first valid host of the network that host 172.25.25.25/24 belongs to?
What is 172.25.25.1 Standard class C
300
What OSPF command, when configured, will include all interfaces into area 0? A. network 0.0.0.0 255.255.255.255 area 0 B. network 0.0.0.0 0.0.0.0 area 0 C. network 255.255.255.255 0.0.0.0 area 0 D. network all-interfaces area 0
What is A
300
A network administrator needs to configure port security on a switch. Which statement is true? A. The network administrator can apply port security to dynamic access ports. B. The network administrator can apply port security to EtherChannels. C. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined. D. The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.
What is C.
300
How does a DHCP server dynamically assign IP addresses to hosts? A. Addresses are permanently assigned so that the host uses the same address at all times. B. Addresses are assigned for a fixed period of time. At the end of the period, a new request for an address must be made, and another address is then assigned. C. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease. D. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
What is C.
300
A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured? A. the port-channel 1 interface B. the highest number member interface C. all member interfaces D. the lowest number member interface
What is A.
300
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? (Choose two.) A. network or subnetwork IP address B. broadcast address on the network C. IP address leased to the LAN D. IP address used by the interfaces E. manually assigned address to the clients F. designated IP address to the DHCP server
What is A, B
400
What command sequence will configure a router to run OSPF and add network 10.1.1.0 /24 to area 0? A. router ospf area 0 network 10.1.1.0 255.255.255.0 area 0 B. router ospf network 10.1.1.0 0.0.0.255 C. router ospf 1 network 10.1.1.0 0.0.0.255 area 0 D. router ospf area 0 network 10.1.1.0 0.0.0.255 area 0 E. router ospf network 10.1.1.0 255.255.255.0 area 0 F. router ospf 1 network 10.1.1.0 0.0.0.255
What is C
400
What will be the result if the following configuration commands are implemented on a Cisco switch? Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky A. A dynamically learned MAC address is saved in the startup-configuration file. B. A dynamically learned MAC address is saved in the running-configuration file. C. A dynamically learned MAC address is saved in the VLAN database. D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received. E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
What is B.
400
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application
What is Application The Application layer is responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.
400
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications? A. RSA B. L2TP C. IPsec D. PPTP
What is C. IPSec
400
On which options are standard access lists based? A. destination address and wildcard mask B. destination address and subnet mask C. source address and subnet mask D. source address and wildcard mask
What is D.
500
Which protocol can cause overload on a CPU of a managed device and also provides network stability? A. Netflow B. WCCP C. IP SLA D. SNMP
What is D. SNMP
500
Which two statements accurately describe Layer 2 Ethernet switches? (Choose two.) A. Spanning Tree Protocol allows switches to automatically share VLAN information. B. Establishing VLANs increases the number of broadcast domains. C. Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information. D. Microsegmentation decreases the number of collisions on the network. E. If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.
What is B and D
500
An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem? A. data link layer B. application layer C. access layer D. session layer E. network layer
What is E. Network Layer
500
Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose two.) A. ping B. tracert C. ipconfig D. show ip route E. winipcfg
What is A and D
500
What is the valid host range of a WAN point-to-point link for the network 10.10.20.0?
What is 10.10.20.1 - 10.10.20.2 Point-to-point has a subnet mask of 255.255.255.252 or /30)
M
e
n
u