VLAN
Routers
Firewall
Other prt 1
Other prt 2
100

You need to keep users in all other departments from accessing the servers used by the finance department.

Which of the following technologies should you use to logically isolate the network?

NIC teaming

MAC filtering

VLANs

Subnetting

VLANs

100


A network administrator is configuring a new network segment that will use EIGRP as its routing protocol. The network consists of several routers connected in a mesh topology. The administrator wants to ensure efficient use of bandwidth and quick convergence in case of a link failure.

One of the routers, Router A, is connected to a critical server that hosts time-sensitive applications.

What should the administrator prioritize when configuring EIGRP on Router A to ensure the best performance for time-sensitive applications?


Increase the bandwidth metric on all links.

Increase the hop count metric.

Decrease the delay metric on the link to the critical server.

Enable periodic updates of the entire routing information base.



Decrease the delay metric on the link to the critical server.

100

What does the term "transparent" firewall refer to?

A firewall that allows all traffic without inspection

A firewall implemented as a layer 2/virtual wire

A firewall that is invisible to users

A firewall that does not require any configuration

A firewall implemented as a layer 2/virtual wire



100

Which of the following is NOT a metric used by BGP for path selection?

Local preference

Hop count

Weight

Encryption strength


Encryption strength

100

Which feature is most likely to be supported by routers designed for medium to large networks?

Limited to four Ethernet ports

No support for virtual private networks (VPNs)

Plug-in cards for WAN interfaces

Basic firewall capabilities only

Plug-in cards for WAN interfaces

200

How are communications between VLANs facilitated?

answer

By configuring VLANs with the same ID

Through a network firewall

Through direct connection

Through an IP router or layer 3 capable switch


Through an IP router or layer 3 capable switch

200

What is the BEST practice for remotely managing a router?


Creating a virtual interface known as a loopback interface

Connecting through any physical interface without precautions

Using an unsecured protocol for remote access

Using a direct cable connection


Creating a virtual interface known as a loopback interface


200

Which of the following is a characteristic of a packet filtering firewall?

It can inspect only port numbers and not any other Layer 4 header information.


It can inspect only port numbers and not any other Layer 4 header information.

It operates at Layer 7 of the OSI model.

It is stateful.

It filters traffic based on the content of the data packet.


It can inspect only port numbers and not any other Layer 4 header information.



200

In a RIP network, Router X is connected to networks 10.0.1.0/24 and 10.0.2.0/24. Router Y is connected to networks 10.0.2.0/24 and 10.0.3.0/24. Router Z is connected to networks 10.0.3.0/24 and 10.0.4.0/24.

If Router X needs to send data to the 10.0.4.0/24 network, which of the following paths will it choose based on RIP's routing protocol mechanics?

Directly to Router Z because it is the final destination

It will not be able to find a route because RIP does not support more than two hops

To Router Y, then back to Router X because of a routing loop

To Router Y, then Router Z because it has the lowest hop count


To Router Y, then Router Z because it has the lowest hop count

200

What is the primary function of Link State Advertisements (LSAs) in OSPF?

To request specific routing information from neighbors

To distribute routing and topology information

To authenticate OSPF messages

To announce the presence of a new router

To distribute routing and topology information

300

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network.

Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer.

Which of the following should you use in this situation?

Spanning Tree

VLAN

VPN

Port security

VLAN

300

What does a router do when it receives a packet with a destination address?


Reads destination the address and forwards the packet

Discards the packet immediately

Sends the packet back to the source

Forwards the packet based on the source address

Reads destination the address and forwards the packet

300

What is the purpose of controlling outbound traffic with a firewall?

answer

To monitor employee internet usage

To block unauthorized applications and malware

To increase internet speed

To encrypt all outgoing data

To block unauthorized applications and malware

300

What must be configured if DHCP services are located in a different VLAN from the client devices?

A unique DNS server for each VLAN

A DHCP relay

A direct physical connection between VLANs

A static route on the DHCP serve

A DHCP relay

300

Considering the example below of three routers connected in a series, which networks is Router A directly connected to? (Select two.)



10.0.4.0/24

10.0.3.0/24

10.0.1.0/24

0.0.0.0/0

10.0.2.0/24



10.0.3.0/24

10.0.2.0/24

400

What is the role of 802.1Q tagging in VoIP configurations?


To decrease the bandwidth used by voice traffic

To assign voice traffic to a specific VLAN

To encrypt voice traffic

To increase the speed of voice traffic


To assign voice traffic to a specific VLAN



400

Which of the following is a method that allows you to connect a private network to the Internet without obtaining registered addresses for every host?


OSPF

EIGRP

NAT

BGP

NAT

400

If you can ping a host's default gateway but cannot ping hosts on remote networks, what should you suspect?


A cable disconnection

A firewall issue

A DNS issue

A routing issue


A routing issue

400


Which layer of the three-tiered network hierarchy typically uses layer 3 capable switches?


All of the above

Core Layer

Distribution Layer

Access Layer



Distribution Layer

400


A network engineer is troubleshooting connectivity issues in a network and uses the traceroute command to diagnose the problem. The traceroute output shows that packets are being sent through an unexpected path that includes the same routers multiple times.

What does this indicate, and what should the engineer check first?

This indicates a split horizon issue; the engineer should check if split horizon is disabled.

This indicates a well-optimized network; the engineer should check for any unused routes.

This indicates a potential routing loop; the engineer should check the routing configurations on the involved routers.

This indicates excessive route summarization; the engineer should check the summarization boundaries.



This indicates a potential routing loop; the engineer should check the routing configurations on the involved routers

500


A small tech startup, TechInnovate, has recently moved to a new office and is in the process of setting up their internet connection. They have been allocated a single public IP address by their Internet Service Provider (ISP).

The company has 25 employees, each with at least one device that needs to connect to the Internet. The IT manager decides to implement Port Address Translation (PAT) on their network router.

Given this scenario, which of the following outcomes is MOST likely to occur as a result of implementing PAT?

Each device will be assigned a public IP address by the router.

Internet access will be limited to only one device at a time due to the single public IP address.

Each device will be assigned a unique public IP address by the router.

All devices will be able to access the Internet simultaneously using the single public IP address.



All devices will be able to access the Internet simultaneously using the single public IP address.

500

Which of the following is another term for Port Address Translation (PAT)?

ARP spoofing

NAT overloading

Static NAT

Dynamic NAT


NAT overloading



500

What factor is considered when there are identical paths with equal administrative distances to a destination?


The path with the lowest metric value

The path with the shortest prefix length

The path with the highest metric value

The path with the most recent update

The path with the lowest metric value

500

What is the role of the Gateway/next hop parameter in a routing table?

It determines the speed at which the packet is forwarded.

It specifies the final destination of the packet.

It identifies the router's physical location.

It indicates the next router or gateway along the path to the destination


It indicates the next router or gateway along the path to the destination.

500

What indicates that a host with a specific IP is expected but not available on the network, according to the ARP cache?


An entry listed as "complete"

An entry listed as "static"

An entry listed as "incomplete"

An entry listed as "dynamic"

An entry listed as "incomplete"