Test 1 part 2

  1. Which two statements describe the process identifier that is use in the command to configure OSPF on a router?

    All OSPF routers in an area must have the same process ID

    Only one process number can be used on the same router

    Different process identifiers can be used to run multiple OSPF processes

    The process number can be any number from 1 to 65,535

    Hello packets are sent to each neighbor to determine the processor identifier
    Different process identifiers can be used to run multiple OSPF processes

    The process number can be any number from 1 to 65,535
  2. For both the router and the switch the simulated console mode needs to start and remain in enabled mode  ....

    Which of the following is true regarding the configuration of Switch A?

    only 5 simultaneous remote connections are possible

    remote connections using ssh will require a username and password

    only connections from the local network will be possible

    console access to SwitchA requires a password
    remote connections using ssh will require a username and password
  3. A network adnimistrator is trying to add a new router into an established OSPF network.  The networks attached to the new router o not appear in the routing tables of the other OSPF routers.  Given the information in the partial configuration shown below what configuration error is causing this problem?
    #router ospf 1
    #network 10.0.0.0 255.0.0.0 area 0

    The process id is configure improperly
    The OSPF area is configured improperly
    The network wildcard mask is configured improperly
    The network number is configure improperly
    The network wildcard mask is configured improperly
  4. What is the bandwidth on the WAN interface of Router 1?

    16kbit/sec
    32
    64
    128
    512
    16kbit/sec

    Use show int s0/0 then look for BW = band width
  5. Why are two OSPF designated routers identified on Core-Router

    coure-Router is connected to more than one multi-access network

    The router at 208.149.23.130 is a seconndary DR in case the primary fails

    The router IDs have the same OSPF priority and are therefore tied for DR election

    The DR election is still underway and there are two contenders for the role
    Core router is connected to more than one multi access network
  6. What is the purpose of flow control?

    To ensure data is retransmitted if an acknowledgement is nnot received

    To reassemble segments in the correct order at the destination device

    To provide a means for the receiver to govern the amount of data sent by the sender

    To regulate the size of each segment
    To provide a means for the receiver to govern the amount of data sent by the sender
  7. What is the network address for the host with IP adress 192.168.23.61/28

    192.168.23.0

    192.168.23.32

    192.168.23.48

    192.168.23.56

    192.168.23.60
    192.168.23.48
  8. Which option is a valid IPv6 address

    2001:0000:130F::099a::12a

    2002:7654:A1AD:61:81AF:CCC1

    FEC0:ABCD:XYZ:0067::2A4

    2004:1:25A4:886F::1
    2004:1:25A4:886F::1
  9. Which default gateway aress shold be assigned to Host A?

    192.168.1.1
    192.168.1.65
    192.168.1.66
    192.168.1.129
    10.1.1.1
    10.1.1.2
    192.168.1.65

    It should be one less that the switch IP to which it is connected
  10. which two statements are true about the loopback address that is configured on RouterB

    It ensures that data will be forwarded by RouterB

    It provides stability fo rhte OSPF on RouterB

    It specifies that the router ID for TouterB sould be 10.0.0.1


    It decreases the metric for routes that are asvertised from RouterB

    It indicates that RouterB should be elected the DR for the LAN
    It provides stability for the OSPF on RouterB

    It specifies that the router ID for RouterB should be 10.0.0.1
  11. Which IOS comman is used to initiate a login into a VTY port on a remote router?

    #login
    #telnet
    #tracert
    #ping
    #line vty 0 5
    #login
    #telnet
  12. A PC sends packets to the default gateway IP address the first time since the PC turned on
    ARP
  13. The network administrator is checking basic IP connectivity from a workstation to a server
    ICMP
  14. The TCP/IP protocol stack must find an IP address for packets destined for a URL
    dns
  15. A network device will automatically assign IP addresses to workstations
    DHCP
  16. On a live network, which commands will verify the operational status of router interfaces?  choose 2

    #show interfaces

    #show ip protocols

    #debug interface

    #show ip interface brief

    #show start
    #show interfaces

    #show ip interface brief
  17. Which two statements are true?

    This is a default route

    Adding the subnet mask is optional for the ip route command

    This will allow any host on the 172.16.1.0 network to reach all known destinations beyond Router A

    This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address

    The same command needs to be entered on Router A so that hosts on the 172.16.1.0 network can reach network 10.0.0.0
    This is a default route

    This will allow any host on the 172.16.1.0 network to reach all known destinations beyond Router A
  18. How many collision domains are shown?

    1
    2
    3
    4
    6
    12
    2  because hubs create single collision and broadcast domains
  19. what two things does a router do when it forwards a packet   Choose two

    Switches the packet to the appropriate outgoing interfaces

    Computes teh destination host address

    determines the next hop on the path

    updates the destination IP address

    Forwards ARP requests
    Switches the packet to the appropriate outgoing interfaces

    Determines the next hop on the path
  20. Which of the following statements are TRUE regarding Cisco access lists  (choose two)

    In an inbound access list, packets are filtered as they enter an interface

    In an inbound access list, packets are filtered before they exit an interface

    Extended access lists are used to filter protocol specific packets

    You must specify a deny statement at the end of each access list to filter unwanted traffic

    When a line is added to an existing access list it is inserted at the beginning of the access list
    In an inbound access list, packets are filtered as they enter an interface

    Extended access lists are used to filter protocol specific packets
  21. What are two benefits of using a single OSPF area network design  Choose two

    It is less CPU intensive for routers in the single area

    It reduces the types of LSAs that are generated

    It removes the need for virtual links

    It increases LSA response times

    It reduces teh number of required OSPF neighbor adjacencies
    It reduces the types of LSAs that are generated

    It removes the need for virtual links
  22. To allow or prevent load balancing to network 172.1.3.0/24, which of the following commands could be used in R2?  Choose 2

    #clock rate
    #bandwidth
    #ip sopf cost
    #ip ospf priority
    #distance OSPF
    • #bandwidth
    • #ip ospf cost
  23. From which of the following attacks can essage Authentication Code (MAC) shield your network?

    DoS
    DDoS
    spoofing
    SYN floods
    spoofing
  24. If CDP in enabled on all devices and interfaces, which devices will appear in the output of a show cdp neighbors command issued from R2?

    R2 & R3
    R1 & R2
    R3 & S2
    R1, S1, S2 & R3
    R1, S1,S2, R3, and S3
    R3 & S2
  25. How does a switch differ from a hub?

    A switch does no induce any latency into the frame transfer time

    A switch tracks MAC addresses of directly connected devices

    A switch operates at a lower more efficient layer of the OSI model

    A switch decreases the number of broadcase domains

    A switch decreases the number of collision domains
    A switch tracks MAC addresses of directly connected devices
  26. The host in Kiev sends a request for an HTML document to the server in Minsk.  What will be the source IP address of the packet as it leaves the Kiev router.

    10.1.0.1
    10.1.0.5
    10.1.0.6
    10.1.0.14
    10.1.1.16
    10.1.2.8
    10.1.1.16  address of the Kiev PC
  27. what is the subnet address for the IP address 172.19.20.23/28
    172.19.20.16
  28. If the hubs in the graphic were replaced by switches, what would be virtually eliminated

    broadcast domains
    repeater domains
    ethernet collisions
    signal amplification
    ethernet broadcasts
    Ethernet collisions
  29. How can you ensure that only the MAC adress of a server is allowed by switch port Fa0/1

    configure port Fa0/1 to accept connections only from the static IP address of the server

    Configure the server MAC adress as a static entry of port security

    Use a proprietary connector type of Fa0/1 that is incomputable with other host connectors

    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
    Configure the server MAC address as a static entry of port security.
  30. The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224/  The routing protocol in use is RIP version 1.  Which address could be assigned to the FastEthernet interface on Router A

    192.168.1.31
    192.168.1.64
    192.168.1.127
    192.168.1.190
    192.168.1.190
  31. A problem with network connectivity has been observed.  It is suspected that the cable connected to swith port Fa0/9 on Switch 1 is disconnected.  What would be an effect of this cablie be disconnected?

    Host B would not be able to access the server in VLAN9 until the cable is reconnected

    Communication between VLAN3 and teh other VLANs would be disabled

    The transfer of files from Host B to the server in VLAN9 would be signifcantly slower

    For less than a minute, host B would not be able to access the server in VLAN9.  Then normal network function would resume
    For less than a minute, host B would not be able to access the server in VLAN9.  Then normal network function would resume
  32. In the router Cisco returns the given output an has not had its router ID set manually, what value will OSPF use as its router ID?

    192.168.1.1
    172.16.1.1
    1.1.1.1
    2.2.2.2
  33. 2.2.2.2
  34. how does TCP differ from UDP

    TCP provides best effort delivery
    TCP provides synchronized communication
    TCP segments are essentially datagrams
    TCP provides sequence numbering of packets
    TCP uses broadcast delivery
    TCP provides synchronized communication

    TCP provides sequence numbering of packets
  35. Which transport layer protocol provides best effort delivery service with no acknowledgment receipt required

    HTTP
    IP
    TCP
    Telnet
    UDP
    UDP
  36. What command sequence will configure a router to run OSPF and add network 10.1.1.0/24 to area 0?

    router ospf area 0
    network 10.1.1.0 255.255.255.0 area 0

    router ospf
    network 10.1.1.0 0.0.0.255

    router ospf 1
    network 10.1.1.0 0.0.0.255 area 0

    router ospf area 0
    network 10.1.1.0 0.0.0.255 area 0
    • router ospf 1
    • network 10.2.2.0 0.0.0.255 area 0
  37. An administrator has connected devices to a switch and for security reasons wants the dynamically learned MAC addresses from the address table added to the running configuration.  What must be one to accomplish this?

    Enable port security and use the keyword sticky

    Set the switchport mode to trunk and save the running configuration

    Use the switchport protected command to have the MAC addresses added to the configuration

    Use the no switchport port-security command to allow MAC addresses to be added to the configuration
    Enable port security and use the keyword sticky
  38. The following commands are entered on the router:
    #enable secret fortress
    #line con 0
    #login
    #password n0rway1n
    #exit
    #service password-encryption
    What is the purpose of the last command entered?

    to require the user to enter an encrypted password during the login process

    to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

    to encrypt the enable secret password

    to provide login encryption services

    between hosts attached to the router
    to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
  39. SwitchA receives the frame with the addressing shown in the exhibit.  According to the command output also shown in the exhibit, how will switchA handle this frame

    It will drop the frame

    It will forward the frame out port Fa0/6 only

    It will forward the frame out port Fa0/3 only.

    It will flood the frame out all ports

    It will flood the frame out all ports except Fa0/3
    It will flood the frame out all ports except Fa0/3
  40. What happens when computers on a private network attemp to connect to the internet through a cisco router running PAT

    The router uses the same IP address but a different TCP source port number for each connection

    An IP address is assigned based on the priority of the computer requestoing the connection

    The router selects an aress from a pool of one to one address mappings held in the lookup table

    The router assigns a unique ip adress from a pool of legally registered addresses for the duration of the connection
    The router uses the same IP address but a different TCP source port number for each connection
  41. A receiving host has failed to receive all of the segments that ishould acknowledge.  What can the host do to improve the reliability of this communication session?

    decrease teh window size

    use a different source port for the session

    decrease the sequence number

    obtain a new ip address from the DHCP server

    start a new session using UDP
    decrease the window size
  42. The two connected ports on the switch are not turning orange or green.  What would be the most effective steps to troubleshoot this physical layer problem?  Choose 3

    Ensure that the Ethernet encapsulations match on the interconnected router and switch ports

    Ensure that cables A and B are straight through cables

    Ensure cable a is plugged into a trunk port

    Ensure the switch has power

    Reboot all of the devices

    Reseat all cables
    ensure that cables A and B are straight through cables

    Ensure the switch has power

    Reseat all cables
  43. The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources.  What should be done to correct this situation?

    Verify that the DNS server address is correct in the DHCP pool

    Ping the default gateway to populate the ARP cache

    Use the tracert command on the DHCP client to first determine where the problem is located

    Clear all DHCP leases on the router to prevent address conflicts

    Issue the ipconfig command with the /release and/ renew options in a command window
    Issue the ipconfig command with the /release and/ renew options in a command window
  44. Which two characteristics describe the access layer of the hierarchical networkdesign modes?  Choose 2

    layer 3 support
    port security
    redundant components
    VLANs
    PoE
    • port security
    • VLANs
  45. What information can be used by a router running a link state protocol to build an maintain its topological database?  choose 2

    hello packets

    SAP messages sent by other routers

    LSA from other routers

    beacons received on point to point links

    routing tables received from other link state routers

    TTL packets from designated routers
    hello packets

    LSA from other routers
  46. What should be part of a comprehensive network security plan?

    Allow users to develop their own approach to network security

    Physically ecure network equipment from potential access by unauthorized individuals

    Uncourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

    Delay deployment of software patches and updates until their effect on end users equipment is will known and widely reported

    Minimize network overhead by deactivating automatic antivirus client updates
    Physically secure network equipment from potential access by unauthorized individuals.
  47. Aussume that all router interfaces are operational and correctly configured.  In addition, assume that OSPF has been correctly configured on router R2.  How will the efault route configured on R1 affect the operation of R2

    Any packet destined for a network that is not directly connected to router R2 will be dropped immediately

    Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1. R1 will then send that packet back to R2 and a routing loop will occur

    Any packet destined for a network that is not directly connected to router R1 will be dropped.

    the networks directly connected to router R2 will not be able to communicate with the 172.16.100.0, 172,16.100.128 and 172.16.100.64 subnetworks

    Any packets destined for a network that is not directly connected to router R2 will be dropped immediately because of the lack of a gateway on R1
    Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1,  R1 will then send that packet back to R2 and a routing loop will occur
  48. An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office.  What is causing the problem?

    There is an area ID mismatch

    There is a PPP authentication issue; a password mismatch

    There is an OSPF hello and dead intervval mismatch

    There is a missing network comand in the OSPF process on R5
    There is an OSPF hello and dead interval mismatch
  49. The hosts in the LAN are not able to connect to the Internet.  Which commands will correct this issue?

    #interface fa0/0
    #no shutdown

    #interface fa0/1
    #no shutown

    #interface s0/0
    #no shutdown

    #interface s0/1
    #no shutdown
    • #interface fa0/1
    • #no shutdown
  50. What is the default administrative distance of the OSPF routing protocol

    90
    100
    110
    120
    130
    170
    110
  51. What are two common TCP applications  choose two

    TFTP
    SMTP
    SNMP
    FTP
    DNS
    MTP

    FTP
  52. Which statements accurately describe CDP  Choose 3

    CDP is an IEEE standard protocol

    CDP is a Cisco proprietary protocol

    CDP is a datalink layer protocol

    CDP is a network layer protocol

    CDP can discover directly connected neighboring Cisco devices

    CDP can discover Cisco devices that are not directly connected
    CDP is a Cisco proprietary protocol

    CDP is a datalink layer protocol

    CDP can iscover directly connected neighboring Cisco devices
  53. What does the 128 refer to in the router output aboce?

    OSPF cost
    OSPF priority
    OSPF hop count
    OSPF ID number
    OSPF administrative distance
    OSPF cost

    192.168.12.236/30 [110/128] via 192.168.12.233
  54. Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet.  Choose 3

    10.1.168.0
    10.1.176.1
    10.1.174.255
    10.1.160.255
    10.1.160.0
    10.1.175.255
    • 10.1.168.0
    • 10.1.174.255
    • 10.1.160.255
  55. A person is trying to send a file from a host on Network A of the JAX company to a server on Network Z of the XYZ Company.  The file transfer fails.  The host on Network A can communicate with other hosts on Network A.  Which command, issued from router RTA would be the most useful for troubleshooting this problem?

    show flash
    show history
    show version
    show interfaces
    show controllers serial
    show interfaces
  56. HostX is transferring a file to the FTP server.  Point A represents the frame as it goes towar the Toronto router.  What will the Layer 2 destination address be at this point
    • abcd.2246.0035
    • fa0/0 Toronto   (the default gateway)
  57. The network is converged.  After link state advertisements are received from Router_A what information will router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96
    any answer with a serial1/0 is wrong
  58. If a host experiences interittent issues that relate to congestion within a network while remaining connected, what coul cause congestion on this LAN?

    half duplex operation
    broadcast storms
    network segmentation
    multicasting
    broadcast storms
  59. Why would a network administrator configure port security on a switch?

    to prevent unauthorized Telnet access to a switchport
    to prevent unauthorized hosts from accessing the LAN
    to limit the number of Layer 2 broadcasts on a particular switch port
    block unauthorized access to the switch management interfaces
    to prevent unauthorized hosts from accessing the LAN
  60. which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?

    #ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
    #ip route 192.168.202.0 255.255.255.0 192.168.201.1
    #ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
    ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
    ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
  61. If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20 what is the maximum number of hosts allowed on this subnet?

    1024
    2046
    4094
    4096
    8196
    4094
  62. Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? Choose 3

    an IPv6 address is divided into eight 16 bit groups
    a double colon(::) can only be used once in a singel IPv6 address
    IPv6 addresses are 196 bits in length
    Leading zeros cannot be omitted in an IPv6 address
    Groups with a value of 0 can be represented with a single 0 in IPv6 address
    • an IPv6 address is divided into eight 16 bit groups
    • Leading zeros cannot be omitted in an IPv6 address
    • Groups with a value of 0 can be represented with a single 0 in IPv6 address
  63. Which two statements describe characteristics of IPv6 unicast addressing?  choose 2

    global addresses start with 2000::/3
    Link-local addresses start with FE00:/12
    Link local addresses start with FF00::/10
    There is only one loopback aress and it is ::1
    Global addresses start with 2000::/3

    There is only one loopback adress and it is ::1
  64. Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use?  Choose 2

    10.6.8.35
    133.6.5.4
    192.168.5.9
    127.0.0.1
    190.6.5.4
    133.6.5.4

    190.6.5.4
  65. Given the output for this command it the router ID has not been manually set, what router ID will OSPF use for this router?

    10.1.1.2
    10.154.154.1
    172.16.5.1
    192.168.5.3
    172.16.6.1
  66. WG1R2# show re
    5 Ambiguous command: show ru
    WG1R2#_

    Why did the device return this message

    The command requires addtional options or parameters
    There is no show command that starts with ru
    The command is being executed from the wrong router mode
    There is more than one show command that starts with the letters ru
    There is more than one show command that starts with the letters ru
  67. Select two options which are security issues which need to be modified before RouterA is used choose 2

    unencrypted weak password is configured to protect privilege mode
    inappropriate wording n banner message
    the virtual terminal lines have a weak passwor configured
    virtual terminal lines have a password but it will not be used
    configuration supports an secure web server access
    inappropriate wording in banner message

    virtual terminal lines have a password but it will not be used
  68. what is the purpose of assigning an IP address to a switch

    provides local hosts with a default gateway address
    allows remote management of the switch
    allows the switch to respond to ARP requests between two hosts
    ensures that hosts on the same LAN can communicate with each other
    allows remote management of the switch
  69. A technician pases the configurations in the exhibit into the two new routers shown.  Otherwise, the routers are configured with their default configuations.  A ping from Host1 to Host2 fails, but the technician is able to ping the s0/0 interface of R2 from Host 1.  The configurations of the hosts have been verified as correct.  What could be the cause of the problem?

    The serial cable on R1 needs to be replaced
    The interfaces on R2 are not configured properly
    R1 has no route to the 192.168.1.128 network
    The IP addressing scheme has overlapping subnetworks
    The ip subnet-zero command must be configured on both routers
    R1 has no route to the 192.168.1.128 network
  70. Which of teh following describe the process ientifier that is used to run OSPF on a Router  Choose 2

    It is locally significant
    It is globally significant
    It is neeed to identify a unique instance of an OSPF database
    It is an optional parameter required only if multiple OSPF processes are running on the router
    All routers in the same OSPF area must have the sme process ID if they are to exchange routing information.
    It is locally significant

    It is needed to identify a unique instance of an OSPF database
  71. What must be configured to establish a successful connection from Host A to switch SW-a through router RT-A

    VLAN 1 on Rt-A
    IP routing on SW-A
    efault gateway on SW-A
    crossover cable connecting SW-A an RT-A
    default dateway on SW-A
  72. After configuring two interfaces on the HQ router, the network administrator notices an error message.  What must be done to fix this error

    The serial interface must be configure first
    The serial interface must use the address 192.168.1.2
    the subnet mask of the serial interface should be changed to 255.255.255.0
    the sub
  73. After configuring two interfaces on the HQ router, the network administrator notices and error message.  What must be done to fix this error?

    The serial interface must be configured first.
    The serial interface must use the address 192.168.1.2

    The subnet mask of the Fastthernet interface should be changed to 255.255.255.240

    The address of the FastEthernet interface should be changed to 192.168.1.66
    The subnet mask of the FastEthernet interface should be changed to 255.255.255.240
  74. The ip helper-address command does what?

    assigns an IP address to a host

    resolves an IP address from a DNS server

    relays a DHCP request across networks

    resolves an IP address overlapping issue
    relays a HCP request across networks
  75. A network technician is asked to design a small network with redundancy.  The exhibit represents this design, with all hosts configured in the same VLAN.  What conclusions can be made about this design?

    This design will function as intended
    Spanning tree will need to be used
    The router will not accept the addressing scheme
    The connection between switches should be a trunk
    The router interfaces must be encapsulated with the 802.1Q protocol
    The router will not accept the addressing scheme
  76. Which protocol uses a connection oriented service to deliver files between end systems?

    TFTP
    DNS
    FTP
    SNMP
    RIP
    FTP
  77. Select three options which are security issues with the current configuration of Switch A

    Privilege mode is protected with an unencrypted password

    inappropriate wording in banner message

    Virtual terminal lines are protected only by a password requirement

    both the username and password are weak

    Telenet connections canbe used to remotely manage the switch

    Cisco user will be granted privilege level 15 by default
    Privilege mode is protected with an unencrypted password

    inappropriate wording in banner message

    Both the username and password are weak
  78. The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.  No routing protocols or other static routes are configured on the router.  Which statements is true about this command/

    The interface with IP address 192.168.10.2 is on this router

    The command sets a gateway of last resort forthe router

    Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2

    The command creates a static route for all ip traffic with the source address 192.168.100.160
    Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2
  79. What statement about IPv6 is true

    Addresses are not hierarchical an are assigned at random

    Only one IPv6 address can exist on a given interface

    There are 2.7 billion address available

    Broadcasts have been eliminated and replaced with multicasts
    Broadcasts have been eliminated and replaced with multicasts
  80. How many simultaneous Telnet sessions does a Cisco router support by default

    1
    2
    3
    4
    5
    6
    5
  81. type of connection pc to switch
    Ethernet straight through cable
  82. type of cable switch to router
    ethernet straight through cable
  83. type of cable router to frame relay
    Serial cable
  84. type of cable router to pc
    rollover cable
  85. error message:

    Password required but none set

    why was this message received

    No VTY pssword has been set
    No enable password has been set
    No console password has been set
    No enable secret password has been set
    No vty password has been set
  86. What is the subnet broadcast address of teh LAN connected to Router1

    192.168.8.15
    192.168.8.31
    192.168.8.63
    192.168.8.127
    192.168.8.15
  87. Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowlegments?

    Physical
    Data link
    Transport
    Network
    Transport
  88. Which parameter or parameters are used to calculate OSPF cost in Cisco Routers?

    Bandwith
    Bandwidth and delay
    Bandwidth Delay and MTU
    Bandwidth MTU Reliability Delay and Load
    Bandwidth
  89. Which address type does a switch use to make selective forwarding decisions?

    Source IP address
    Destination IP address
    Source and destination IP address
    Source MAC address
    Destination MAC address
    Destination MAC address
  90. hat are two remoccended ways of protecting network device configuration files from outside network security threats choose 2

    allow unrestricted access to the console or VTY ports
    Use a firewall to restrict access from the outside to the network devices
    Always use Telnet to access the device command line because its data is automatically encrypted
    Use SSH or another encrypted and authenticated transport to access device configurations
    Prevent the loss of passwords by disabling password encryption
    Use a firewall to restrict access from the outside to the network devices

    Use SSH or another encrypted and authenticated transport to access device configurations
  91. show ip route

    the output is from a router in a large enterprise.  From the output, determine the role of the router.

    A core router
     HQ internet gateway router

    The WAN router at the central site

    Remote stub router at a remote site
    Remote stub router at a remote site
  92. A workstation has just resolved a browser URL to the IP address of a server.  What protocol will the workstation now use to determine the destination MAC address to be placed in to frames directed toward the server?

    HTTP
    DNS
    DHCP
    RARP
    ARP
    ARP
  93. Refer to the topology.  R1 does not form an OSPF neighbor adjacency with R2.  Which option would fix the issue?

    R1 ethernet 0/1 is shutdown.  Configure no sh command

    R1 ehthernet0/1 configured with a non default OSPF hello interval of 25, configure no ip ospf hello interval 25

    R2 ethernet0/1 and R3 ethernet0/0 are configured with a non default oOSPF hello interval of 25, configure no ip ospf hello interval 25

    Endable OSPF for R1 ethernet0/1; configure ip ospf 1 area 0 command under ethernet 0/1
    R1 ethernet0/1 configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25
  94. Which routers are likely to have been elected ad DR  Choose 2

    Corp 1
    Corp 2
    Corp 3
    Corp 4
    Branch 1
    Branch 2
    • Corp 4 
    • Branch 2
  95. The junior network support staff provided the diagram as ra recommended configuration for the first phase of a four phase etwork expansion project.  The entire network expansion will have over 1000 users on 14 network segmants and has been allocated this ip address space  Choose three problems

    the AREA 1 IP address space is inadequate for the number of users

    The AREA 3 IP address space is inadequate for the number of users

    Area 2 could use a mask of /25 to conserve IP address space

    The network address space that is provided requires a single network wide mask

    The router to router connection is wasting address space

    The broadcast domain in Area 1 is too large for ip to function
    The AREA 1 ip address space is indequate for the number of users

    AREA 2 could use a mask of /25 to conserve IP address space

    The router to router connection is wasting address space
  96. How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?

    #ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224
    # ip nat inside source list 9 pool TAME

    7
    8
    9
    10
    24
    32
    8
  97. Which OSI layer header contains the address of a destination host that is on another network?

    application
    session
    transport
    network
    datalink
    physical
    network
  98. which statement is true

    An IPv6 address is 64 bits long and is represented as hexadecimal characters

    An IPv6 address is 32 bits long and is represented as decimal digits

    An IPv6 address is 128 bits long and is represented as decimal digits

    An IPv6 address is 128 bits long and is represented as hexadecimal characters
    An Pv6 address is 128 bits long and is represented as hexadecimal characters
  99. what is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network?

    #ip route 10.89.0.0 255.255.240.0 10.89.16.2

    #ip route 10.89.3.0  255.255.0.0 10.89.16.2

    #ip route 10.89.0.0 255.255.240.0 10.89.16.1

    #ip route 0.0.0.0 0.0.0.0 10.89.16.1
    router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1
  100. Given a Class IP address subnetted with a /30 subnet mask how many valid host ip addresses are available on each of teh subnets

    1
    2
    4
    8
    252
    254
    2
  101. application layer =
    SMTP
  102. Transport layer =
    TCP
  103. Internet layer =
    IP
  104. network access layer =
    ETHERNET
  105. Host A can communicate with Host B but not with Hosts C or D.  How can the network administrtor solve this problem?

    configure Hosts C and  D with IP addresses in the 192.168.2.0 network

    Install a router and configure a route to route between VLANs 2 and 3

    Install a second switch and put Hosts C and D on that switch whole Hosts A and B remain on the original switch

    Enable the VLAN trunking protocol on the switch`
    Install a router and configure a route to toute between VLANs 2 and 3
  106. What two thing can the technician determine by successfully pinging from this computer to the ip address 172.16.236.1  choose two

    The network card on the computer is functioning correctly

    The default static route on the gateway router is correctly configured

    The correct default gateway ip address is configured on the computer

    The device with the IP address 172.16.236.1 is reachable over the network

    The default gateway at 172.16.236.1 is able to forward packets to the internet
    the network card on the computer is functioning correctly

    The device with the ip address 172.16.236.1 is reachable over the network.
  107. An administrator is in the process of changing the configurtion of a router.  hat command will allow the administrator to check the changes that have been made prior to saving the new configuration?

    #show startup-config
    #show current-config
    #show running-config
    #show memory
    #show flash
    #show processes
    show running-config
Author
josuem321
ID
320988
Card Set
Test 1 part 2
Description
test test
Updated