-
Which two statements describe the process identifier that is use in the command to configure OSPF on a router?
All OSPF routers in an area must have the same process ID
Only one process number can be used on the same router
Different process identifiers can be used to run multiple OSPF processes
The process number can be any number from 1 to 65,535
Hello packets are sent to each neighbor to determine the processor identifier
Different process identifiers can be used to run multiple OSPF processes
The process number can be any number from 1 to 65,535
-
For both the router and the switch the simulated console mode needs to start and remain in enabled mode ....
Which of the following is true regarding the configuration of Switch A?
only 5 simultaneous remote connections are possible
remote connections using ssh will require a username and password
only connections from the local network will be possible
console access to SwitchA requires a password
remote connections using ssh will require a username and password
-
A network adnimistrator is trying to add a new router into an established OSPF network. The networks attached to the new router o not appear in the routing tables of the other OSPF routers. Given the information in the partial configuration shown below what configuration error is causing this problem?
#router ospf 1
#network 10.0.0.0 255.0.0.0 area 0
The process id is configure improperly
The OSPF area is configured improperly
The network wildcard mask is configured improperly
The network number is configure improperly
The network wildcard mask is configured improperly
-
What is the bandwidth on the WAN interface of Router 1?
16kbit/sec
32
64
128
512
16kbit/sec
Use show int s0/0 then look for BW = band width
-
Why are two OSPF designated routers identified on Core-Router
coure-Router is connected to more than one multi-access network
The router at 208.149.23.130 is a seconndary DR in case the primary fails
The router IDs have the same OSPF priority and are therefore tied for DR election
The DR election is still underway and there are two contenders for the role
Core router is connected to more than one multi access network
-
What is the purpose of flow control?
To ensure data is retransmitted if an acknowledgement is nnot received
To reassemble segments in the correct order at the destination device
To provide a means for the receiver to govern the amount of data sent by the sender
To regulate the size of each segment
To provide a means for the receiver to govern the amount of data sent by the sender
-
What is the network address for the host with IP adress 192.168.23.61/28
192.168.23.0
192.168.23.32
192.168.23.48
192.168.23.56
192.168.23.60
192.168.23.48
-
Which option is a valid IPv6 address
2001:0000:130F::099a::12a
2002:7654:A1AD:61:81AF:CCC1
FEC0:ABCD:XYZ:0067::2A4
2004:1:25A4:886F::1
2004:1:25A4:886F::1
-
Which default gateway aress shold be assigned to Host A?
192.168.1.1
192.168.1.65
192.168.1.66
192.168.1.129
10.1.1.1
10.1.1.2
192.168.1.65
It should be one less that the switch IP to which it is connected
-
which two statements are true about the loopback address that is configured on RouterB
It ensures that data will be forwarded by RouterB
It provides stability fo rhte OSPF on RouterB
It specifies that the router ID for TouterB sould be 10.0.0.1
It decreases the metric for routes that are asvertised from RouterB
It indicates that RouterB should be elected the DR for the LAN
It provides stability for the OSPF on RouterB
It specifies that the router ID for RouterB should be 10.0.0.1
-
Which IOS comman is used to initiate a login into a VTY port on a remote router?
#login
#telnet
#tracert
#ping
#line vty 0 5
#login
#telnet
-
A PC sends packets to the default gateway IP address the first time since the PC turned on
ARP
-
The network administrator is checking basic IP connectivity from a workstation to a server
ICMP
-
The TCP/IP protocol stack must find an IP address for packets destined for a URL
dns
-
A network device will automatically assign IP addresses to workstations
DHCP
-
On a live network, which commands will verify the operational status of router interfaces? choose 2
#show interfaces
#show ip protocols
#debug interface
#show ip interface brief
#show start
#show interfaces
#show ip interface brief
-
Which two statements are true?
This is a default route
Adding the subnet mask is optional for the ip route command
This will allow any host on the 172.16.1.0 network to reach all known destinations beyond Router A
This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address
The same command needs to be entered on Router A so that hosts on the 172.16.1.0 network can reach network 10.0.0.0
This is a default route
This will allow any host on the 172.16.1.0 network to reach all known destinations beyond Router A
-
How many collision domains are shown?
1
2
3
4
6
12
2 because hubs create single collision and broadcast domains
-
what two things does a router do when it forwards a packet Choose two
Switches the packet to the appropriate outgoing interfaces
Computes teh destination host address
determines the next hop on the path
updates the destination IP address
Forwards ARP requests
Switches the packet to the appropriate outgoing interfaces
Determines the next hop on the path
-
Which of the following statements are TRUE regarding Cisco access lists (choose two)
In an inbound access list, packets are filtered as they enter an interface
In an inbound access list, packets are filtered before they exit an interface
Extended access lists are used to filter protocol specific packets
You must specify a deny statement at the end of each access list to filter unwanted traffic
When a line is added to an existing access list it is inserted at the beginning of the access list
In an inbound access list, packets are filtered as they enter an interface
Extended access lists are used to filter protocol specific packets
-
What are two benefits of using a single OSPF area network design Choose two
It is less CPU intensive for routers in the single area
It reduces the types of LSAs that are generated
It removes the need for virtual links
It increases LSA response times
It reduces teh number of required OSPF neighbor adjacencies
It reduces the types of LSAs that are generated
It removes the need for virtual links
-
To allow or prevent load balancing to network 172.1.3.0/24, which of the following commands could be used in R2? Choose 2
#clock rate
#bandwidth
#ip sopf cost
#ip ospf priority
#distance OSPF
-
From which of the following attacks can essage Authentication Code (MAC) shield your network?
DoS
DDoS
spoofing
SYN floods
spoofing
-
If CDP in enabled on all devices and interfaces, which devices will appear in the output of a show cdp neighbors command issued from R2?
R2 & R3
R1 & R2
R3 & S2
R1, S1, S2 & R3
R1, S1,S2, R3, and S3
R3 & S2
-
How does a switch differ from a hub?
A switch does no induce any latency into the frame transfer time
A switch tracks MAC addresses of directly connected devices
A switch operates at a lower more efficient layer of the OSI model
A switch decreases the number of broadcase domains
A switch decreases the number of collision domains
A switch tracks MAC addresses of directly connected devices
-
The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router.
10.1.0.1
10.1.0.5
10.1.0.6
10.1.0.14
10.1.1.16
10.1.2.8
10.1.1.16 address of the Kiev PC
-
what is the subnet address for the IP address 172.19.20.23/28
172.19.20.16
-
If the hubs in the graphic were replaced by switches, what would be virtually eliminated
broadcast domains
repeater domains
ethernet collisions
signal amplification
ethernet broadcasts
Ethernet collisions
-
How can you ensure that only the MAC adress of a server is allowed by switch port Fa0/1
configure port Fa0/1 to accept connections only from the static IP address of the server
Configure the server MAC adress as a static entry of port security
Use a proprietary connector type of Fa0/1 that is incomputable with other host connectors
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
Configure the server MAC address as a static entry of port security.
-
The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224/ The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on Router A
192.168.1.31
192.168.1.64
192.168.1.127
192.168.1.190
192.168.1.190
-
A problem with network connectivity has been observed. It is suspected that the cable connected to swith port Fa0/9 on Switch 1 is disconnected. What would be an effect of this cablie be disconnected?
Host B would not be able to access the server in VLAN9 until the cable is reconnected
Communication between VLAN3 and teh other VLANs would be disabled
The transfer of files from Host B to the server in VLAN9 would be signifcantly slower
For less than a minute, host B would not be able to access the server in VLAN9. Then normal network function would resume
For less than a minute, host B would not be able to access the server in VLAN9. Then normal network function would resume
-
In the router Cisco returns the given output an has not had its router ID set manually, what value will OSPF use as its router ID?
192.168.1.1
172.16.1.1
1.1.1.1
2.2.2.2
-
-
how does TCP differ from UDP
TCP provides best effort delivery
TCP provides synchronized communication
TCP segments are essentially datagrams
TCP provides sequence numbering of packets
TCP uses broadcast delivery
TCP provides synchronized communication
TCP provides sequence numbering of packets
-
Which transport layer protocol provides best effort delivery service with no acknowledgment receipt required
HTTP
IP
TCP
Telnet
UDP
UDP
-
What command sequence will configure a router to run OSPF and add network 10.1.1.0/24 to area 0?
router ospf area 0
network 10.1.1.0 255.255.255.0 area 0
router ospf
network 10.1.1.0 0.0.0.255
router ospf 1
network 10.1.1.0 0.0.0.255 area 0
router ospf area 0
network 10.1.1.0 0.0.0.255 area 0
- router ospf 1
- network 10.2.2.0 0.0.0.255 area 0
-
An administrator has connected devices to a switch and for security reasons wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be one to accomplish this?
Enable port security and use the keyword sticky
Set the switchport mode to trunk and save the running configuration
Use the switchport protected command to have the MAC addresses added to the configuration
Use the no switchport port-security command to allow MAC addresses to be added to the configuration
Enable port security and use the keyword sticky
-
The following commands are entered on the router:
#enable secret fortress
#line con 0
#login
#password n0rway1n
#exit
#service password-encryption
What is the purpose of the last command entered?
to require the user to enter an encrypted password during the login process
to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
to encrypt the enable secret password
to provide login encryption services
between hosts attached to the router
to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
-
SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will switchA handle this frame
It will drop the frame
It will forward the frame out port Fa0/6 only
It will forward the frame out port Fa0/3 only.
It will flood the frame out all ports
It will flood the frame out all ports except Fa0/3
It will flood the frame out all ports except Fa0/3
-
What happens when computers on a private network attemp to connect to the internet through a cisco router running PAT
The router uses the same IP address but a different TCP source port number for each connection
An IP address is assigned based on the priority of the computer requestoing the connection
The router selects an aress from a pool of one to one address mappings held in the lookup table
The router assigns a unique ip adress from a pool of legally registered addresses for the duration of the connection
The router uses the same IP address but a different TCP source port number for each connection
-
A receiving host has failed to receive all of the segments that ishould acknowledge. What can the host do to improve the reliability of this communication session?
decrease teh window size
use a different source port for the session
decrease the sequence number
obtain a new ip address from the DHCP server
start a new session using UDP
decrease the window size
-
The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? Choose 3
Ensure that the Ethernet encapsulations match on the interconnected router and switch ports
Ensure that cables A and B are straight through cables
Ensure cable a is plugged into a trunk port
Ensure the switch has power
Reboot all of the devices
Reseat all cables
ensure that cables A and B are straight through cables
Ensure the switch has power
Reseat all cables
-
The DHCP settings have recently been changed on the DHCP server and the client is no longer able to reach network resources. What should be done to correct this situation?
Verify that the DNS server address is correct in the DHCP pool
Ping the default gateway to populate the ARP cache
Use the tracert command on the DHCP client to first determine where the problem is located
Clear all DHCP leases on the router to prevent address conflicts
Issue the ipconfig command with the /release and/ renew options in a command window
Issue the ipconfig command with the /release and/ renew options in a command window
-
Which two characteristics describe the access layer of the hierarchical networkdesign modes? Choose 2
layer 3 support
port security
redundant components
VLANs
PoE
-
What information can be used by a router running a link state protocol to build an maintain its topological database? choose 2
hello packets
SAP messages sent by other routers
LSA from other routers
beacons received on point to point links
routing tables received from other link state routers
TTL packets from designated routers
hello packets
LSA from other routers
-
What should be part of a comprehensive network security plan?
Allow users to develop their own approach to network security
Physically ecure network equipment from potential access by unauthorized individuals
Uncourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
Delay deployment of software patches and updates until their effect on end users equipment is will known and widely reported
Minimize network overhead by deactivating automatic antivirus client updates
Physically secure network equipment from potential access by unauthorized individuals.
-
Aussume that all router interfaces are operational and correctly configured. In addition, assume that OSPF has been correctly configured on router R2. How will the efault route configured on R1 affect the operation of R2
Any packet destined for a network that is not directly connected to router R2 will be dropped immediately
Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1. R1 will then send that packet back to R2 and a routing loop will occur
Any packet destined for a network that is not directly connected to router R1 will be dropped.
the networks directly connected to router R2 will not be able to communicate with the 172.16.100.0, 172,16.100.128 and 172.16.100.64 subnetworks
Any packets destined for a network that is not directly connected to router R2 will be dropped immediately because of the lack of a gateway on R1
Any packet destined for a network that is not referenced in the routing table of router R2 will be directed to R1, R1 will then send that packet back to R2 and a routing loop will occur
-
An OSPF neighbor adjacency is not formed between R3 in the main office and R5 in the Branch2 office. What is causing the problem?
There is an area ID mismatch
There is a PPP authentication issue; a password mismatch
There is an OSPF hello and dead intervval mismatch
There is a missing network comand in the OSPF process on R5
There is an OSPF hello and dead interval mismatch
-
The hosts in the LAN are not able to connect to the Internet. Which commands will correct this issue?
#interface fa0/0
#no shutdown
#interface fa0/1
#no shutown
#interface s0/0
#no shutdown
#interface s0/1
#no shutdown
- #interface fa0/1
- #no shutdown
-
What is the default administrative distance of the OSPF routing protocol
90
100
110
120
130
170
110
-
What are two common TCP applications choose two
TFTP
SMTP
SNMP
FTP
DNS
MTP
FTP
-
Which statements accurately describe CDP Choose 3
CDP is an IEEE standard protocol
CDP is a Cisco proprietary protocol
CDP is a datalink layer protocol
CDP is a network layer protocol
CDP can discover directly connected neighboring Cisco devices
CDP can discover Cisco devices that are not directly connected
CDP is a Cisco proprietary protocol
CDP is a datalink layer protocol
CDP can iscover directly connected neighboring Cisco devices
-
What does the 128 refer to in the router output aboce?
OSPF cost
OSPF priority
OSPF hop count
OSPF ID number
OSPF administrative distance
OSPF cost
192.168.12.236/30 [110/128] via 192.168.12.233
-
Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet. Choose 3
10.1.168.0
10.1.176.1
10.1.174.255
10.1.160.255
10.1.160.0
10.1.175.255
- 10.1.168.0
- 10.1.174.255
- 10.1.160.255
-
A person is trying to send a file from a host on Network A of the JAX company to a server on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. Which command, issued from router RTA would be the most useful for troubleshooting this problem?
show flash
show history
show version
show interfaces
show controllers serial
show interfaces
-
HostX is transferring a file to the FTP server. Point A represents the frame as it goes towar the Toronto router. What will the Layer 2 destination address be at this point
- abcd.2246.0035
- fa0/0 Toronto (the default gateway)
-
The network is converged. After link state advertisements are received from Router_A what information will router_E contain in its routing table for the subnets 208.149.23.64 and 208.149.23.96
any answer with a serial1/0 is wrong
-
If a host experiences interittent issues that relate to congestion within a network while remaining connected, what coul cause congestion on this LAN?
half duplex operation
broadcast storms
network segmentation
multicasting
broadcast storms
-
Why would a network administrator configure port security on a switch?
to prevent unauthorized Telnet access to a switchport
to prevent unauthorized hosts from accessing the LAN
to limit the number of Layer 2 broadcasts on a particular switch port
block unauthorized access to the switch management interfaces
to prevent unauthorized hosts from accessing the LAN
-
which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?
#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
#ip route 192.168.202.0 255.255.255.0 192.168.201.1
#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
ip route 192.168.202.0 255.255.255.0 192.168.201.2 5
-
If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20 what is the maximum number of hosts allowed on this subnet?
1024
2046
4094
4096
8196
4094
-
Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? Choose 3
an IPv6 address is divided into eight 16 bit groups
a double colon(::) can only be used once in a singel IPv6 address
IPv6 addresses are 196 bits in length
Leading zeros cannot be omitted in an IPv6 address
Groups with a value of 0 can be represented with a single 0 in IPv6 address
- an IPv6 address is divided into eight 16 bit groups
- Leading zeros cannot be omitted in an IPv6 address
- Groups with a value of 0 can be represented with a single 0 in IPv6 address
-
Which two statements describe characteristics of IPv6 unicast addressing? choose 2
global addresses start with 2000::/3
Link-local addresses start with FE00:/12
Link local addresses start with FF00::/10
There is only one loopback aress and it is ::1
Global addresses start with 2000::/3
There is only one loopback adress and it is ::1
-
Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? Choose 2
10.6.8.35
133.6.5.4
192.168.5.9
127.0.0.1
190.6.5.4
133.6.5.4
190.6.5.4
-
Given the output for this command it the router ID has not been manually set, what router ID will OSPF use for this router?
10.1.1.2
10.154.154.1
172.16.5.1
192.168.5.3
172.16.6.1
-
WG1R2# show re
5 Ambiguous command: show ru
WG1R2#_
Why did the device return this message
The command requires addtional options or parameters
There is no show command that starts with ru
The command is being executed from the wrong router mode
There is more than one show command that starts with the letters ru
There is more than one show command that starts with the letters ru
-
Select two options which are security issues which need to be modified before RouterA is used choose 2
unencrypted weak password is configured to protect privilege mode
inappropriate wording n banner message
the virtual terminal lines have a weak passwor configured
virtual terminal lines have a password but it will not be used
configuration supports an secure web server access
inappropriate wording in banner message
virtual terminal lines have a password but it will not be used
-
what is the purpose of assigning an IP address to a switch
provides local hosts with a default gateway address
allows remote management of the switch
allows the switch to respond to ARP requests between two hosts
ensures that hosts on the same LAN can communicate with each other
allows remote management of the switch
-
A technician pases the configurations in the exhibit into the two new routers shown. Otherwise, the routers are configured with their default configuations. A ping from Host1 to Host2 fails, but the technician is able to ping the s0/0 interface of R2 from Host 1. The configurations of the hosts have been verified as correct. What could be the cause of the problem?
The serial cable on R1 needs to be replaced
The interfaces on R2 are not configured properly
R1 has no route to the 192.168.1.128 network
The IP addressing scheme has overlapping subnetworks
The ip subnet-zero command must be configured on both routers
R1 has no route to the 192.168.1.128 network
-
Which of teh following describe the process ientifier that is used to run OSPF on a Router Choose 2
It is locally significant
It is globally significant
It is neeed to identify a unique instance of an OSPF database
It is an optional parameter required only if multiple OSPF processes are running on the router
All routers in the same OSPF area must have the sme process ID if they are to exchange routing information.
It is locally significant
It is needed to identify a unique instance of an OSPF database
-
What must be configured to establish a successful connection from Host A to switch SW-a through router RT-A
VLAN 1 on Rt-A
IP routing on SW-A
efault gateway on SW-A
crossover cable connecting SW-A an RT-A
default dateway on SW-A
-
After configuring two interfaces on the HQ router, the network administrator notices an error message. What must be done to fix this error
The serial interface must be configure first
The serial interface must use the address 192.168.1.2
the subnet mask of the serial interface should be changed to 255.255.255.0
the sub
-
After configuring two interfaces on the HQ router, the network administrator notices and error message. What must be done to fix this error?
The serial interface must be configured first.
The serial interface must use the address 192.168.1.2
The subnet mask of the Fastthernet interface should be changed to 255.255.255.240
The address of the FastEthernet interface should be changed to 192.168.1.66
The subnet mask of the FastEthernet interface should be changed to 255.255.255.240
-
The ip helper-address command does what?
assigns an IP address to a host
resolves an IP address from a DNS server
relays a DHCP request across networks
resolves an IP address overlapping issue
relays a HCP request across networks
-
A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?
This design will function as intended
Spanning tree will need to be used
The router will not accept the addressing scheme
The connection between switches should be a trunk
The router interfaces must be encapsulated with the 802.1Q protocol
The router will not accept the addressing scheme
-
Which protocol uses a connection oriented service to deliver files between end systems?
TFTP
DNS
FTP
SNMP
RIP
FTP
-
Select three options which are security issues with the current configuration of Switch A
Privilege mode is protected with an unencrypted password
inappropriate wording in banner message
Virtual terminal lines are protected only by a password requirement
both the username and password are weak
Telenet connections canbe used to remotely manage the switch
Cisco user will be granted privilege level 15 by default
Privilege mode is protected with an unencrypted password
inappropriate wording in banner message
Both the username and password are weak
-
The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statements is true about this command/
The interface with IP address 192.168.10.2 is on this router
The command sets a gateway of last resort forthe router
Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2
The command creates a static route for all ip traffic with the source address 192.168.100.160
Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2
-
What statement about IPv6 is true
Addresses are not hierarchical an are assigned at random
Only one IPv6 address can exist on a given interface
There are 2.7 billion address available
Broadcasts have been eliminated and replaced with multicasts
Broadcasts have been eliminated and replaced with multicasts
-
How many simultaneous Telnet sessions does a Cisco router support by default
1
2
3
4
5
6
5
-
type of connection pc to switch
Ethernet straight through cable
-
type of cable switch to router
ethernet straight through cable
-
type of cable router to frame relay
Serial cable
-
type of cable router to pc
rollover cable
-
error message:
Password required but none set
why was this message received
No VTY pssword has been set
No enable password has been set
No console password has been set
No enable secret password has been set
No vty password has been set
-
What is the subnet broadcast address of teh LAN connected to Router1
192.168.8.15
192.168.8.31
192.168.8.63
192.168.8.127
192.168.8.15
-
Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowlegments?
Physical
Data link
Transport
Network
Transport
-
Which parameter or parameters are used to calculate OSPF cost in Cisco Routers?
Bandwith
Bandwidth and delay
Bandwidth Delay and MTU
Bandwidth MTU Reliability Delay and Load
Bandwidth
-
Which address type does a switch use to make selective forwarding decisions?
Source IP address
Destination IP address
Source and destination IP address
Source MAC address
Destination MAC address
Destination MAC address
-
hat are two remoccended ways of protecting network device configuration files from outside network security threats choose 2
allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
Use a firewall to restrict access from the outside to the network devices
Use SSH or another encrypted and authenticated transport to access device configurations
-
show ip route
the output is from a router in a large enterprise. From the output, determine the role of the router.
A core router
HQ internet gateway router
The WAN router at the central site
Remote stub router at a remote site
Remote stub router at a remote site
-
A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed in to frames directed toward the server?
HTTP
DNS
DHCP
RARP
ARP
ARP
-
Refer to the topology. R1 does not form an OSPF neighbor adjacency with R2. Which option would fix the issue?
R1 ethernet 0/1 is shutdown. Configure no sh command
R1 ehthernet0/1 configured with a non default OSPF hello interval of 25, configure no ip ospf hello interval 25
R2 ethernet0/1 and R3 ethernet0/0 are configured with a non default oOSPF hello interval of 25, configure no ip ospf hello interval 25
Endable OSPF for R1 ethernet0/1; configure ip ospf 1 area 0 command under ethernet 0/1
R1 ethernet0/1 configured with a non-default OSPF hello interval of 25; configure no ip ospf hello-interval 25
-
Which routers are likely to have been elected ad DR Choose 2
Corp 1
Corp 2
Corp 3
Corp 4
Branch 1
Branch 2
-
The junior network support staff provided the diagram as ra recommended configuration for the first phase of a four phase etwork expansion project. The entire network expansion will have over 1000 users on 14 network segmants and has been allocated this ip address space Choose three problems
the AREA 1 IP address space is inadequate for the number of users
The AREA 3 IP address space is inadequate for the number of users
Area 2 could use a mask of /25 to conserve IP address space
The network address space that is provided requires a single network wide mask
The router to router connection is wasting address space
The broadcast domain in Area 1 is too large for ip to function
The AREA 1 ip address space is indequate for the number of users
AREA 2 could use a mask of /25 to conserve IP address space
The router to router connection is wasting address space
-
How many addresses will be available for dynamic NAT translation when a router is configured with the following commands?
#ip nat pool TAME 209.165.201.23 209.165.201.30 netmask 255.255.255.224
# ip nat inside source list 9 pool TAME
7
8
9
10
24
32
8
-
Which OSI layer header contains the address of a destination host that is on another network?
application
session
transport
network
datalink
physical
network
-
which statement is true
An IPv6 address is 64 bits long and is represented as hexadecimal characters
An IPv6 address is 32 bits long and is represented as decimal digits
An IPv6 address is 128 bits long and is represented as decimal digits
An IPv6 address is 128 bits long and is represented as hexadecimal characters
An Pv6 address is 128 bits long and is represented as hexadecimal characters
-
what is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network?
#ip route 10.89.0.0 255.255.240.0 10.89.16.2
#ip route 10.89.3.0 255.255.0.0 10.89.16.2
#ip route 10.89.0.0 255.255.240.0 10.89.16.1
#ip route 0.0.0.0 0.0.0.0 10.89.16.1
router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1
-
Given a Class IP address subnetted with a /30 subnet mask how many valid host ip addresses are available on each of teh subnets
1
2
4
8
252
254
2
-
-
-
-
network access layer =
ETHERNET
-
Host A can communicate with Host B but not with Hosts C or D. How can the network administrtor solve this problem?
configure Hosts C and D with IP addresses in the 192.168.2.0 network
Install a router and configure a route to route between VLANs 2 and 3
Install a second switch and put Hosts C and D on that switch whole Hosts A and B remain on the original switch
Enable the VLAN trunking protocol on the switch`
Install a router and configure a route to toute between VLANs 2 and 3
-
What two thing can the technician determine by successfully pinging from this computer to the ip address 172.16.236.1 choose two
The network card on the computer is functioning correctly
The default static route on the gateway router is correctly configured
The correct default gateway ip address is configured on the computer
The device with the IP address 172.16.236.1 is reachable over the network
The default gateway at 172.16.236.1 is able to forward packets to the internet
the network card on the computer is functioning correctly
The device with the ip address 172.16.236.1 is reachable over the network.
-
An administrator is in the process of changing the configurtion of a router. hat command will allow the administrator to check the changes that have been made prior to saving the new configuration?
#show startup-config
#show current-config
#show running-config
#show memory
#show flash
#show processes
show running-config
|
|