Data-Com-2 - subject PDF

Title Data-Com-2 - subject
Author Silence Killer
Course information technology
Institution ACLC College
Pages 11
File Size 299 KB
File Type PDF
Total Downloads 65
Total Views 139

Summary

subject...


Description

The address is removed from the pool until the conflict is resolved.

2&4

Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict? "Which two statements correctly describe the components of a router? 1. RAM permanently stores the configuration file used during the boot sequence. 2. ROM contains diagnostics executed on hardware modules. 3. NVRAM stores a backup copy of the IOS used during the boot sequence. 4. Flash memory does not lose its contents during a reboot. 5. ROM contains the most current and most complete version of the IOS. 6. Flash contains boot system commands to identify the location of the IOS"

2, 3, 2005

OSPF routing uses the concept of areas. What are the three characteristics of OSPF areas?

ip address 192.168.10.2 255.255.0.0

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?

Administrative distance

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

1, 3, 2005 110

Which of the following 3 methods/types of NAT? What is the default administrative distance of OSPF?

1, 3, 2005

Which three statements describe the routing protocol OSPF?

Implement a router-on-a-stick configuration.

A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

None of the choices

Which of the following is NOT an element of converged network?

The port is operating at 1000 Mbps.

What is the status of the Port speed LED if the LED light is blinking green?

2, 3, 2006

A network associate in Genesis Aerospace Industries has configured OSPF with the command:

3&5

What two functions describe uses of an access control list?

2&3

Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle.

Process, Fast, Cisco Express Forwarding 1, 3, 2005

Which 3 statements describe the routing protocol OSPF?

1&3

The OSPF Hello protocol performs which of the following tasks?

Routers support three packet-forwarding mechanisms. These are

Assign and renew IP address from Which task does the Dynamic Host Configuration Protocol perform? the default pool. Native VLAN

A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward compatibility with untagged traffic common to legacy LAN scenarios.

Core layer

This layer is considered as the network backbone.

2.2.2.2

Refer to the exhibit. If the router Cisco returns the given output and has not had its router ID set manually, what value will OSPF use as its router ID?

Access, distribution and Core layer What are the 3 layers of the distribution access? Cisco Discovery Protocol

This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection.

1&4

Which 2 commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0?

Native VLAN

Which is the VLAN not tagged by 802.1q?

vlan.dat

Configurations are stored within a VLAN database file, called A collection of interconnected switches forms a _______________________.

Broadcast domain 802.1q Collision domain

Which protocols are used to configure trunking on a switch? The network segments that share the same bandwidth between devices.

ip address 192.168.10.2 255.255.0.0

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for specific Fast Ethernet interface?

Cut-through switch method

A switch forwarding method that begins the forwarding process after the destination MAC address of an incoming frame and the egress port has been determined.

2&3

"Which two features are characteristics of flash memory? 1. Flash receives a copy of the IOS from RAM when a device is powered on. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. The contents of flash may be lost during a power cycle."

ipv6 address ipv6-address/prefixlength eui-64

Which command is used to configure an IPv6 address on a router interface so that the router will combine a manually specified network prefix with an automatically generated interface identifier?

Place standard ACLs close to the destination IP address of the traffic.

Which statement are generally considered to be best practices in the placement of ACLs? (Choose three.)

1&5

Refer to the exhibit below. Which two statements about the configuration of the switch interface are correct?

All of the Choices

VLAN IDs 1002 through 1005 are reserved for

between 1006 and 4094

The extended range of VLAN ID is

The correct answer is 'True'. 4&6

VLANis a switching technology that reduces the size of a broadcast domain. When a DHCP server is configured, which two IP addresses should never be assignable to hosts?

Static route

If your routing table has a static, a RIP, and an OSPF route to the same network, which route will be used to route packets by default?

23

Telnet protocol by default uses Port ______.

VLANs are based on logical connections, instead of physical connections.

Which of the following describes a VLAN?

Remote

The following are switch port modes that DTP offers EXCEPT

Access layer

The primary function of this layer is to provide network access to the user.

All hosts in the networks have been operational for several hours The hosts will continue to communicate normally for a period when the DHCP server goes down. What happens to the hosts that have obtained service from the DHCP server? of time. VLAN is a switching technology that reduces the size of a broadcast The correct answer is 'True'. domain. 1, 3, 2005 debug ipnat

Which three features are of OSPF routing protocol? Which command will allow you to see real-time translations on your router?

VLAN tagging

This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.

3&5

Refer to the diagram below. The network administrator of RMS Overseas and Employment Agency that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied?

Modular configuration

The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.

Load balancing allows a router to forward packets over multiple paths to the same destination network.

Which statement describe a characteristicof load balancing?

Telnet DoS attack

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. This sort of attack prevents an administrator from remotely accessing switch management functions. This can be combined with other direct attacks on the network as part of a coordinated attempt to prevent the network administrator from accessing core devices during the breach.

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

Which statement describes a difference between the operation of inbound and outbound ACLs?

1, 3, 2005

Which of the following are 3 disadvantages of using NAT?

to provide an IP configuration information to hosts

What is the purpose of the DHCP server?

2&3

Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally?

This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of Double Tagging Attack 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame. Traffic will be dropped, because of Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.12.12.10 if the traffic is the implicit deny all at the end of processed by this ACL? the ACL.

NAT Overload 802.1q & ISL Data VLAN Bandwidth

Full duplex mode

PAT Address Translation is also termed what? Which two link protocols are used to carry multiple VLANs over a single link? A type of VLAN that is configured to carry user-generated traffic. Which parameter or parameters are used to calculate OSPF cost in Cisco routers? Sometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.

A switch populates the MAC address table based on destination Which of the following statement is INCORRECT? MAC addresses. None in the choices

Network infrastructure devices require IP addresses to enable remote management. Using the device IP address, the network administrator can remotely connect to the device using any of the following EXCEPT

Distribution layer

This layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.

DHCP Snooping

This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices.

2, 4, 2005

"Which three elements must be used when you configure a router interface for VLAN trunking? 1. one physical interface for each subinterface 2. one IP network or subnetwork for each subinterface 3. a management domain for each subinterface 4. subinterface encapsulation identifiers that match VLAN tags 5. one subinterface per VLAN 6. subinterface numbering that matches VLAN tags"

10 Switchport access vlan

What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multiaccess network? If the port is assigned to the wrong VLAN, what command to be command to change the VLAN membership on a particular port?

2&4

"Which two link protocols are used to carry multiple VLANs over a single link? 1. VTP 2. 802.1q 3. IGP 4. ISL 5. 802.3u"

2&3

"Which two features are characteristics of flash memory? 1. The contents of flash may be lost during a power cycle. 2. Flash provides nonvolatile storage. 3. The contents of flash may be overwritten. 4. Flash is a component in Cisco switches but not in Cisco routers. 5. Flash receives a copy of the IOS from RAM when a device is powered on."

Trunks

This is a conduit for multiple VLANs between switches and routers.

1&2

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task?

VLAN 1

The default VLAN for Cisco switches is ____________________.

22

SSH protocol by default uses Port ______.

ip access-group 101 in

As a network administrator of RMS Aerospace Industries, you have

3&6

been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router? When a DHCP server is configured, which two IP addresses should never be assignable to hosts?

Trunks

This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.

None of the choices

The following are VLAN best practices EXCEPT?

Vlan 30

What is the command to create a VLAN with a valid VLAN ID number 30?

1&2

Which two statements about static NAT translations are true?

They filter traffic based on source IP addresses only.

Which statement describes a characteristic of standard IPv4 ACLs?

Refer to the exhibit. The user at Workstation B reports that Server A The gateway for Server A is not on cannot be reached. What is preventing Workstation B from reaching the same subnet. Server A? show vlan

In troubleshooting VLANs, what command should be used to check whether the port belongs to the expected VLAN?

ip nat pool Todd 171.16.10.65 Which command will create a dynamic pool named Todd that will 171.16.10.94 net 255.255.255.224 provide you with 30 global addresses? Dynamic Trunking Protocol is disable by default.

Which of the following describes Dynamic Trunking Protocol?

RAM

This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

Permit all packets matching the first three octets of the source address to all destinations

The following configuration line was added to router R1

None of the choices

Which of the following is NOT a feature of a Switched Network

4

What is the default number of equal-cost paths that can be placed into the routing of a Cisco OSPF router?

There is an incorrect IP address configured on GigabitEthernet 0/0.30.*

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?

All of the choices 2&4

4&5

Which of the following is an element of converged network? "Which of the following are 2 primary functions of a router? 1. Packet switching 2. Microsegmentation 3. Domain name resolution 4. Path selection 5. Flow control" "Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count."

4&5

Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.) 1. The metric varies depending which Layer 3 protocol is being routed, such as IP. 2. A router first installs routes with higher administrative distances. 3. The value of the administrative distance can not be altered by the network administrator. 4. Routes with the smallest metric to a destination indicate the best path. 5. Administrative distance refers to the trustworthiness of a particular route. 6. The metric is always determined based on hop count.

The correct answer is 'False'.

"True of False. Ingress is used to describe frames leaving the device through a particular port."

SSH

A protocol that provides an encrypted connection to a remote device.

Mode

If an error occurs while loading the operating system because of missing or damaged system files, the load loader can be access through a console connection. What button in the switch you need to press while reconnecting the power cord?

It is a logical interface internal to the router.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?

Check your interfaces for the correct configuration.

Which of the following would be a good starting point for troubleshooting if your router is not translating?

Permit tcp any host 2001:DB8:10:10::100 eq 25

Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64? Which command would you place on interface connected to the Internet?

ip nat outside show ip nat statistics

Which command will show you the summary of the NAT configuration?

ip access-group 101 in

As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?

Routers support a variety of interface types. Switches typically support Ethernet interfaces.

What is one feature that distinguishes routers from Layer 2 switches?

When selecting the type of switch, rack units should always be Which of the following statement is INCORRECT? considered. Rack units is the number ports available in the network switch. ip nat inside

Which command would you place on interface on a private network?

802.1q

Which protocolis used to configure trunking on a switch?

Show access-lists

Which router command allows you to view the entire contents of all access lists?

All traffic exiting E0 will be denied

The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:

The correct answer is 'True'.

Router On Stick is a method used for communicating inter-vlan

using a router. None of the choices

Which of the following describes a VLAN?

Static route

If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?

configure terminal

Global configuration mode is used to configure system globally, or to enter specific configuration modes to configure specific elements such as protocols. What is the command to enter global configuration mode?

1 and 3

What are the two main types of access control lis...


Similar Free PDFs