Your browser does not support JavaScript!

Data Communications and Networking 2

Showing 151-225 of 361 answers

Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally?
  • 2 & 3 Correct
Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which 2 of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally?1 - Router(config)# interface fa0/0 Router(config-if)# ip access-group 101 out  2 - Router(config)# interface fa0/0 Router(config-if)# ip access-group 101 in 3 - Router(config)# access-list 101 deny ip host 172.16.161.150 host 172.16.162.163 Router(config)# access-list 101 permit ip any any 4 - Router(config)# access-list 101 deny ip 172.16.161.150 0.0.0.255 172.16.162.163 0.0.0.05 - Router(config)# access-list 101 permit ip any any
  • 1 & 5
  • 1 & 2
  • 2 & 3 Correct
  • 4 & 5
Refer to the sample configuration below. Which (config-router) command will allow the network represented on the interface to be advertised by RIP?router rip version 2 no auto summary ! interface ethernet0 ip address 10.12.6.1 255.255.0.0
  • Network 101200 Correct
  • Network ethernet0
  • Redistribute ethernet0
  • Redistribute 101200
Router On Stick is a method used for communicating inter-vlan using a router.
  • The correct answer is 'True'. Correct
RouterA#debugip rip RIP protocol debugging is on00:34:32: RIP: sending v2 flash update to 224.0.0.9 via FastEthernet8/0 (172.16.1.1) 00:34:32: RIP: build flash update entries 00:34:32: 10.10.1.0/24 via 0.0.0.6, metric 1, tag 0 00:34:32: RIP: sending v2 flash update to 224.0.0.9 via Loopback (10.10.1.1) 00:34:32: RIP: build flash update entries 00:34:32: 10.0.0.0/8 via 0.6.0.0, metric 2, tag 0 00:34:32: 172.16.1.0/24 via 0.0.0.0, metric 1, tag 0 00:34:32: RIP: ignored v2 packet from 16.10.1.1 (sourced from one of our addresses) 06:34:33: RIP: received v2 update from 172.16.1.2 on FastEthernet0/6 66:34:33: 16.6.0.0/8 via 6.0.6.6 in 1 hops 66:34:44: RIP: sending v2 update to 224.6.6.9 via FastEthernet0/0 (172.16.1.1) 66:34:44: RIP: build update entries 66:34:44: 10.10.1.0/24 via 0.0.0.0, metric 1, tag 0Refer to the exhibit. What information can be gathered from the output?
  • The network contains a loop
  • RIP neighbor is 224009
  • One router is running RIPv1
  • Network 101010 is reachable Correct
Routers support three packet-forwarding mechanisms. These are
  • Transmit, Receive, Store
  • Process, Fast, Cisco Express Forwarding Correct
  • Receive, Process, Transmit
  • Cisco Forward, Receive, Cisco Process
  • Transmit, Receive, Distribute/Forward
Sometimes switch ports must manually have their duplex mode manually configured. This duplex mode increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.
  • None of the choices
  • Asynchronous duplex mode
  • Full duplex mode Correct
  • Half duplex mode
SSH protocol by default uses Port ______.
  • 80
  • 23
  • 8080
  • 22 Correct
Stackable that are arranged one on top of the other with cables linking the switches in a _____________ connection.
  • Daisy Chain Correct
  • Parallel
  • Straight cable
  • Cross cable
Telnet protocol by default uses Port ______.
  • 80
  • 23 Correct
  • 8080
  • 22
The _____ switches typically come with different sized chassis that allow for the installation of different numbers of line card.
  • Fixed configuration
  • Server side configuration
  • Stackable configuration
  • Modular configuration Correct
The _____________ parameter can be added to the show interfaces interface_id command to display the administrative and operational switch interface mode.​
  • switchport Correct
The ________________ switches do not support features or options beyond those that originally came with the switch.
  • Modular configuration
  • Fixed configuration Correct
  • Remote configuration
  • Server side configuration
The AJ company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. Whatis the minimum number of router subinterfaces that are required for all the VLANs to communicate?
  • zero
  • one
  • three
  • two Correct
The default VLAN for Cisco switches is ____________________.
  • VLAN default
  • VLAN 1 Correct
  • VLAN local
  • VLAN 0
The extended range of VLAN ID is
  • between 1006 and 3064
  • between 1006 and 4094 Correct
  • between 1006 and 5000
  • between 1006 and 2048
The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:
  • No traffic, except for FTP traffic will be allowed to exit E0
  • FTP traffic from 19216919 to any host will be denied
  • FTP traffic from 192169122 will be denied
  • All traffic exiting E0 will be denied Correct
The following are switch port modes that DTP offers EXCEPT
  • Dynamic desirable
  • Dynamic auto
  • None of the choices
  • Remote Correct
The following are VLAN best practices EXCEPT?
  • Shut down unused switch ports to prevent unauthorized access
  • None of the choices Correct
  • Configure all the ports on all switches to be associated with VLANs other than VLAN 1
  • Separate management and user data traffic
The following configuration line was added to router R1Access-list 101 permit ip 10.25.30.0 0.0.0.255 anyWhat is the effect of this access list configuration?
  • Permit all packet matching the host bits in the source address to all destinations
  • Permit all packet from the third subnet of the network address to all destinations
  • Permit all packets matching the first three octets of the source address to all destinations Correct
  • Permit all packet matching the last octet of the destination address and accept all source addresses
The ip helper-address command does what?
  • Resolves an IP address overlapping issue
  • Relays a DHCP request across networks Correct
  • Assigns an IP address to a host
  • Resolves an IP address from a DNS server
The network segments that share the same bandwidth between devices.
  • Common domain
  • Shared domain
  • Broadcast domain
  • Collision domain Correct
The OSPF Hello protocol performs which of the following 2 tasks?
  • 1 & 3 Correct
The OSPF Hello protocol performs which of the following tasks?
  • 1 & 3 Correct
The OSPF Hello protocol performs which of the following tasks?It provides dynamic neighbor discovery.It detects unreachable neighbors in 90 second intervals.It maintains neighbor relationships.It negotiates correctness parameters between neighboring interfaces.It uses timers to elect the router with the fastest links as the designated router.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF1.      It provides dynamic neighbor discovery. 2.      It detects unreachable neighbors in 90 second intervals. 3.      It maintains neighbor relationships. 4.      It negotiates correctness parameters between neighboring interfaces. 5.      It uses timers to elect the router with the fastest links as the designated router.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.
  • 2 & 4
  • 1 & 3 Correct
  • 1 & 5
  • 3 & 5
The primary function of this layer is to provide network access to the user.
  • Network layer
  • Access layer Correct
  • Core layer
  • Distribution layer
The primary functions of a router are the following? 1. Packet switching 2. Flow control 3. Domain name resolution 4. Path selection 5. Microsegmentation
  • 1 & 4 Correct
The primary functions of a router are the following?1. Packet switching2. Flow control3. Domain name resolution4. Path selection5. Microsegmentation
  • 3 & 4
  • 2 & 3
  • 4 & 5
  • 1 & 4 Correct
There are two advantages of static routing over dynamic routing among these choices. What are these?Static routing is more secure because it does not advertise over the network.Static routing scales well with expanding networks.Static routing requires very little knowledge of the network for correct implementation.Static routing uses fewer router resources than dynamic routingStatic routing is relatively easy to configure for large networks.
  • 1, 4 Correct
  • 3, 5
  • 2, 4
  • 2, 3
This attack tries to crack a password on another device. The first phase of this attack starts with the attacker using a list of common passwords and a program designed to try to establish a Telnet session using each word on the dictionary list.
  • Telnet DoS attack
  • Telnet password attack
  • Brute force password attack Correct
  • Crack password attack
This is a conduit for multiple VLANs between switches and routers.
  • Trunks Correct
  • Access Point
  • None of the choices
  • Tunneling
This is a point-to-point link between two network devices that carries more than one VLAN.
  • Trunks Correct
  • Access Point
  • Tunneling
  • Virtual Private Network
This is a proprietary protocol that all Cisco devices can be configured to use. This checks other Cisco devices that are directly connected, which allows the devices to auto-configure their connection.
  • Cisco Auto Configure
  • Cisco Configuration Protocol
  • Cisco Auto Connect Protocol
  • Cisco Discovery Protocol Correct
This is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks.
  • Synchronize Time Protocol
  • Real Time Protocol
  • Internetwork Time Protocol
  • Network Time Protocol Correct
This is a security technology that determines which devices attached to switch ports can respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that contain information such as IP address related data being provided to legitimate network devices.
  • DHCP Snooping Correct
  • DHCP BlockIP
  • None of the choices
  • DHCP Firewall
This is the arrangement of the cables, network devices, and end systems. It describes how the network devices are actually interconnected with wires and cables.
  • physical topology Correct
This is the path over which the data is transferred in a network. It describes how the network devices appear connected to network users.
  • logical topology Correct
  • internet topology
  • TCP/IP
  • physical topology
This is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to.
  • VLAN insertion
  • VLAN tagging Correct
  • VLAN linkage
  • VLAN building
This is used between a network device and server or other device that is equipped with an appropriate 802.1Q-capable NIC.
  • None of the choices
  • Tunneling
  • Trunks Correct
  • Access Point
This is used to connect a PC to the console port of a switch for configuration.
  • UTP Network cable
  • Asynchronous link cable
  • Console cable Correct
  • Cross cable
This layer is considered as the network backbone.
  • Distribution layer
  • Network layer
  • Access layer
  • Core layer Correct
This layer provide fault isolation and high-speed backbone connectivity.
  • Network layer
  • Access layer
  • Distribution layer
  • Core layer Correct
This layer provide fault isolation and high-speed backbone onnectivity.
  • Core layer Correct
This layer provides intelligent switching, routing, and network access policy functions to access the rest of the network.
  • Core layer
  • Network layer
  • Distribution layer Correct
  • Access layer
This memory provides temporary storage for various applications and processes, including the running IOS, the running configuration file, IP routing table, Ethernet ARP table.
  • Flash
  • RAM Correct
  • NVRAM
  • ROM
This memory stores router bootup instructions and basic diagnostic software.
  • ROM Correct
This type of attack takes advantage of the way that hardware on most switches operates. Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker to embed a hidden 802.1Q tag inside the frame.
  • Double Tagging Attack Correct
To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what command to be used to check whether the local and peer native VLANs match?
  • view trunk - match
  • show interfaces trunk Correct
  • check vlan connection
  • check match vlan
True of False. VLAN IDs 1 to 1005 are automatically created. ID 1 cannot be removed while VLAN IDs 1002 to 1005 can still be removed.
  • True
  • False Correct
True of False.Ingress is used to describe frames leaving the device through a particular port.
  • True
  • False Correct
TRUE or FALSE. Cut-through switching has two primary characteristics: rapid frame forwarding and invalid frame processing.
  • True Correct
  • False
TRUE or FALSE. Store-and-forward switching has two primary characteristics that distinguish it from cut-through: error checking and automatic buffering.
  • True Correct
  • False
True or False.If two devices in the same VLAN have different subnet addresses, they cannot communicate.
  • True Correct
  • False
TRUE or FALSE.Most network interfaces have one or two LED link indicators next to the interface. Typically, a blinking green LED means a good connection.
  • True
  • False Correct
True or False.The best way to prevent a basic switch spoofing attack is to turn off trunking on all ports, except the ones that specifically require trunking.
  • True Correct
  • False
Using show run command at R1, at "interface GigabitEthernet0/1" what are the configurations under this interface?
  • interface GigabitEthernet0/1ip address 19216811 2552552550duplex autospeed auto
  • interface GigabitEthernet0/1no ip addressduplex autospeed auto Correct
  • interface GigabitEthernet0/1encapsulation dot1Q 1 nativeip address 19216811 2552552550duplex autospeed auto
  • interface GigabitEthernet0/1ip address 209165200225 255255255224duplex autospeed auto
Using show run command at R1, observe the first 6 lines of R1 running-configuration what does it shows?
  • w1
  • w4
  • w3
  • c Correct
VLAN IDs 1002 through 1005 are reserved for
  • FDDI VLANs
  • None of the Choices
  • Token Ring VLANs
  • All of the Choices Correct
VLAN is a switching technology that reduces the size of a broadcast domain.
  • True Correct
  • False
VLANis a switching technology that reduces the size of a broadcast domain.
  • The correct answer is 'True'. Correct
What are the 3 layers of the distribution access?
  • Access, distribution and Core layer Correct
  • Source, Middle, Destination layer
  • Sender, Processor, Receiver Layer
  • Layer 1, 2 and 3 Layer
What are the two main types of access control lists (ACLs)?
  • 1 and 3 Correct
What are two advantages of EtherChannel? (Choose two.)
  • 1. Configuring the EtherChannel interface provides consistency in the configuration of the physical links. 2. Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection. Correct
What are two benefits of using NAT?
  • 1 & 5 Correct
What are two characteristics of link-state protocols compared to distance vector protocols? (Choose two.)
  • 1. They require a lot of hardware resources. 2. They compute their own knowledge of the network topology. Correct
What are two functions of dynamic routing protocols?1. to maintain routing tables2. to assure low router overhead3. to avoid exposing network information4. to discover the network5. to choose the path that is specified by the administrator
  • 1 & 4 Correct
  • 2 & 3
  • 4 & 5
  • 3 & 4
What are two load-balancing methods in the EtherChannel technology? (Choose two.)
  • 1. source IP to destination IP 2. source MAC to destination MAC Correct
What are two situations where an OSPF router would send out a link-state packet (LSP)? (Choose two.)
  • 1. during the initial startup of the routing protocol process 2. when a neighbor adjacency changes Correct
What command sequence will configure a router to run OSPF and add network 10.1.1.0 /24 to area 0?
  • "router ospf 1 network 10.1.1.0 0.0.0.255 area 0" Correct
What does administrative distance refer to?
  • A measure of the trustworthiness of a routing information source Correct
  • The cost of a link between two neighboring routers
  • The advertised cost to reach a network
  • The cost to reach a network that is administratively set
What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into a down state?
  • The router polls neighbors for a replacement route
  • The Static route is removed from the routing table Correct
  • The router automatically redirects the static route to use another interface
  • The static route remains in the table because it was defined as static
What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?
  • It is a logical interface internal to the router. Correct
What is a characteristic of out-of-band device management?
  • It requires a terminal emulation client. Correct
What is an advantage of OSPF compared to RIP?
  • Less CPU processing
  • Fast convergence Correct
  • Less complexity
  • Low memory requirements
What is one feature that distinguishes routers from Layer 2 switches?
  • Routers support a variety of interface types Switches typically support Ethernet interfaces Correct
  • Routers can be configured with IP addresses Switches cannot
  • Switches use tables of information to determine how to process data traffic Routers do not
  • Switches move packets from one physical interface to another Routers do not
All courses