-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathlink.csv
More file actions
We can make this file beautiful and searchable if this error is corrected: Any value after quoted field isn't allowed in line 2.
742 lines (742 loc) · 132 KB
/
link.csv
File metadata and controls
742 lines (742 loc) · 132 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
exam|choice
"During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?"|"spyware"
"Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?"|"extranet"
"A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?"|"bring your own device"
"What is an ISP?"|"It is an organization that enables individuals and businesses to connect to the Internet."
"An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?"|"an intranet"
"Which statement describes the use of powerline networking technology?"|"A device connects to an existing home LAN using an adapter and an existing electrical outlet."
"A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?"|"security"
"What two criteria are used to help select a network medium from various network media? (Choose two.)"|"the distance the selected medium can successfully carry a signal","the environment where the selected medium is to be installed"
"What type of network traffic requires QoS?"|"video conferencing"
"A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)"|"implementing a firewall","installing antivirus software"
"Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)"|"VTY interface","console interface","privileged EXEC mode"
"Which interface allows remote management of a Layer 2 switch?"|"the switch virtual interface"
"What function does pressing the Tab key have when entering a command in IOS?"|"It completes the remainder of a partially typed word in a command."
"While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?"|"Issue the reload command without saving the running configuration."
"An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?"|"to interrupt the ping process"
"A technician configures a switch with these commands:<prompt>SwitchA(config)# interface vlan 1</br>SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0</br>SwitchA(config-if)# no shutdown</br>What is the technician configuring?</prompt>"|"SVI"
"Which command or key combination allows a user to return to the previous level in the command hierarchy?"|"exit"
"What are two characteristics of RAM on a Cisco device? (Choose two.)"|"The configuration that is actively running on the device is stored in RAM.","The contents of RAM are lost during a power cycle."
"Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)"|"RM-3-Switch-2A4","SwBranch799"
"How is SSH different from Telnet?"|"SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext."
"What are three characteristics of an SVI? (Choose three.)"|"It is not associated with any physical interface on a switch.","It provides a means to remotely manage a switch.","It is associated with VLAN1 by default."
"What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?"|"show ip interface brief"
"In the show running-config command, which part of the syntax is represented by running-config?"|"a keyword"
"After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?"|"The new configuration will be loaded if the switch is restarted."
"What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?"|"(config)# service password-encryption"
"A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?"|"This command prevents someone from viewing the running configuration passwords."
"What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?"|"flow control"
"Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?"|"Segments are sent from the transport layer to the internet layer."
"What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)"|"DHCP","DNS","FTP"
"Which name is assigned to the transport layer PDU?"|"segment"
"When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?"|"subnet mask"
"What process involves placing one PDU inside of another PDU?"|"encapsulation"
"What layer is responsible for routing messages through an internetwork in the TCP/IP model?"|"internet"
"Which PDU format is used when bits are received from the network medium by the NIC of a host?"|"frame"
"Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?"|"response timeout"
"A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?"|"Ethernet, IP, TCP, HTTP"
"Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)"|"data link","physical"
"At which layer of the OSI model would a logical address be added during encapsulation?"|"network layer"
"What is a characteristic of multicast messages?"|"They are sent to a select group of hosts."
"Which statement is correct about network protocols?"|"They define how messages are exchanged between the source and the destination."
"What is an advantage of network devices using open standard protocols?"|"A client host and a server running different operating systems can successfully exchange data."
"Which device performs the function of determining the path that messages should take through internetworks?"|"a router"
"Why would a Layer 2 switch need an IP address?"|"to enable the switch to be managed remotely"
"What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?"|"extranet"
"What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?"|"cloud"
"What term describes a network where one computer can be both client and server?"|"peer-to-peer"
"What term describes a type of network used by people who work from home or from a small remote office?"|"SOHO network"
"What term describes a computing model where server software runs on dedicated computers?"|"client/server"
"What term describes a type of network used by people who work from home or from a small remote office?"|"SOHO network"
"What term describes a technology that allows devices to connect to the LAN using an electrical outlet?"|"powerline networking"
"What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?"|"quality of service"
"What term describes a private collection of LANs and WANs that belongs to an organization?"|"intranet"
"What term describes the ability to use personal devices across a business or campus network?"|"BYOD"
"At which OSI layer is a source IP address added to a PDU during the encapsulation process?"|"network layer"
"At which OSI layer is a destination port number added to a PDU during the encapsulation process?"|"transport layer"
"At which OSI layer is data added to a PDU during the encapsulation process?"|"application layer"
"At which OSI layer is a source IP address added to a PDU during the encapsulation process?"|"network layer"
"At which OSI layer is data added to a PDU during the encapsulation process?"|"application layer"
"At which OSI layer is a destination IP address added to a PDU during the encapsulation process?"|"network layer"
"At which OSI layer is a source MAC address added to a PDU during the encapsulation process?"|"data link layer"
"At which OSI layer is a source port number added to a PDU during the encapsulation process?"|"transport layer"
"At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?"|"data link layer"
"At which OSI layer is a source port number added to a PDU during the encapsulation process?"|"transport layer"
"What is the purpose of the OSI physical layer?"|"transmitting bits across the local media"
"Why are two strands of fiber used for a single fiber optic connection?"|"They allow for full-duplex connectivity."
"Which characteristic describes crosstalk?"|"the distortion of the transmitted messages from signals carried in adjacent wires"
"Which procedure is used to reduce the effect of crosstalk in copper cables?"|"twisting opposing circuit wire pairs together"
"A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)"|"the amount of traffic that is currently crossing the network","the type of traffic that is crossing the network","the latency that is created by the number of network devices that the data is crossing"
"What are two characteristics of fiber-optic cable? (Choose two.)"|"It is not affected by EMI or RFI.","It is more expensive than UTP cabling is."
"What is a primary role of the Physical layer in transmitting data on the network?"|"create the signals that represent the bits in each frame on to the media"
"With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?"|"the magnetic field around the adjacent pairs of wire"
"In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)"|"crosstalk","electromagnetic interference"
"Which two devices commonly affect wireless networks? (Choose two.)"|"cordless phones","microwaves"
"Which two statements describe the services provided by the data link layer? (Choose two.)"|"It manages the access of frames to the network media.","It packages various Layer 3 PDUs into a frame format that is compatible with the network interface."
"What is the function of the CRC value that is found in the FCS field of a frame?"|"to verify the integrity of the received frame"
"What is contained in the trailer of a data-link frame?"|"error detection"
"Which statement describes a characteristic of the frame header fields of the data link layer?"|"They vary depending on protocols."
"A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?"|"partial mesh"
"Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? (Choose two.)"|"Frame Check Sequence","minimum frame size"
"Which media communication type does not require media arbitration in the data link layer?"|"full-duplex"
"Which statement describes an extended star topology?"|"End devices connect to a central intermediate device, which in turn connects to other central intermediate devices."
"What is a characteristic of the LLC sublayer?"|"It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media."
"What are three ways that media access control is used in networking? (Choose three.)"|"Ethernet utilizes CSMA/CD.","Media access control provides placement of data frames onto the media.","Data link layer protocols define the rules for access to different media."
"During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?"|"The physical address is added."
"What three items are contained in an Ethernet header and trailer? (Choose three.)"|"source MAC address","destination MAC address","error-checking information"
"What type of communication rule would best describe CSMA/CD?"|"access method"
"Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)"|"header","data","trailer"
"Which statement is true about the CSMA/CD access method that is used in Ethernet?"|"All network devices must listen before transmitting."
"What is the auto-MDIX feature on a switch?"|"the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection"
"A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?"|"shared memory buffering"
"What are two examples of the cut-through switching method? (Choose two.)"|"fast-forward switching","fragment-free switching"
"Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?"|"store-and-forward switching"
"What is the purpose of the FCS field in a frame?"|"to determine if errors occurred in the transmission and reception"
"Which switching method has the lowest level of latency?"|"fast-forward"
"A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)"|"The link between the switches will work at the fastest speed that is supported by both switches.","The link between switches will work as full-duplex.","The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable."
"Which advantage does the store-and-forward switching method have compared with the cut-through switching method?"|"frame error checking"
"When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?"|"CRC in the trailer"
"Which switching method uses the CRC value in a frame?"|"store-and-forward"
"What are two actions performed by a Cisco switch? (Choose two.)"|"using the source MAC addresses of frames to build and maintain a MAC address table","utilizing the MAC address table to forward frames via the destination MAC address"
"Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)"|"Logical link control is implemented in software.","The data link layer uses LLC to communicate with the upper layers of the protocol suite."
"What is the auto-MDIX feature?"|"It enables a device to automatically configure an interface to use a straight-through or a crossover cable."
"What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?"|"has a lower latency appropriate for high-performance computing applications"
"Which is a multicast MAC address?"|"01-00-5E-00-00-03"
"What does the term “attenuation” mean in data communication?"|"loss of signal strength as distance increases"
"What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)"|"greater distances per cable run","limited susceptibility to EMI/RFI","greater bandwidth potential"
"What OSI physical layer term describes the process by which one wave modifies another wave?"|"modulation"
"What OSI physical layer term describes the capacity at which a medium can carry data?"|"bandwidth"
"What OSI physical layer term describes the capacity at which a medium can carry data?"|"bandwidth"
"What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?"|"throughput"
"What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?"|"latency"
"What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?"|"latency"
"What OSI physical layer term describes the measure of usable data transferred over a given period of time?"|"goodput"
"What OSI physical layer term describes the physical medium which uses electrical pulses?"|"copper cable"
"What OSI physical layer term describes the physical medium that uses the propagation of light?"|"fiber-optic cable"
"What OSI physical layer term describes the physical medium for microwave transmissions?"|"air"
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Implements a trailer to detect transmission errors.","Controls the NIC responsible for sending and receiving data on the physical medium."
"Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)"|"Enables IPv4 and IPv6 to utilize the same network interface and media.","Places information in the frame that identifies which network layer protocol is being used for the frame."
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Provides a mechanism to allow multiple devices to communicate over a shared medium.","Controls the NIC responsible for sending and receiving data on the physical medium."
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Controls the NIC responsible for sending and receiving data on the physical medium.","Integrates various physical technologies."
"Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)"|"Adds Layer 2 control information to network protocol data.","Places information in the frame that identifies which network layer protocol is being used for the frame."
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Provides synchronization between source and target nodes.","Integrates various physical technologies."
"Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)"|"Adds Layer 2 control information to network protocol data.","Enables IPv4 and IPv6 to utilize the same network interface and media."
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Implements a trailer to detect transmission errors.","Provides synchronization between source and target nodes."
"Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)"|"Enables IPv4 and IPv6 to utilize the same network interface and media.","Adds Layer 2 control information to network protocol data."
"Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)"|"Provides a mechanism to allow multiple devices to communicate over a shared medium.","Controls the NIC responsible for sending and receiving data on the physical medium."
"What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?"|"The switch refreshes the timer on that entry."
"What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?"|"The switch forwards it out all ports except the ingress port."
"What action will occur if a host receives a frame with a destination MAC address it does not recognize?"|"The host will discard the frame."
"What action will occur if a switch receives a frame with the destination MAC address 01:00:5E:00:00:D9?"|"The switch forwards it out all ports except the ingress port."
"What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?"|"The host will process the frame."
"What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?"|"The switch refreshes the timer on that entry."
"What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?"|"The host will process the frame."
"What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?"|"The switch refreshes the timer on that entry."
"What action will occur if a host receives a frame with a destination MAC address it does not recognize?"|"The host will discard the frame."
"What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?"|"The switch forwards it out all ports except the ingress port."
"Which information is used by routers to forward a data packet toward its destination?"|"destination IP address"
"A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?"|"The packet will be sent directly to the destination host."
"A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?"|"create a new Layer 2 Ethernet frame to be sent to the destination"
"Which IPv4 address can a host use to ping the loopback interface?"|"127.0.0.1"
"A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?"|"The computer has an invalid default gateway address."
"Which statement describes a feature of the IP protocol?"|"IP relies on upper layer services to handle situations of missing or out-of-order packets."
"Why is NAT not needed in IPv6?"|"Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large."
"Which parameter does the router use to choose the path to the destination when there are multiple routes available?"|"the lower metric value that is associated with the destination network"
"What are two services provided by the OSI network layer? (Choose two.)"|"routing packets toward the destination","encapsulating PDUs from the transport layer"
"Within a production network, what is the purpose of configuring a switch with a default gateway address?"|"The default gateway address is used to forward packets originating from the switch to remote networks."
"What is a basic characteristic of the IP protocol?"|"connectionless"
"Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?"|"Time-to-Live"
"What is one advantage that the IPv6 simplified header offers over IPv4?"|"efficient packet handling"
"What IPv4 header field identifies the upper layer protocol carried in the packet?"|"Protocol"
"What information does the loopback test provide?"|"The TCP/IP stack on the device is working correctly."
"What routing table entry has a next hop address associated with a destination network?"|"remote routes"
"How do hosts ensure that their packets are directed to the correct network destination?"|"They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route."
"When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?"|"Flow Label"
"What statement describes the function of the Address Resolution Protocol?"|"ARP is used to discover the MAC address of any host on the local network."
"Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)"|"The frame has the broadcast address as the destination address.","The destination address is unknown to the switch."
"Which statement describes the treatment of ARP requests on the local link?"|"They are received and processed by every device on the local network."
"Which destination address is used in an ARP request frame?"|"FFFF.FFFF.FFFF"
"A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?"|"The ARP cache is cleared."
"Which two types of IPv6 messages are used in place of ARP for address resolution?"|"neighbor solicitation","neighbor advertisement"
"What is the aim of an ARP spoofing attack?"|"to associate IP addresses to the wrong MAC address"
"Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?"|"ARP cache"
"What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?"|"destination MAC address"
"A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?"|"Exit privileged EXEC mode and press Enter."
"What are two functions of NVRAM? (Choose two.)"|"to retain contents when power is removed","to store the startup configuration file"
"A router boots and enters setup mode. What is the reason for this?"|"The configuration file is missing from NVRAM."
"The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?"|"The switch can be remotely managed from a host on another network."
"What happens when the transport input ssh command is entered on the switch vty lines?"|"Communication between the switch and remote users is encrypted."
"Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)"|"line console 0","login","password cisco"
"Which two functions are primary functions of a router? (Choose two.)"|"packet forwarding","path selection"
"What is the effect of using the Router# copy running-config startup-config command on a router?"|"The contents of NVRAM will change."
"What will happen if the default gateway address is incorrectly configured on a host?"|"The host cannot communicate with hosts in other networks."
"What are two potential network problems that can result from ARP operation? (Choose two.)"|"On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.","Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic."
"Which term describes a field in the IPv4 packet header used to identify the next level protocol?"|"protocol"
"Which term describes a field in the IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet?"|"differentiated services"
"Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device?"|"source IPv4 address"
"Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?"|"header checksum"
"Refer to the exhibit. A network administrator is connecting a new host to the Payroll LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>RTR1(config)# interface gi0/1</br>RTR1(config-if)# description Connects to the Marketing LAN</br>RTR1(config-if)# ip address 10.27.15.17 255.255.255.0</br>RTR1(config-if)# no shutdown</br>RTR1(config-if)# interface gi0/0</br>RTR1(config-if)# description Connects to the Payroll LAN</br>RTR1(config-if)# ip address 10.27.14.148 255.255.255.0</br>RTR1(config-if)# no shutdown</br>RTR1(config-if)# interface s0/0/0</br>RTR1(config-if)# description Connects to the ISP</br>RTR1(config-if)# ip address 10.14.15.254 255.255.255.0</br>RTR1(config-if)# no shutdown</br>RTR1(config-if)# interface s0/0/1</br>RTR1(config-if)# description Connects to the Head Office WAN</br>RTR1(config-if)# ip address 203.0.113.39 255.255.255.0</br>RTR1(config-if)# no shutdown</br>RTR1(config-if)# end</prompt>"|"10.27.14.148"
"Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?"|"destination IPv4 address"
"Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet?"|"TTL"
"Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?"|"version"
"Which term describes a field in the IPv4 packet header used to identify the next level protocol?"|"protocol"
"Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?"|"version"
"What property of ARP causes cached IP-to-MAC mappings to remain in memory longer?"|"Entries in an ARP table are time-stamped and are purged after the timeout expires."
"What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?"|"A static IP-to-MAC address entry can be entered manually into an ARP table."
"What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?"|"A static IP-to-MAC address entry can be entered manually into an ARP table."
"What property of ARP allows hosts on a LAN to send traffic to remote networks?"|"Local hosts learn the MAC address of the default gateway."
"Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>Floor(config)# interface gi0/1</br>Floor(config-if)# description Connects to the Registrar LAN</br>Floor(config-if)# ip address 192.168.235.234 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface gi0/0</br>Floor(config-if)# description Connects to the Manager LAN</br>Floor(config-if)# ip address 192.168.234.114 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/0</br>Floor(config-if)# description Connects to the ISP</br>Floor(config-if)# ip address 10.234.235.254 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/1</br>Floor(config-if)# description Connects to the Head Office WAN</br>Floor(config-if)# ip address 203.0.113.3 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# end</prompt>"|"192.168.235.234"
"What property of ARP forces all Ethernet NICs to process an ARP request?"|"The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame."
"What property of ARP causes a reply only to the source sending an ARP request?"|"The source MAC address appears in the header of the Ethernet frame."
"What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request?"|"The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame."
"What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?"|"The type field 0x806 appears in the header of the Ethernet frame."
"What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?"|"The type field 0x806 appears in the header of the Ethernet frame."
"Refer to the exhibit. A network administrator is connecting a new host to the Service LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>Main(config)# interface gi0/1</br>Main(config-if)# description Connects to the Service LAN</br>Main(config-if)# ip address 172.29.157.156 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface gi0/0</br>Main(config-if)# description Connects to the Engineering LAN</br>Main(config-if)# ip address 172.29.156.36 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface s0/0/0</br>Main(config-if)# description Connects to the ISP</br>Main(config-if)# ip address 10.156.157.254 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface s0/0/1</br>Main(config-if)# description Connects to the Head Office WAN</br>Main(config-if)# ip address 198.51.100.177 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# end</prompt>"|"172.29.157.156"
"Refer to the exhibit. A network administrator is connecting a new host to the Medical LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>BldgA(config)# interface gi0/1</br>BldgA(config-if)# description Connects to the Medical LAN</br>BldgA(config-if)# ip address 192.168.191.189 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface gi0/0</br>BldgA(config-if)# description Connects to the Client LAN</br>BldgA(config-if)# ip address 192.168.190.70 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface s0/0/0</br>BldgA(config-if)# description Connects to the ISP</br>BldgA(config-if)# ip address 10.190.191.254 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface s0/0/1</br>BldgA(config-if)# description Connects to the Head Office WAN</br>BldgA(config-if)# ip address 198.51.100.213 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# end</prompt>"|"192.168.191.189"
"Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>Floor(config)# interface gi0/1</br>Floor(config-if)# description Connects to the Registrar LAN</br>Floor(config-if)# ip address 192.168.225.223 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface gi0/0</br>Floor(config-if)# description Connects to the Manager LAN</br>Floor(config-if)# ip address 192.168.224.103 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/0</br>Floor(config-if)# description Connects to the ISP</br>Floor(config-if)# ip address 10.224.225.254 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/1</br>Floor(config-if)# description Connects to the Head Office WAN</br>Floor(config-if)# ip address 203.0.113.246 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# end</prompt>"|"192.168.225.223"
"Refer to the exhibit. A network administrator is connecting a new host to the Manager LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>Floor(config)# interface gi0/1</br>Floor(config-if)# description Connects to the Registrar LAN</br>Floor(config-if)# ip address 10.118.63.65 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface gi0/0</br>Floor(config-if)# description Connects to the Manager LAN</br>Floor(config-if)# ip address 10.118.62.196 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/0</br>Floor(config-if)# description Connects to the ISP</br>Floor(config-if)# ip address 10.62.63.254 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# interface s0/0/1</br>Floor(config-if)# description Connects to the Head Office WAN</br>Floor(config-if)# ip address 209.165.200.87 255.255.255.0</br>Floor(config-if)# no shutdown</br>Floor(config-if)# end</prompt>"|"10.118.62.196"
"Refer to the exhibit. A network administrator is connecting a new host to the Store LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>HQ(config)# interface gi0/1</br>HQ(config-if)# description Connects to the Branch LAN</br>HQ(config-if)# ip address 172.19.99.99 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface gi0/0</br>HQ(config-if)# description Connects to the Store LAN</br>HQ(config-if)# ip address 172.19.98.230 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface s0/0/0</br>HQ(config-if)# description Connects to the ISP</br>HQ(config-if)# ip address 10.98.99.254 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface s0/0/1</br>HQ(config-if)# description Connects to the Head Office WAN</br>HQ(config-if)# ip address 209.165.200.120 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# end</prompt>"|"172.19.98.230"
"Refer to the exhibit. A network administrator is connecting a new host to the Store LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>HQ(config)# interface gi0/1</br>HQ(config-if)# description Connects to the Branch LAN</br>HQ(config-if)# ip address 172.20.133.132 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface gi0/0</br>HQ(config-if)# description Connects to the Store LAN</br>HQ(config-if)# ip address 172.20.132.13 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface s0/0/0</br>HQ(config-if)# description Connects to the ISP</br>HQ(config-if)# ip address 10.132.133.254 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# interface s0/0/1</br>HQ(config-if)# description Connects to the Head Office WAN</br>HQ(config-if)# ip address 198.51.100.156 255.255.255.0</br>HQ(config-if)# no shutdown</br>HQ(config-if)# end</prompt>"|"172.20.132.13"
"Refer to the exhibit. A network administrator is connecting a new host to the Service LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>Main(config)# interface gi0/1</br>Main(config-if)# description Connects to the Service LAN</br>Main(config-if)# ip address 192.168.167.166 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface gi0/0</br>Main(config-if)# description Connects to the Engineering LAN</br>Main(config-if)# ip address 192.168.166.46 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface s0/0/0</br>Main(config-if)# description Connects to the ISP</br>Main(config-if)# ip address 10.166.167.254 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# interface s0/0/1</br>Main(config-if)# description Connects to the Head Office WAN</br>Main(config-if)# ip address 198.51.100.189 255.255.255.0</br>Main(config-if)# no shutdown</br>Main(config-if)# end</prompt>"|"192.168.167.166"
"Refer to the exhibit. A network administrator is connecting a new host to the Medical LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?<prompt>BldgA(config)# interface gi0/1</br>BldgA(config-if)# description Connects to the Medical LAN</br>BldgA(config-if)# ip address 192.168.201.200 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface gi0/0</br>BldgA(config-if)# description Connects to the Client LAN</br>BldgA(config-if)# ip address 192.168.200.80 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface s0/0/0</br>BldgA(config-if)# description Connects to the ISP</br>BldgA(config-if)# ip address 10.200.201.254 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# interface s0/0/1</br>BldgA(config-if)# description Connects to the Head Office WAN</br>BldgA(config-if)# ip address 203.0.113.222 255.255.255.0</br>BldgA(config-if)# no shutdown</br>BldgA(config-if)# end</prompt>"|"192.168.201.200"
"What is the prefix length notation for the subnet mask 255.255.255.224?"|"/27"
"How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?"|"62"
"Which subnet mask would be used if 5 host bits are available?"|"255.255.255.224"
"A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?"|"4"
"An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?"|"subnetwork 192.168.1.64 subnet mask 255.255.255.192"
"How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?"|"three"
"How many host addresses are available on the 192.168.10.128/26 network?"|"62"
"How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?"|"1022"
"What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)"|"10.0.0.0/8","172.16.0.0/12","192.168.0.0/16"
"A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?"|"255.255.255.128"
"What is the usable number of host IP addresses on a network that has a /26 mask?"|"62"
"Which address prefix range is reserved for IPv4 multicast?"|"224.0.0.0 – 239.255.255.255"
"A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?"|"This is a private IP address."
"Which three addresses are valid public addresses? (Choose three.)"|"198.133.219.17","128.107.12.117","64.104.78.227"
"A message is sent to all hosts on a remote network. Which type of message is it?"|"directed broadcast"
"A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)"|"192.168.1.64/27","192.168.1.96/28"
"Which address is a valid IPv6 link-local unicast address?"|"FE80::1:4545:6578:ABC1"
"Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?"|"3FFE:1044:0:0:AB::57"
"A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?"|"65536"
"Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?"|"2001:db8:0:f000::/52"
"What type of IPv6 address is FE80::1?"|"link-local"
"What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?"|"the MAC address of the IPv6 enabled interface"
"What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?"|"2001:DB8:BC15:A"
"An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?"|"all IPv6 enabled devices on the local link or network"
"Which IPv6 prefix is reserved for communication between devices on the same link?"|"FE80::/10"
"Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?"|"anycast"
"What are two types of IPv6 unicast addresses? (Choose two.)"|"loopback","link-local"
"Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?"|"SLAAC"
"Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?"|"ICMPv6"
"A technician uses the ping 127.0.0.1 command. What is the technician testing?"|"the TCP/IP stack on a network host"
"Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?"|"ICMP"
"Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?"|"time exceeded"
"A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?"|"when the value of the Hop Limit field reaches zero"
"What is the purpose of ICMP messages?"|"to provide feedback of IP packet transmissions"
"What source IP address does a router use by default when the traceroute command is issued?"|"the IP address of the outbound interface"
"A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. What does this code represent?"|"host unreachable"
"Which subnet would include the address 192.168.1.96 as a usable host address?"|"192.168.1.64/26"
"A host is transmitting a broadcast. Which host or hosts will receive it?"|"all hosts in the same subnet"
"A host is transmitting a unicast. Which host or hosts will receive it?"|"one specific host"
"A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 3. What does this code represent?"|"address unreachable"
"A host is transmitting a multicast. Which host or hosts will receive it?"|"a specially defined group of hosts"
"A host is transmitting a multicast. Which host or hosts will receive it?"|"a specially defined group of hosts"
"A host is transmitting a multicast. Which host or hosts will receive it?"|"a specially defined group of hosts"
"A host is transmitting a multicast. Which host or hosts will receive it?"|"a specially defined group of hosts"
"A host is transmitting a multicast. Which host or hosts will receive it?"|"a specially defined group of hosts"
"A host is transmitting a broadcast. Which host or hosts will receive it?"|"all hosts in the same subnet"
"A host is transmitting a broadcast. Which host or hosts will receive it?"|"all hosts in the same subnet"
"Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?"|"2001:db8::a0b0:8:1"
"Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?"|"fe80:9ea:0:2200::fe0:290"
"Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?"|"2002:42:10:c400::909"
"Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?"|"2001:db8::ab8:1:0:1000"
"Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?"|"2002:420:c4:1008:25:190::990"
"Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?"|"2001:db8::a0b0:8:1"
"Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?"|"fe80::220:b3f:f0e0:29"
"Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?"|"2001:db8::a0b0:8:1"
"Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?"|"2002:42:10:c400::909"
"Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?"|"fe80:9ea:0:2200::fe0:290"
"A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?"|"beyond scope of the source address"
"A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. What does this code represent?"|"host unreachable"
"A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 3. What does this code represent?"|"address unreachable"
"A user issues a ping 10.10.14.67 command and receives a response that includes a code of 0. What does this code represent?"|"network unreachable"
"A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4. What does this code represent?"|"port unreachable"
"A user issues a ping 198.133.219.8 command and receives a response that includes a code of 0. What does this code represent?"|"network unreachable"
"A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4. What does this code represent?"|"port unreachable"
"A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2. What does this code represent?"|"beyond scope of the source address"
"Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?"|"The client randomly selects a source port number."
"Which transport layer feature is used to guarantee session establishment?"|"TCP 3-way handshake"
"What is the complete range of TCP and UDP well-known ports?"|"0 to 1023"
"What is a socket?"|"the combination of a source IP address and port number or a destination IP address and port number"
"A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?"|"10 segment"
"Which factor determines TCP window size?"|"the amount of data the destination can process at one time"
"What does a client do when it has UDP datagrams to send?"|"It just sends the datagrams."
"Which three fields are used in a UDP segment header? (Choose three.)"|"Length","Source Port","Checksum"
"What are two roles of the transport layer in data communication on a network? (Choose two.)"|"identifying the proper application for each communication stream","tracking the individual communication between applications on the source and destination hosts"
"What information is used by TCP to reassemble and reorder received segments?"|"sequence numbers"
"What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?"|"destination and source port numbers"
"Which two characteristics are associated with UDP sessions? (Choose two.)"|"Destination devices receive traffic with minimal delay.","Received data is unacknowledged."
"Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?"|"ACK"
"Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?"|"DNS"
"What is a characteristic of UDP?"|"UDP reassembles the received datagrams in the order they were received."
"What kind of port must be requested from IANA in order to be used with a specific application?"|"registered port"
"Which three application layer protocols use TCP? (Choose three.)"|"SMTP","FTP","HTTP"
"Which three statements characterize UDP? (Choose three.)"|"UDP provides basic connectionless transport layer functions.","UDP relies on application layer protocols for error detection.","UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms."
"Which two fields are included in the TCP header but not in the UDP header? (Choose two.)"|"window","sequence number"
"Which field in the TCP header indicates the status of the three-way handshake process?"|"control bits"
"Why does HTTP use TCP as the transport layer protocol?"|"because HTTP requires reliable delivery"
"Which two types of applications are best suited for UDP? (Choose two.)"|"applications that handle reliability themselves","applications that can tolerate some data loss, but require little or no delay"
"How are port numbers used in the TCP/IP encapsulation process?"|"If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations."
"In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)"|"when a faster delivery mechanism is needed","when applications do not need to guarantee delivery of the data"
"What are three responsibilities of the transport layer? (Choose three.)"|"meeting the reliability requirements of applications, if any","multiplexing multiple communication streams from many users or applications on the same network","identifying the applications and services on the client and server that should handle transmitted data"
"Which three statements describe a DHCP Discover message? (Choose three.)"|"The destination IP address is 255.255.255.255.","The message comes from a client seeking an IP address.","All hosts receive the message, but only a DHCP server replies."
"Which two protocols may devices use in the application process that sends email? (Choose two.)"|"SMTP","DNS"
"What is true about the Server Message Block protocol?"|"Clients establish a long term connection to servers."
"What is the function of the HTTP GET message?"|"to request an HTML page from a web server"
"Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted?"|"application"
"Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?"|"client/server"
"What do the client/server and peer-to-peer network models have in common?"|"Both models support devices in server and client roles."
"In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?"|"peer-to-peer"
"What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?"|"Gnutella"
"What is a key characteristic of the peer-to-peer networking model?"|"resource sharing without a dedicated server"
"The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)"|"session","presentation","application"
"What is an example of network communication that uses the client-server model?"|"A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser."
"Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?"|"application"
"What is an advantage of SMB over FTP?"|"SMB clients can establish a long-term connection to the server."
"A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)"|"FTP","HTTP","SMTP"
"Which application layer protocol uses message types such as GET, PUT, and POST?"|"HTTP"
"What type of information is contained in a DNS MX record?"|"the domain name mapped to mail exchange servers"
"Which three protocols operate at the application layer of the TCP/IP model? (Choose three.)"|"FTP","POP3","DHCP"
"Which protocol is used by a client to communicate securely with a web server?"|"HTTPS"
"Which applications or services allow hosts to act as client and server at the same time?"|"P2P applications"
"What are two characteristics of peer-to-peer networks? (Choose two.)"|"decentralized resources","resource sharing without a dedicated server"
"Which scenario describes a function provided by the transport layer?"|"A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window."
"Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)"|"session layer","application layer","presentation layer"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?"|"3001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?"|"4501"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?"|"6001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?"|"6001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?"|"3001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?"|"3001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?"|"3001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?"|"3001"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?"|"4501"
"A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?"|"4501"
"A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?"|"69"
"A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet?"|"21"
"A client creates a packet to send to a server. The client is requesting SSH service. What number will be used as the destination port number in the sending packet?"|"22"
"A client creates a packet to send to a server. The client is requesting HTTP service. What number will be used as the destination port number in the sending packet?"|"80"
"A client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?"|"110"
"A client creates a packet to send to a server. The client is requesting telnet service. What number will be used as the destination port number in the sending packet?"|"23"
"A client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?"|"110"
"A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?"|"161"
"A client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet?"|"25"
"A client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet?"|"443"
"Which component is designed to protect against unauthorized communications to and from a computer?"|"firewall"
"Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?"|"RouterA(config)# login block-for 30 attempts 2 within 10"
"What is the purpose of the network security accounting function?"|"to keep track of the actions of a user"
"What type of attack may involve the use of tools such as nslookup and fping?"|"reconnaissance attack"
"Which example of malicious code would be classified as a Trojan horse?"|"malware that was written to look like a video game"
"What is the difference between a virus and a worm?"|"Worms self-replicate but viruses do not."
"Which attack involves a compromise of data that occurs between two end points?"|"man-in-the-middle attack"
"Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?"|"reconnaissance"
"What is the purpose of the network security authentication function?"|"to require users to prove who they are"
"Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?"|"stateful packet inspection"
"When applied to a router, which command would help mitigate brute-force password attacks against the router?"|"login block-for 60 attempts 5 within 60"
"What feature of SSH makes it more secure than Telnet for a device management connection?"|"login information and data encryption"
"What is the advantage of using SSH over Telnet?"|"SSH provides secure communications to access hosts."
"What is the role of an IPS?"|"detecting and blocking of attacks in real time"
"A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?"|"layered"
"What is an accurate description of redundancy?"|"designing a network to use multiple paths between switches to ensure there is no single point of failure"
"A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network services is the network administrator trying to accommodate? (Choose two.)"|"voice","video"
"What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the company is considering a network upgrade?"|"to document and analyze network traffic requirements on each network segment"
"Which method is used to send a ping message specifying the source address for the ping?"|"Issue the ping command without specifying a destination IP address."
"A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?"|"an increase in host-to-host ping response times"
"Which statement is true about Cisco IOS ping indicators?"|"‘U’ may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful."
"A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?"|"Nothing can be determined for sure at this point."
"A network technician issues the C:> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option?"|"It forces the trace to use IPv6."
"Why would a network administrator use the tracert utility?"|"to identify where a packet was lost or delayed on a network"
"A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?"|"The network administrator wants to verify Layer 2 connectivity."
"A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices?"|"show cdp neighbors detail"
"What information about a Cisco router can be verified using the show version command?"|"the value of the configuration register"
"Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH?"|"terminal monitor"
"Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?"|"terminal monitor"
"By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take?"|"Establish a theory of probable causes."
"Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?"|"nslookup"
"An employee complains that a Windows PC cannot connect to the Internet. A network technician issues the ipconfig command on the PC and is shown an IP address of 169.254.10.3. Which two conclusions can be drawn? (Choose two.)"|"The PC cannot contact a DHCP server.","The PC is configured to obtain an IP address automatically."
"Which network service automatically assigns IP addresses to devices on the network?"|"DHCP"
"Which command can an administrator execute to determine what interface a router will use to reach remote networks?"|"show ip route"
"When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)"|"Generate the asymmetric RSA keys.","Configure the correct IP domain name.","Create a valid local username and password database."
"What is considered the most effective way to mitigate a worm attack?"|"Download security updates from the operating system vendor and patch all vulnerable systems."
"Which statement describes the ping and tracert commands?"|"Tracert shows each hop, while ping shows a destination reply only."
"A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?"|"SSH"
"An administrator decides to use “WhatAreyouwaiting4” as the password on a newly installed router. Which statement applies to the password choice?"|"It is strong because it uses a passphrase."
"An administrator decides to use “pR3s!d7n&0” as the password on a newly installed router. Which statement applies to the password choice?"|"It is strong because it uses a minimum of 10 numbers, letters and special characters."
"An administrator decides to use “5$7*4#033!” as the password on a newly installed router. Which statement applies to the password choice?"|"It is strong because it contains 10 numbers and special characters."
"An administrator decides to use “pR3s!d7n&0” as the password on a newly installed router. Which statement applies to the password choice?"|"It is strong because it uses a minimum of 10 numbers, letters and special characters."
"An administrator decides to use “12345678!” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak because it uses a series of numbers or letters."
"An administrator decides to use “admin” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak because it is often the default password on new devices."
"An administrator decides to use “Feb121978” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak because it uses easily found personal information."
"An administrator decides to use “password” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak because it is a commonly used password."
"An administrator decides to use “RobErT” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak since it uses easily found personal information."
"An administrator decides to use “Elizabeth” as the password on a newly installed router. Which statement applies to the password choice?"|"It is weak because it uses easily found personal information."
"A network technician is troubleshooting an issue and needs to verify the IP addresses of all interfaces on a router. What is the best command to use to accomplish the task?"|"show ip interface brief"
"Students who are connected to the same switch are having slower than normal response times. The administrator suspects a duplex setting issue. What is the best command to use to accomplish the task?"|"show interfaces"
"A user wants to know the IP address of the PC. What is the best command to use to accomplish the task?"|"ipconfig"
"A student wants to save a router configuration to NVRAM. What is the best command to use to accomplish the task?"|"copy running-config startup-config"
"A support technician needs to know the IP address of the wireless interface on a MAC. What is the best command to use to accomplish the task?"|"ipconfig getifaddr en0"
"A network technician is troubleshooting an issue and needs to verify all of the IPv6 interface addresses on a router. What is the best command to use to accomplish the task?"|"show ipv6 interface"
"A teacher is having difficulties connecting his PC to the classroom network. He needs to verify that a default gateway is configured correctly. What is the best command to use to accomplish the task?"|"ipconfig"
"An administrator is troubleshooting connectivity issues and needs to determine the IP address of a website. What is the best command to use to accomplish the task?"|"nslookup"
"Which tasks can be accomplished by using the command history feature? (Choose two.)"|"Set the command history buffer size.","Recall previously entered commands."
"What is the first action in the boot sequence when a switch is powered on?"|"load a power-on self-test program"
"What must an administrator have in order to reset a lost password on a router?"|"physical access to the router"
"When configuring a switch for SSH access, what other command that is associated with the login local command is required to be entered on the switch?"|"username username secret secret"
"Which command displays information about the auto-MDIX setting for a specific interface?"|"show controllers"
"If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?"|"on the half-duplex end of the connection"
"Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?"|"boot system"
"What does a switch use to locate and load the IOS image?"|"BOOT environment variable"
"Which protocol adds security to remote connections?"|"SSH"
"What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?"|"It is a logical interface internal to the router."
"What is the minimum Ethernet frame size that will not be discarded by the receiver as a runt frame?"|"64 bytes"
"After which step of the switch bootup sequence is the boot loader executed?"|"after POST execution"
"Which impact does adding a Layer 2 switch have on a network?"|"an increase in the size of the broadcast domain"
"Which characteristic describes cut-through switching?"|"Frames are forwarded without any error checking."
"What is the significant difference between a hub and a Layer 2 LAN switch?"|"A hub extends a collision domain, and a switch divides collision domains."
"Which statement is correct about Ethernet switch frame forwarding decisions?"|"Frame forwarding decisions are based on MAC address and port mappings in the CAM table."
"How do switch buffers affect network performance?"|"They store frames received, thus preventing premature frame discarding when network congestion occurs."
"Which switch characteristic helps keep traffic local and alleviates network congestion?"|"high port density"
"Which switch component reduces the amount of packet handling time inside the switch?"|"ASIC"
"What information is added to the switch table from incoming frames?"|"source MAC address and incoming port number"
"Which switching method ensures that the incoming frame is error-free before forwarding?"|"store-and-forward"
"Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)"|"when connecting a Cisco switch to a non-Cisco switch","on links that should not be trunking"
"Which two characteristics describe the native VLAN? (Choose two.)"|"The native VLAN traffic will be untagged across the trunk link.","The native VLAN provides a common identifier to both ends of a trunk."
"A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?"|"Only devices in VLAN 20 see the frame."
"What happens to switch ports after the VLAN to which they are assigned is deleted?"|"The ports stop communicating with the attached devices."
"Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?"|"Port Fa0/11 will be returned to VLAN 1."
"Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?"|"show interfaces Fa0/1 switchport"
"Which four steps are needed to configure a voice VLAN on a switch port? (Choose four)."|"Assign the voice VLAN to the switch port.","Ensure that voice traffic is trusted and tagged with a CoS priority value.","Add a voice VLAN.","Configure the switch port in access mode."
"A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?"|"A switch with a port that is configured as a trunk is needed when connecting to the router."
"When routing a large number of VLANs, what are two disadvantages of using the router-on-a-stick inter-VLAN routing method rather than the multilayer switch inter-VLAN routing method? (Choose two.)"|"A dedicated router is required.","Multiple subinterfaces may impact the traffic flow speed."
"What is a characteristic of a routed port on a Layer 3 switch?"|"It is not assigned to a VLAN."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# mdix auto command?"|"It automatically adjusts the port to allow device connections to use either a straight-through or a crossover cable."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# ip address 172.18.33.88 255.255.255.0 command?"|"It applies an IPv4 address to the virtual interface."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw# configure terminal command?"|"It enters the global configuration mode."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw# configure terminal command?"|"It enters the global configuration mode."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# shutdown command?"|"It disables a virtual or physical switch interface."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# shutdown command?"|"It disables a virtual or physical switch interface."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# ipv6 address 2001:db8:a2b4:88::1/64 command?"|"It applies an IPv6 address to the virtual interface."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# exit command?"|"It returns to global configuration mode."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw> enable command?"|"It enters privileged mode."
"A technician is configuring a new Cisco 2960 switch. What is the effect of issuing the BranchSw(config-if)# duplex full command?"|"It allows data to flow in both directions at the same time on the interface."
"What type of VLAN should not carry voice and network management traffic?"|"data VLAN"
"What type of VLAN should not carry voice and network management traffic?"|"data VLAN"
"What type of VLAN is designed to reserve bandwidth to ensure IP Phone quality?"|"voice VLAN"
"What type of VLAN is initially the management VLAN?"|"default VLAN"
"What type of VLAN is designed to have a delay of less than 150 ms across the network?"|"voice VLAN"
"What type of VLAN is used to separate the network into groups of users or devices?"|"data VLAN"
"What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HHTP, and SNMP?"|"management VLAN"
"What type of VLAN is configured specifically for network traffic such as SSH, Telnet, HTTPS, HHTP, and SNMP?"|"management VLAN"
"What type of VLAN supports untagged traffic?"|"native VLAN"
"What type of VLAN supports untagged traffic?"|"native VLAN"
"Which solution would help a college alleviate network congestion due to collisions?"|"a high port density switch"
"Which two statements are correct with respect to SVI inter-VLAN routing? (Choose two.)"|"Switching packets is faster with SVI.","There is no need for a connection to a router."
"Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?"|"native"
"A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be displayed?"|"the VLAN assignment and membership for all switch ports"
"What additional information is contained in the 12-bit extended system ID of a BPDU?"|"VLAN ID"
"During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process?"|"All the switches send out BPDUs advertising themselves as the root bridge."
"Which STP port role is adopted by a switch port if there is no other port with a lower cost to the root bridge?"|"root port"
"Which two concepts relate to a switch port that is intended to have only end devices attached and intended never to be used to connect to another switch? (Choose two.)"|"edge port","PortFast"
"Which three components are combined to form a bridge ID?"|"extended system ID","bridge priority","MAC address"
"In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.)"|"forwarding","learning"
"If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?"|"lowest MAC address"
"When the show spanning-tree vlan 33 command is issued on a switch, three ports are shown in the forwarding state. In which two port roles could these interfaces function while in the forwarding state? (Choose two.)"|"designated","root"
"What is the function of STP in a scalable network?"|"It disables redundant paths to eliminate Layer 2 loops."
"What is a characteristic of spanning tree?"|"It is enabled by default on Cisco switches."
"Which spanning tree standard supports only one root bridge so that traffic from all VLANs flows over the same path?"|"802.1D"
"What is the purpose of the Spanning Tree Protocol (STP)?"|"prevents Layer 2 loops"
"What is the value used to determine which port on a non-root bridge will become a root port in a STP network?"|"the path cost"
"What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network? (Choose two.)"|"The MAC address table becomes unstable.","Broadcast frames are transmitted indefinitely."
"A small company network has six interconnected Layer 2 switches. Currently all switches are using the default bridge priority value. Which value can be used to configure the bridge priority of one of the switches to ensure that it becomes the root bridge in this design?"|"28672"
"Which statement is true regarding the use of PAgP to create EtherChannels?"|"It is Cisco proprietary."
"What are two requirements to be able to configure an EtherChannel between two switches? (Choose two.)"|"All the interfaces need to work at the same speed.","All the interfaces need to be working in the same duplex mode."
"Which two parameters must match on the ports of two switches to create a PAgP EtherChannel between the switches? (Choose two.)"|"speed","VLAN information"
"A network administrator is configuring an EtherChannel link between switches SW1 and SW2 by using the command SW1(config-if-range)# channel-group 1 mode auto . Which command must be used on SW2 to enable this EtherChannel?"|"SW2(config-if-range)# channel-group 1 mode desirable"
"Which technology is an open protocol standard that allows switches to automatically bundle physical ports into a single logical link?"|"LACP"
"What is a requirement to configure a trunking EtherChannel between two switches?"|"The allowed range of VLANs must be the same on both switches."
"What are two advantages of using LACP? (Choose two.)"|"It allows directly connected switches to negotiate an EtherChannel link.","It allows the use of multivendor devices."
"A switch is configured to run STP. What term describes a non-root port that is permitted to forward traffic on the network?"|"designated port"
"What are two advantages of EtherChannel? (Choose two.)"|"Spanning Tree Protocol views the physical links in an EtherChannel as one logical connection.","Configuring the EtherChannel interface provides consistency in the configuration of the physical links."
"A set of switches is being connected in a LAN topology. Which STP bridge priority value will make it least likely for the switch to be selected as the root?"|"61440"
"In which two PVST+ port states are MAC addresses learned? (Choose two.)"|"learning","forwarding"
"Which port role is assigned to the switch port that has the lowest cost to reach the root bridge?"|"root port"
"A switch is configured to run STP. What term describes the switch port closest, in terms of overall cost, to the root bridge"|"root port"
"A switch is configured to run STP. What term describes a field used to specify a VLAN ID?"|"extended system ID"
"A switch is configured to run STP. What term describes the reference point for all path calculations?"|"root bridge"
"A switch is configured to run STP. What term describes a field that has a default value of 32,768 and is the initial deciding factor when electing a root bridge?"|"bridge priority"
"Which statement describes an EtherChannel implementation?"|"A trunked port can be part of an EtherChannel bundle."
"Which statement describes a characteristic of EtherChannel?"|"It is made by combining multiple physical links that are seen as one link between two switches."
"Which two channel group modes would place an interface in a negotiating state using PAgP? (Choose two.)"|"desirable","auto"
"Which mode configuration setting would allow formation of an EtherChannel link between switches SW1 and SW2 without sending negotiation traffic?"|"SW1: on SW2: on"
"When EtherChannel is configured, which mode will force an interface into a port channel without exchanging aggregation protocol packets?"|"on"
"What are two load-balancing methods in the EtherChannel technology? (Choose two.)"|"source IP to destination IP","source MAC to destination MAC"
"Which protocol provides up to 16 instances of RSTP, combines many VLANs with the same physical and logical topology into a common RSTP instance, and provides support for PortFast, BPDU guard, BPDU filter, root guard, and loop guard?"|"MST"
"What is the outcome of a Layer 2 broadcast storm?"|"New traffic is discarded by the switch because it is unable to be processed."
"Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.)"|"redundant links between Layer 2 switches","removing single points of failure with multiple Layer 2 switches"
"A network administrator has configured an EtherChannel between two switches that are connected via four trunk links. If the physical interface for one of the trunk links changes to a down state, what happens to the EtherChannel?"|"The EtherChannel will remain functional."
"A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)"|"DHCPDISCOVER","DHCPREQUEST"
"An administrator issues the commands:<prompt>Router(config)# interface g0/1</br>Router(config-if)# ip address dhcp</br>What is the administrator trying to achieve?</prompt>"|"configuring the router to obtain IP parameters from a DHCPv4 server"
"When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast?"|"The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers."
"Which DHCP IPv4 message contains the following information? Destination address: 255.255.255.255 Client IPv4 address: 0.0.0.0 Default gateway address: 0.0.0.0 Subnet mask: 0.0.0.0"|"DHCPDISCOVER"
"Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.)"|"DHCP","67"
"Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?"|"DHCPREQUEST"
"Which command, when issued in the interface configuration mode of a router, enables the interface to acquire an IPv4 address automatically from an ISP, when that link to the ISP is enabled?"|"ip address dhcp"
"Which kind of message is sent by a DHCP client when its IP address lease has expired?"|"a DHCPREQUEST unicast message"
"A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?"|"DHCPACK"
"What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?"|"The computer receives an IP address that starts with 169.254."
"Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?"|"broadcast DHCPREQUEST"
"A small coffee shop is offering free Wi-Fi to customers. The network includes a wireless router and a DSL modem that is connected to the local phone company. What method is typically used to configure the connection to the phone company?"|"Set the WAN connection in the wireless router as a DHCP client."
"A company uses DHCP to manage IP address deployment for employee workstations. The IT department deploys multiple DHCP servers in the data center and uses DHCP relay agents to facilitate the DHCP requests from workstations. Which two UDP ports are used to forward DHCP traffic? (Choose two.)"|"67","68"
"A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?"|"Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF."
"What is an advantage of configuring a Cisco router as a relay agent?"|"It can provide relay services for multiple UDP services."
"Which statement is true about DHCP operation?"|"When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network."
"A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?"|"It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information."
"A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?"|"the link-local address of the router interface that is attached to the network"
"A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement describes a feature that is associated with HSRP?"|"HSRP uses active and standby routers."
"Which FHRP implementation is a Cisco-proprietary protocol that suppports IPv4 load sharing?"|"GLBP"
"The address pool of a DHCP server is configured with 10.92.71.0/25. The network administrator reserves 8 IP addresses for servers. How many IP addresses are left in the pool to be assigned to other hosts?"|"118"
"After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?"|"The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique."
"Which statement describes HSRP?"|"It is used within a group of routers for selecting an active device and a standby device to provide gateway services to a LAN."
"The address pool of a DHCP server is configured with 192.168.234.0/27. The network administrator reserves 22 IP addresses for IP phones. How many IP addresses are left in the pool to be assigned to other hosts?"|"8"
"A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?"|"FF-FF-FF-FF-FF-FF and 255.255.255.255"
"Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?"|"Router# show ip dhcp binding"
"What is the reason that an ISP commonly assigns a DHCP address to a wireless router in a SOHO environment?"|"easy IP address management"
"What information can be verified through the show ip dhcp binding command?"|"the IPv4 addresses that are assigned to hosts by the DHCP server"
"What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?"|"The Cisco router will exclude 15 IP addresses from being leased to DHCP clients."
"Which FHRP implementation is a Cisco-proprietary protocol that suppports IPv6 load balancing?"|"GLBP for IPv6"
"Which set of commands will configure a router as a DHCP server that will assign IPv4 addresses to the 192.168.100.0/23 LAN while reserving the first 10 and the last addresses for static assignment?"|"ip dhcp excluded-address 192.168.100.1 192.168.100.10 ip dhcp excluded-address 192.168.101.254 ip dhcp pool LAN-POOL-100 network 192.168.100.0 255.255.254.0 default-router 192.168.100.1"
"What is a result when the DHCP servers are not operational in a network?"|"Workstations are assigned with IP addresses in the 169.254.0.0/16 network."
"A company uses the method SLAAC to configure IPv6 addresses for the workstations of the employees. A network administrator configured the IPv6 address on the LAN interface of the router. The interface status is UP. However, the workstations on the LAN segment did not obtain the correct prefix and prefix length. What else should be configured on the router that is attached to the LAN segment for the workstations to obtain the information?"|"R1(config)# ipv6 unicast-routing"
"Which FHRP implementation is a nonproprietary protocol which relies on ICMP to provide IPv4 redundancy?"|"IRDP"
"Which Layer 2 attack will result in legitimate users not getting valid IP addresses?"|"DHCP starvation"
"What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?"|"Enable port security."
"Which three Cisco products focus on endpoint security solutions? (Choose three.)"|"Web Security Appliance","Email Security Appliance","NAC Appliance"
"True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant."|"true"
"Which authentication method stores usernames and passwords in the router and is ideal for small networks?"|"local AAA"
"What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?"|"Disable both protocols on all interfaces where they are not required."
"Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?"|"SSH"
"Which statement describes the behavior of a switch when the MAC address table is full?"|"It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN."
"What device is considered a supplicant during the 802.1X authentication process?"|"the client that is requesting authentication"
"Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?"|"VLAN double-tagging"
"A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?"|"It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body."
"Which two commands can be used to enable BPDU guard on a switch? (Choose two.)"|"S1(config)# spanning-tree portfast bpduguard default","S1(config-if)# spanning-tree bpduguard enable"
"As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?"|"sticky secure MAC addresses"
"Which type of management frame may regularly be broadcast by an AP?"|"beacon"
"What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)"|"receiving a broadcast beacon frame","transmitting a probe request"
"A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?"|"to avoid interference from nearby wireless devices"
"While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?"|"active"
"A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?"|"802.11ac"
"A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?"|"Change the default user-name and password of the wireless router."
"Which step is required before creating a new WLAN on a Cisco 3500 series WLC?"|"Create a new VLAN interface."
"A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?"|"The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia."
"A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?"|"It is used to encrypt the messages between the WLC and the RADIUS server."
"Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)"|"wireless network password","AP password","SSID"
"Which access control component, implementation, or protocol is based upon usernames and passwords?"|"authentication"
"Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?"|"wireless local-area network"
"Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)"|"DHCP Snooping","Port Security"
"What are three techniques for mitigating VLAN attacks? (Choose three.)"|"Enable trunking manually.","Disable DTP.","Set the native VLAN to an unused VLAN."
"A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?"|"RADIUS"
"A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?"|"Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band."
"The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?"|"accidental interference"
"What is the function provided by CAPWAP protocol in a corporate wireless network?"|"CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller."
"What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)"|"TACACS+","RADIUS"
"What is the result of a DHCP starvation attack?"|"Legitimate clients are unable to lease IP addresses."
"Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?"|"the native VLAN of the trunking port being the same as a user VLAN"
"Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?"|"accounting"
"An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?"|"shutdown"
"A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)"|"Ensure that the wireless NIC is enabled.","Ensure that the wireless SSID is chosen."
"What is an advantage of SSID cloaking?"|"Clients will have to manually identify the SSID to connect to the network."
"What is a wireless security mode that requires a RADIUS server to authenticate wireless users? personal"|"enterprise"
"A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?"|"Split the traffic between the 2.4 GHz and 5 GHz frequency bands."
"Which protocol can be used to monitor the network?"|"SNMP"
"A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?"|"NAT"
"Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?"|"QoS"
"Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?"|"802.1X"
"Which type of wireless network is suitable for national and global communications?"|"wireless wide-area network"
"Which feature on a switch makes it vulnerable to VLAN hopping attacks?"|"the automatic trunking port feature enabled for all ports by default"
"Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?"|"authorization"
"A network administrator enters the following commands on the switch SW1.<prompt>SW1(config)# interface range fa0/5 - 10</br>SW1(config-if)# ip dhcp snooping limit rate 6</br>What is the effect after these commands are entered?</prompt>"|"FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second."
"A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?"|"protect"
"A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?"|"Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands."
"Which access control component, implementation, or protocol controls what users can do on the network?"|"authorization"
"Which type of wireless network is suitable for providing wireless access to a city or district?"|"wireless metropolitan-area network"
"What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?"|"omnidirectional"
"What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)"|"802.11ac","802.11a"
"What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?"|"preventing rogue switches from being added to the network"
"Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?"|"accounting"
"Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?"|"wireless wide-area network"
"Which access control component, implementation, or protocol controls who is permitted to access a network?"|"authentication"
"What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)"|"802.11ac","802.11a"
"Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?"|"gateway of last resort"
"Which three advantages are provided by static routing? (Choose three.)"|"Static routing does not advertise over the network, thus providing better security.","Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.","The path a static route uses to send data is known."
"What are two functions of dynamic routing protocols? (Choose two.)"|"to maintain routing tables","to discover the network"
"What is an advantage of using dynamic routing protocols instead of static routing?"|"ability to actively search for new routes if the current path becomes unavailable"
"What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?"|"The static route is removed from the routing table."
"What is a characteristic of a static route that matches all packets?"|"It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route."
"When would it be more beneficial to use a dynamic routing protocol instead of static routing?"|"on a network where there is a lot of topology changes"
"Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?"|"O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"
"Which value in a routing table represents trustworthiness and is used by the router to determine which route to install into the routing table when there are multiple routes toward the same destination?"|"administrative distance"
"A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?"|"The interface fa0/0 has not been activated."
"What is a characteristic of a floating static route?"|"It is configured with a higher administrative distance than the original dynamic routing protocol has."
"What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?"|"::/0"
"Consider the following command:<prompt>ip route 192.168.10.0 255.255.255.0 10.10.10.2 5</br>What does the 5 at the end of the command signify?</prompt>"|"administrative distance"
"An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?"|"100"
"What characteristic completes the following statement? When an IPv6 static route is configured, the next-hop address can be ……"|"an IPv6 link-local address on the adjacent router."
"Gateway of last resort is not set.<prompt>172.19.115.0/26 is variously subnetted, 7 subnets, 3 masks</br>O 172.19.115.0/26 [110/10] via 172.19.39.1, 00:00:24, Serial0/0/0</br>O 172.19.115.64/26 [110/20] via 172.19.39.6, 00:00:56, Serial 0/0/1</br>O 172.19.115.128/26 [110/10] via 172.19.39.1, 00:00:24, Serial 0/0/0</br>C 172.19.115.192/27 is directly connected, GigabitEthernet0/0</br>L 172.19.115.193/27 is directly connected, GigabitEthernet0/0</br>C 172.19.115.224/27 is directly connected, GigabitEthernet0/1</br>L 172.19.115.225/27 is directly connected, GigabitEthernet0/1</br>172.19.39.0/24 is variably subnetted, 4 subnets, 2 masks</br>C 172.19.39.0/30 is directly connected, Serial0/0/0</br>L 172.19.39.2/32 is directly connected, Serial0/0/0</br>C 172.19.39.4/30 is directly connected, Serial0/0/1</br>L 172.19.39.5/32 is directly connected, Serial0/0/1</br>S 172.19.40.0/26 [1/0] via 172.19.39.1, 00:00:24, Serial0/0/0</br>R1#</br>Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.19.115.206?</prompt>"|"GigabitEthernet0/0"
"What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)"|"the interface ID exit interface","the IP address of the next-hop neighbor"
"What route would have the lowest administrative distance?"|"a directly connected network"
"A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem?"|"The interface fa0/0 has not been activated."
"A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?"|"ip route 172.16.32.0 255.255.224.0 S0/0/0 200"
"Consider the following command:<prompt>ip route 192.168.10.0 255.255.255.0 10.10.10.2 5</br>How would an administrator test this configuration?</prompt>"|"Manually shut down the router interface used as a primary route."
"What characteristic completes the following statement? When an IPv6 static route is configured, it is first necessary to configure ……"|"the “ipv6 unicast-routing” command."
"Gateway of last resort is not set.<prompt>172.18.109.0/26 is variously subnetted, 7 subnets, 3 masks</br>O 172.18.109.0/26 [110/10] via 172.18.32.1, 00:00:24, Serial0/0/0</br>O 172.18.109.64/26 [110/20] via 172.18.32.6, 00:00:56, Serial 0/0/1</br>O 172.18.109.128/26 [110/10] via 172.18.32.1, 00:00:24, Serial 0/0/0</br>C 172.18.109.192/27 is directly connected, GigabitEthernet0/0</br>L 172.18.109.193/27 is directly connected, GigabitEthernet0/0</br>C 172.18.109.224/27 is directly connected, GigabitEthernet0/1</br>L 172.18.109.225/27 is directly connected, GigabitEthernet0/1</br>172.18.32.0/24 is variably subnetted, 4 subnets, 2 masks</br>C 172.18.32.0/30 is directly connected, Serial0/0/0</br>L 172.18.32.2/32 is directly connected, Serial0/0/0</br>C 172.18.32.4/30 is directly connected, Serial0/0/1</br>L 172.18.32.5/32 is directly connected, Serial0/0/1</br>S 172.18.33.0/26 [1/0] via 172.18.32.1, 00:00:24, Serial0/0/0</br>R1#</br>Refer to the exhibit. Which interface will be the exit interface to forward a data packet that has the destination IP address 172.18.109.152?</prompt>"|"Serial0/0/0"
"What is a function of OSPF hello packets?"|"to discover neighbors and build adjacencies between them"
"Which OPSF packet contains the different types of link-state advertisements?"|"LSU"
"Which three statements describe features of the OSPF topology table? (Choose three.)"|"It is a link-state database that represents the network topology.","When converged, all routers in an area have identical topology tables.","The table can be viewed via the show ip ospf database command."
"What does an OSPF area contain?"|"routers that have the same link-state information in their LSDBs"
"What is used to facilitate hierarchical routing in OSPF?"|"the use of multiple areas"
"Which OSPF data structure is identical on all OSPF routers that share the same area?"|"link-state database"
"Which step does an OSPF-enabled router take immediately after establishing an adjacency with another router?"|"exchanges link-state advertisements"
"A network engineer has manually configured the hello interval to 15 seconds on an interface of a router that is running OSPFv2. By default, how will the dead interval on the interface be affected?"|"The dead interval will now be 60 seconds."
"To establish a neighbor adjacency two OSPF routers will exchange hello packets. Which two values in the hello packets must match on both routers? (Choose two.)"|"dead interval","hello interval"
"What is the default router priority value for all Cisco OSPF routers?"|"1"
"Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?"|"database description"
"In an OSPF network when are DR and BDR elections required?"|"when the routers are interconnected over a common Ethernet network"
"When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?"|"every 30 minutes"
"What will an OSPF router prefer to use first as a router ID?"|"any IP address that is configured using the router-id command"
"What are the two purposes of an OSPF router ID? (Choose two.)"|"to uniquely identify the router within the OSPF domain","to facilitate router participation in the election of the designated router"
"A network technician issues the following commands when configuring a router:<prompt>R1(config)# router ospf 11</br>R1(config-router)# network 10.10.10.0 0.0.0.255 area 0</br>What does the number 11 represent?</prompt>"|"the OSPF process ID on R1"
"An OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?"|"router(config-router)# network 172.16.1.0 255.255.255.0 area 0"
"By default, what is the OSPF cost for any link with a bandwidth of 100 Mb/s or greater?"|"1"
"What command would be used to determine if a routing protocol-initiated relationship had been made with an adjacent router?"|"show ip ospf neighbor"
"Which command is used to verify that OSPF is enabled and also provides a list of the networks that are being advertised by the network?"|"show ip protocols"
"What is the recommended Cisco best practice for configuring an OSPF-enabled router so that each router can be easily identified when troubleshooting routing issues?"|"Configure a value using the router-id command."
"Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?"|"executing the SPF algorithm"
"An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.223.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?"|"0.0.1.255"
"What is the format of the router ID on an OSPF-enabled router?"|"a 32-bit number formatted like an IPv4 address"
"After modifying the router ID on an OSPF router, what is the preferred method to make the new router ID effective?"|"HQ# clear ip ospf process"
"In an OSPFv2 configuration, what is the effect of entering the command network 192.168.1.1 0.0.0.0 area 0?"|"It tells the router which interface to turn on for the OSPF routing process."
"What is the reason for a network engineer to alter the default reference bandwidth parameter when configuring OSPF?"|"to more accurately reflect the cost of links greater than 100 Mb/s"
"What is a benefit of multiarea OSPF routing?"|"Topology changes in one area do not cause SPF recalculations in other areas."
"What indicates to a link-state router that a neighbor is unreachable?"|"if the router no longer receives hello packets"
"Which three OSPF states are involved when two routers are forming an adjacency? (Choose three.)"|"Init","Two-way","Down"
"An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 64.102.0.0 255.255.255.128. What wildcard mask would the administrator use in the OSPF network statement?"|"0.0.0.127"
"Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?"|"show ip ospf interface serial 0/0/0"
"Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?"|"building the topology table"
"The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?"|"DDoS"
"What causes a buffer overflow?"|"attempting to write more data to a memory location than that location can hold"
"Which objective of secure communications is achieved by encrypting data?"|"confidentiality"
"What type of malware has the primary objective of spreading across the network?"|"worm"
"What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?"|"financial gain"
"Which type of hacker is motivated to protest against political and social issues?"|"hacktivist"
"What is a ping sweep?"|"a network scanning technique that indicates the live hosts in a range of IP addresses."
"In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?"|"DoS"
"Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?"|"integrity"
"If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?"|"a private key"
"Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)"|"destination UDP port number","ICMP message type"
"What type of ACL offers greater flexibility and control over network access?"|"extended"
"What is the quickest way to remove a single ACE from a named ACL?"|"Use the no keyword and the sequence number of the ACE to be removed."
"A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)"|"Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0","Router1(config)# access-list 10 permit host 192.168.15.23"
"A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)"|"Router(config)# access-list 95 permit any","Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255"
"Consider the following access list.<prompt>access-list 100 permit ip host 192.168.10.1 any</br>access-list 100 deny icmp 192.168.10.0 0.0.0.255 any echo</br>access-list 100 permit ip any any</br>Which two actions are taken if the access list is placed inbound on a router Gigabit Ethernet port that has the IP address 192.168.10.254 assigned? (Choose two.)</prompt>"|"Devices on the 192.168.10.0/24 network can sucessfully ping devices on the 192.168.11.0 network.","A Telnet or SSH session is allowed from any device on the 192.168.10.0 into the router with this access list assigned."
"In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?"|"SYN flood attack"
"Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?"|"DHCP"
"Which statement describes a characteristic of standard IPv4 ACLs?"|"They filter traffic based on source IP addresses only."
"What is considered a best practice when configuring ACLs on vty lines?"|"Place identical restrictions on all vty lines."
"Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?"|"access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23"
"What is the term used to describe a mechanism that takes advantage of a vulnerability?"|"exploit"
"A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command?"|"to identify any IP address"
"Which statement accurately characterizes the evolution of threats to network security?"|"Internal threats can cause even greater damage than external threats."
"A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?"|"social engineering"
"In what way are zombies used in security attacks?"|"They are infected machines that carry out a DDoS attack."
"Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?"|"man-in-the-middle attack"
"Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)"|"host","any"
"Which statement describes a difference between the operation of inbound and outbound ACLs?"|"Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed."
"What effect would the Router1(config-ext-nacl)# permit tcp 172.16.4.0 0.0.0.255 any eq www command have when implemented inbound on the f0/0 interface?"|"Traffic originating from 172.16.4.0/24 is permitted to all TCP port 80 destinations."
"Which ACE will permit a packet that originates from any network and is destined for a web server at 192.168.1.1?"|"access-list 101 permit tcp any host 192.168.1.1 eq 80"
"A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?"|"to secure administrative access to the router"
"What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data?"|"symmetric encryption algorithm"
"A technician is tasked with using ACLs to secure a router. When would the technician use the ‘ip access-group 101 in’ configuration option or command?"|"to apply an extended ACL to an interface"
"In which type of attack is falsified information used to redirect users to malicious Internet sites?"|"DNS cache poisoning"
"What is a feature of an IPS?"|"It can stop malicious packets."
"What is the term used to describe a potential danger to a company’s assets, data, or network functionality?"|"threat"
"What does the CLI prompt change to after entering the command ip access-list standard aaa from global configuration mode?"|"Router(config-std-nacl)#"
"A technician is tasked with using ACLs to secure a router. When would the technician use the 40 deny host 192.168.23.8 configuration option or command?"|"to create an entry in a numbered ACL"
"Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)"|"NAT provides a solution to slow down the IPv4 address depletion.","NAT introduces problems for some applications that require end-to-end connectivity."
"A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?"|"Router# show ip nat translations"
"What are two tasks to perform when configuring static NAT? (Choose two.)"|"Create a mapping between the inside local and outside local addresses.","Identify the participating interfaces as inside or outside interfaces."
"What is a disadvantage of NAT?"|"There is no end-to-end addressing."
"What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?"|"It allows many inside hosts to share one or a few inside global addresses."
"Which situation describes data transmissions over a WAN connection?"|"An employee shares a database file with a co-worker who is located in a branch office on the other side of the city."
"Which two technologies are categorized as private WAN infrastructures? (Choose two.)"|"Frame Relay","MetroE"
"Which network scenario will require the use of a WAN?"|"Employees need to connect to the corporate email server through a VPN while traveling."
"What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)"|"SHA","MD5"
"What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)"|"SHA","AES"
"Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?"|"clientless SSL"
"Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?"|"integrity"
"Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)"|"clientless SSL VPN","client-based IPsec VPN"
"Which is a requirement of a site-to-site VPN?"|"It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic."
"What is the function of the Diffie-Hellman algorithm within the IPsec framework?"|"allows peers to exchange shared keys"
"What does NAT overloading use to track multiple internal hosts that use one inside global address?"|"port numbers"
"Which two WAN infrastructure services are examples of private connections? (Choose two.)"|"Frame Relay","T1/E1"
"Which two statements about the relationship between LANs and WANs are true? (Choose two.)"|"WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.","WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices."
"Which statement describes an important characteristic of a site-to-site VPN?"|"It must be statically set up."
"How is “tunneling” accomplished in a VPN?"|"New headers from one or more VPN protocols encapsulate the original packets."
"Which statement describes a VPN?"|"VPNs use virtual connections to create a private network through a public network."
"What type of address is 64.100.190.189?"|"public"
"Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?"|"IPsec virtual tunnel interface"
"In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?"|"outside global"
"Which circumstance would result in an enterprise deciding to implement a corporate WAN?"|"when its employees become distributed across many branch locations"
"What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?"|"guarantees message integrity"
"What algorithm is used with IPsec to provide data confidentiality?"|"AES"
"Which two technologies provide enterprise-managed VPN solutions? (Choose two.)"|"remote access VPN","site-to-site VPN"
"What type of address is 10.100.126.126?"|"private"
"Which type of VPN connects using the Transport Layer Security (TLS) feature?"|"SSL VPN"
"What is the term used to indicate a variation of delay?"|"jitter","software as a service (SaaS)"
"A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?"|"latency","There are significant data exchanges between virtual servers."
"What role do network devices play in the IntServ QoS model?"|"Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.","control plane"
"Which device would be classified as a trusted endpoint?"|"IP phone","OpenFlow"
"What is the benefit of deploying Layer 3 QoS marking across an enterprise network?"|"Layer 3 marking can carry the QoS information end-to-end.","Type 1"
"What is the function of a QoS trust boundary?"|"A trust boundary identifies which devices trust the marking on packets that enter a network.","installed directly on a server"
"What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.)"|"Drop lower-priority packets.","Increase link capacity.","Layer 2","Layer 3"
"What configuration scenario would offer the most protection to SNMP get and set messages?"|"SNMPv3 configured with the auth security level","the routing table"
"The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?"|"synchronizes the system clock with the time source with IP address 10.1.1.1","forwarding traffic flows"
"As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?"|"grouping multiple physical ports to increase bandwidth between two switches","separation of application from hardware"
"What is a definition of a two-tier LAN network design?"|"distribution and core layers collapsed into one tier, and the access layer on a separate tier","a private cloud"
"What are two reasons to create a network baseline? (Choose two.)"|"to identify future abnormal network behavior","to determine if the network can deliver the required policies","provides a “pay-as-you-go” model, allowing organizations to treat computing and storage expenses as a utility","enables rapid responses to increasing data volume requirements"
"A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?"|"The computer has an invalid default gateway address.","type 2"
"In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?"|"Narrow the scope.","The company only needs to pay for the amount of processing and storage capacity that it uses.","The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.","The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed."
"A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice?"|"LLQ","support of live migration"
"What are two characteristics of voice traffic? (Choose two.)"|"Voice traffic latency should not exceed 150 ms.","Dropped voice packets are not retransmitted.","Cloud computing"
"Which type of network traffic cannot be managed using congestion avoidance tools?"|"UDP","verification and corrective action"
"When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)"|"delay","jitter","It is used to authenticate the requesting source."
"An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.)"|"name of the configuration file that is stored on the TFTP server","TFTP server IP address","Puppet","Chef"
"What are three functions provided by the syslog service? (Choose three.)"|"to select the type of logging information that is captured","to gather logging information for monitoring and troubleshooting","to specify the destinations of captured messages","Manifest"
"What is the function of the MIB element as part of a network management system?"|"to store data about a device","Pillar"
"What network design would contain the scope of disruptions on a network should a failure occur?"|"the deployment of distribution layer switches in pairs and the division of access layer switch connections between them","It can be used with no restrictions."
"Which action should be taken when planning for redundancy on a hierarchical network design?"|"add alternate physical paths for data to traverse the network","It is a data format and superset of JSON."
"What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)"|"increased flexibility","reduced costs","read"
"What is a basic function of the Cisco Borderless Architecture access layer?"|"provides access to the user","SDN"
"Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?"|"ability to build a routing table","to manage virtual machines","to allocate physical system resources to virtual machines"
"When is the most appropriate time to measure network operations to establish a network performance baseline?"|"at the same time each day across a set period of average working days, so that typical traffic patterns can be established","Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware."
"What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)?"|"voice","It uses indentations."
"A network manager wants to add a time to log messages so that there is record of when the message was generated. What command should the administrator use on a Cisco router?"|"service timestamps log datetime","REST"
"What are two characteristics of the best-effort QoS model? (Choose two.)"|"It does not provide a delivery guarantee for packets.","It treats all network packets in the same way.","It is an architecture style for designing web service applications."
"Why is QoS an important issue in a converged network that combines voice, video, and data communications?"|"Voice and video communications are more sensitive to latency.","XML does not use predefined tags whereas HTML does use predefined tags."
"A network administrator configures a router with the command sequence:<prompt>R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin</br>R1(config)# boot system rom</br>What is the effect of the command sequence?</prompt>"|"The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.","virtualization"
"Which statement describes SNMP operation?"|"A set request is used by the NMS to change configuration variables in the agent device.","infrastructure as a service (IaaS)"
"What are the three layers of the switch hierarchical design model? (Choose three.)"|"distribution","access","core","the Application Policy Infrastructure Controller"
"A network designer is considering whether to implement a switch block on the company network. What is the primary advantage of deploying a switch block?"|"The failure of a switch block will not impact all end users.","separation of application from hardware"
"Which troubleshooting tool would a network administrator use to check the Layer 2 header of frames that are leaving a particular host?"|"protocol analyzer","a vacation service site interacting with hotel databases to display information from all the hotels on its web site"
"What type of traffic is described as not resilient to loss?"|"video","dedicated servers"
"A network manager wants lists the contents of flash. What command should the administrator use on a Cisco router?"|"dir"