Term
What type of connection should a straight-through cable be used?
A. switch to switch
B. switch to hub
C. switch to router
D. hub to hub
E. router to hub |
|
Definition
|
|
Term
Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?
A. crossover
B. straight-through
C. rolled
D. shielded twisted-pair |
|
Definition
|
|
Term
What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI |
|
Definition
|
|
Term
In an Ethernet network, under what two secnarios can devices transmit? (chose two)
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending.
D. when the medium is idle
E. when the server grands access |
|
Definition
C. when they detect no other devices are sending.
D. when the medium is idle. |
|
|
Term
Which two benefits are provided by using a hierachical addressing network addressing scheme? (Chose two)
A. reduces routing table entries
B. auto-negotiation of media rates
C. efficient utilization of MAC addresses
D. dedicated communications between devices
E. ease of management and troubleshooting |
|
Definition
A. reduces routing table entries
E. ease of managment and troubleshooting |
|
|
Term
When a host transmits data across a network to another host, which process does the data go through?
A. standardization
B. conversion
C. encapsulation
D. synchronization |
|
Definition
|
|
Term
Which two Ethernet fiber-optic modes support distances of grater than 559 meters?
A. 1000BASE-CX
B. 100BASE-FX
C. 1000BASE-LX
D. 1000BASE-SX
E. 1000BASE-ZX |
|
Definition
A. 1000BASE-CX
E. 1000BASE-ZX |
|
|
Term
[image]
What type of connection would be supported by the cable diagram shown?
A. PC to router
B. PC to switch
C. server to router
D. router to router |
|
Definition
|
|
Term
[image]
What type of connection would be suppoorted by the cable diagram shown?
A. PC to router
B. PC to switch
C. server to switch
D. switch to router |
|
Definition
|
|
Term
What two topologies are using the correct type of twisted-pair cables?
A.[image]
B. [image]
C. [image]
D. [image]
E. [image] |
|
Definition
|
|
Term
What are some of the advantages of using a router to segment the network? (choose two)
A. Filtering can occur based on layer 3 information
B. Broadcasts are eliminated
C. Routers enerally cost less than switches
D. Broadcasts are not forwarded across the router
E. Adding a router to the network decreases latency |
|
Definition
A. Filtering can occur based on Layer 3 information
D. Broadcasts are not forwarded across the router |
|
|
Term
[image]
Which of the following statements describe the network showin in the graphic? (chose two)
A. There are two broadcast domains in the network
B. There are four broadcast domains in the network
C. There are six broadcast domains in the network
D. There are four collision domains in the network
E. There are five collision domains in the network
F. There are seven collision domains in the network |
|
Definition
A. There are two broadcast domains in the network
F. There are seven collision domains in the network |
|
|
Term
[image]
The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (choose three)
A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports
B. Ensure that cables A and B are straight-through cables
C. Ensure cable A is blugged into a trunk port
D. Ensure the switch has power
E. Reboot all of the devices
F. Reseat all the cables |
|
Definition
B. Ensure that cables A and B are straight-through cables
D. Ensure switch has power
F. Reseat all cables |
|
|
Term
For what two purposes does the Ethernet protocol use physical addresses?
A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first
E. to allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unkown |
|
Definition
A. to uniquely identify devices at Layer 2
E. to allow communication between different devices on the same network. |
|
|
Term
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?
A. This is a 10Mb/s switch port
B. This is a 100Mbs switch port
C. This is an Ethernet port operating at half duplex
D. This is an Ethernet port operating at full duplex
E. This is a port on a network interface card in a PC |
|
Definition
C. This is an Ethernet port operating at half duplex |
|
|
Term
[image]
A network administrator attempts to ping Host2 from Host 1 and receives the result that shows above. What is a possible problem?
A. the link between Host1 and Switch 1 is down
B. TCP/IP is not functioning on Host1
C. The link between Router1 and Router2 is down
D. The default gateway on Host1 is incorrect
E. Interface fa0/0 on ROuter 1 is shutdown
F. The link between Switch1 and Router1 is down |
|
Definition
C. The link between Router 1 and Router2 is down |
|
|
Term
[image]
Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerened about possible problems from voltage potential difference between the two buildings. Which media type should be used for the connection?
A. UTP cable
B. STP cable
C. Coaxial cable
D. Fiber optic cable |
|
Definition
|
|
Term
Whic command can be used from a PC to verify the connectivity between host that connect through path?
A. tracert address
B. ping address
C. arp address
D. traceroute address |
|
Definition
|
|
Term
[image]
A network engineer is troubleshooting an internet connectivity problem on the computer. What's causing the problem?
A. wrong DNS server
B. wrong default gateway
C. incorrect IP address
D. incorrect subnet mask |
|
Definition
|
|
Term
[image]
Host A has tested connectivity to a remote network. What is the default gateway for Host A?
A. 172.16.182.1
B. 192.168.1.1
C. 10.16.176.1
D. 192.168.1.6 |
|
Definition
|
|
Term
[image]How many broadcast domains are shown in the graphic assuming only the default VLAN is configured on the switches?
A. one
B. two
C. six
D. twelve |
|
Definition
|
|
Term
[image]
Both switches are using a default configuration. Which two destination addresses will host 4 use to send data to host 1?
A. the ip address of host 1
B. the ip address of host 4
C. the MAC address of host 1
D. the MAC address of host 4
E. the MAC address of the Fa0/0 interface on R1
F. the MAC address of the Fa0/1 interface on R1 |
|
Definition
A. the IP address of host 1
F. the MAC address of the fa0/1 interface on R1 |
|
|
Term
What are two characteristics of Telnet?
A. It sends data in clear text format
B. It is no longer supported on Cisco network devices
C. It is more secure than SSH
D. It requires an enterprise license in order to be implemented
E. It requires that the destination device be configured to support Telnet connections |
|
Definition
A. It sends data in clear text format
E. It requires that the destination device be configured to support Telnet connections |
|
|
Term
Which of the following correctly describe steps in the OSI data encapsulation process?
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link. |
|
Definition
A. the transport layer divides a data stream into segments and may add reliability and flow control information
D. Packets are created when the network layer adds Layer 3 addresses and control infomration to a segment |
|
|
Term
Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?
A. physical
B. data link
C. network
D. transport |
|
Definition
|
|
Term
Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?
A. data link
B. network
C. transport
D. presentation
E. physical |
|
Definition
|
|
Term
A network admin wants to know every hop the packets tke when he accesses cisco.com. Which command is the most appropriate to use?
A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com |
|
Definition
|
|
Term
Where does routing occur within the DoD TCP/IP reference model?
A. application
B. internet
C. network
D. transport |
|
Definition
|
|
Term
Which network protocol does DNS use?
A. FTP
B. TFTP
C. TCP
D. UDP
E. SCP |
|
Definition
|
|
Term
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?
A. RARP request
B. Show Network Address request
C. Proxy ARP request
D. ARP request
E. Show Hardware Address request |
|
Definition
|
|
Term
An administrator attempts traceroute but receives "Destination Unreadable" message. Which protocol is responsible for that message?
A. RARP
B. RUDP
C. ICMP
D. SNMP |
|
Definition
|
|
Term
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
A. transport
B. network
C. presentation
D. session
E. application |
|
Definition
|
|
Term
Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. TO fix this issue, at which layer should the troubleshooting process begin?
A. presentation
B. session
C. transport
D. network
E. physical |
|
Definition
|
|
Term
Which protocols are found in the network layer of the OSI reference model and are responsible for path determination and traffic switching?
A. LAN
B. routing
C. WAN
D. network |
|
Definition
|
|
Term
[image]
An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?
A. data link layer
B. application layer
C. access layer
D. session layer
E. network layer |
|
Definition
|
|
Term
[image]
Afeter hostA pings HostB, which entry will be in the ARP cache of HostA to support this transmission?
A. [image]
B. [image]
C. [image]
D. [image]
E. [image]
F. [image] |
|
Definition
|
|
Term
An inbound ACL has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? (choose three)
A. FTP
B. Telnet
C. SMTP
D. DNS
E. HTTP
F. POP3 |
|
Definition
|
|
Term
Which of the following are types of flow control? (Choose three)
A. buffering
B. cut-through
C. windowing
D. congestion avoidance
E. load balancing |
|
Definition
A. buffering
C. windowing
D. congestion avoidance |
|
|
Term
Which destination address will be used by HostA to send data to HostC? (Choose two)
[image]
A. the IP address of Switch 1
B. the MAC address of Switch 1
C. the IP address of Host C
D. the MAC address of Host C
E. the IP address of the router’s E0 interface
F. the MAC address of the router’s E0 interface |
|
Definition
|
|
Term
Host1 is trying to communicate with Host2. The e0 interface on RouterC is down. Which of the following are true? (choose two)[image]
A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.
C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.
D. Router C will send a Destination Unreachable message type.
E. Router C will send a Router Selection message type.
F. Router C will send a Source Quench message type. |
|
Definition
A. Router C will use ICMP to inform Host1 that Host2 cannot be reached.
D. RouterC will send a destination unreachable message type. |
|
|
Term
[image]
Which destination addresses will HostA use to send data to HostB? (choose 2)
A. the IP address of Switch1
B. the IP address of Router1 Fa0/0
C. the IP address of HostB
D. the MAC address of Switch1
E. the MAC address of Router1 Fa0/0
F. the MAC address of HostB |
|
Definition
C. the IP Address of HostB
E. The MAC address of Router1 Fa0/0 |
|
|
Term
A network administrator issues the ping 192.168.2.5 command and sucessfully tests connectivity to a host that has been newly connected to the network.Which protocols wer used during the test? (choose 2)
A. ARP
B. CDP
C. DHCP
D. DNS
E. ICMP |
|
Definition
|
|
Term
[image]
Host A pings Host B. What source MAC address and source IP address are contained in the frame as the fram leaves R2 destined for hostB?
A. abcd.abcd.a001
B. abcd.abcd.b002
C. abcd.abcd.c003
D. 10.2.0.15
E. 10.0.64.1
F. 10.0.128.15 |
|
Definition
|
|
Term
[image]
SW1 and SW2 have default configuration. What will happen if host1 sends a broadcast?
A. Hosts 2, 3, and 4 will receive the broadcast.
B. Hosts 1, 2, 3, and 4 will receive the broadcast.
C. Fa0/0 interface of R1 will receive the broadcast.
D. Hosts 1, 2 and the Fa0/0 interface of R1 will receive the broadcast.
E. Hosts 1, 2, 3, 4 and interface Fa0/0 of R1 will receive the broadcast.
F. Hosts 2, 3, 4, and interfaces Fa0/0 and Fa0/1 of R1 will receive the broadcast. |
|
Definition
C. Fa0/0 interface on R1 will receive the broadcast. |
|
|
Term
As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?
A. The data is moving from 10BASE-TX to 100BASE-TX.
B. The WAN encapsulation type has changed.
C. The data format has changed from analog to digital.
D. The source and destination hosts are in the same subnet.
E. The source and destination MAC addresses have changed. |
|
Definition
B. The WAN encapsulation type has changed
E. The source and destination MAC addresses have changed |
|
|
Term
[image]
In the communication between host1 and host3 over the point-to-point WAN, which protocol or technology is represented by dashed line A?
A. IP
B. T1
C. PPP
D. IEEE 802.3 |
|
Definition
|
|
Term
[image]
The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a fram leaving host A. Whatc can be concluded from this Information?
A. The MAC address of host A is FFFF.FFFF.FFFF.
B. The router will forward the packet in this frame to the Internet.
C. The switch will only forward this frame to the attached router interface.
D. All devices in this LAN except host A will pass the packet to Layer 3. |
|
Definition
D. All devices in this LAN except host A will pass the packet to layer 3. |
|
|
Term
Which protocl should be used to establish a secure terminal connection to a remote network device?
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2 |
|
Definition
|
|
Term
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?
A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed. |
|
Definition
E. the PC has the TCP/IP protocl stack correctly installed |
|
|
Term
What is the purpose using the Traceroute command?
A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination. |
|
Definition
D. to see the path a packet will take when traveling to a specified destination. |
|
|
Term
Which statement is correct regarding the operation of DHCP?
A. A DHCP client uses a ping to detect address conflicts.
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted. |
|
Definition
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator |
|
|
Term
Acknowledgemnt, Sequenting, and flow control are characteristics of which OSI layer?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7 |
|
Definition
|
|
Term
A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
A. application
B. presentation
C. session
D. transport
E. internet
F. data link |
|
Definition
|
|
Term
A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as partr of the TCP/IP transfer?
[image]
A. Send ACK 1-3
B. Send ACK 3
C. Send ACK 4
D. Send ACK 4-6
E. Send ACK 6
F. Send ACK 7 |
|
Definition
|
|
Term
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
A. session
B. network
C. physical
D. data link
E. transport |
|
Definition
|
|
Term
Which of the following protocls uses both TCP and UDP ports?
A. SMTP
B. Telnet
C. FTP
D. DNS |
|
Definition
|
|
Term
DNS servers provide what service?
A. They run a spell check on host names to ensure accurate routing
B. They convert domain names into IP address
C. Given an IP address, they determine the name of the host that is sought
D. They map individual hosts to their specific IP addresses |
|
Definition
B. they convert domain names into IP addresses |
|
|
Term
Which of the following are associated with the application layer of the OSI model? (choose two)
A. ping
B. Telnet
C. FTP
D. TCP
E. IP |
|
Definition
|
|
Term
[image]
Host A is communicating with the server. What will be the destination MAC address of the frames sent by HostA to the server?
A. the MAC address of router interface e0
B. the MAC address of router interface e1
C. the MAC address of the server network interface
D. the MAC address of the network interface of Host A |
|
Definition
A. the MAC address of router Int e0 |
|
|
Term
How does a DHCP server dynamically assign IP address to host?
A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
B. Addresses are assigned for a fixed period of time. At the end of period, a new quest for an address must be made, and another address is then assigned.
C. Addresses are leased to host. A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.
D. Addresses are permanently assigned so that the host uses the same address at all times. |
|
Definition
C. Addresses are leased to host. A host will usually keep the same address by periodically contacting the DGCP to renew the lease. |
|
|
Term
A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change store?
A. NVRAM
B. RAM
C. FLASH
D. ROM
E. PCMCIA |
|
Definition
|
|
Term
[image]
If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt?
A. Setup is additive and any changes will be added to the config script.
B. Setup effectively starts the configuration over as if the router was booted for the first time.
C. Setup will not run if an enable secret password exists on the router.
D. Setup will not run, because it is only viable when no configuration exists on the router. |
|
Definition
A. Setup is additive and any changes will be added to the config script. |
|
|
Term
[image]
What can be determined about the router from the console output?
A. No configuration file was found in NVRAM.
B. No configuration file was found in flash.
C. No configuration file was found in the PCMCIA card.
D. Configuration file is normal and will load in 15 seconds. |
|
Definition
A. no configuration file was found in NVRAM |
|
|
Term
[image]
What can be determined from the output?
A. 192.168.1.2 is local to the router.
B. 192.168.3.1 is local to the router.
C. 192.168.1.2 will age out in less than 1 minute.
D. 192.168.3.1 has aged out and is marked for deletion. |
|
Definition
B. 192.168.3.1 is local to the router |
|
|
Term
Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose 3)
A. ping
B. tracert
C. ipconfig
D. show ip route
E. winipcfg
F. show interfaces |
|
Definition
A. Ping
D. Show IP route
F. Show interfaces |
|
|
Term
What functions do routers perform in a network? (Choose 2)
A. packet switching
B. access layer security
C. path selection
D. VLAN membership assignment
E. bridging between LAN segments
F. micro segmentation of broadcast domains
|
|
Definition
A. Packet switching
C. Path selection |
|
|
Term
[image]
Which two statements are correct regarding the router hardware?
A. Total RAM size is 32 KB.
B. Total RAM size is 16384 KB (16 MB).
C. Total RAM size is 65536 KB (64 MB).
D. Flash size is 32 KB.
E. Flash size is 16384 KB (16 MB).
F. Flash size is 65536 KB (64 MB). |
|
Definition
C. Total RAM size is 65536KB (64Mb)
E. Flash size is 16384 KB (16Mb) |
|
|
Term
How does using the service password encryption command on a router provide addiontional security?
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router |
|
Definition
B. by encrypting passwords in the plain text configuration file |
|
|
Term
[image]
Host in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output from RouterA, what are two possible reasons for failure?
A. The cable that is connected to S0/0 on Router A is faulty.
B. Interface S0/0 on Router B is administratively down.
C. Interface S0/0 on Router A is configured with an incorrect subnet mask.
D. The IP address that is configured on S0/0 of Router B, is not in the correct subnet.
E. Interface S0/0 on Router A is not receiving a clock signal.
F. The encapsulation that is configured on S0/0 of Router B does not match the encapsulation that is configured on S0/0 of Router A. |
|
Definition
E. Interface s0/0 on ROuterA is not receiving a clock signal.
F. The encapsulation that is configured on S0/0 of Router B does not match the encapsulation that is configured on S0.0 of RouterA |
|
|
Term
[image]
What is the larges configuration file that can be stored on this router?
A. 191K bytes
B. 16384K bytes
C. 31369K bytes
D. 114688K bytes |
|
Definition
|
|
Term
A network administrator needs to allowo only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for telnet access should be encrypted. Which set of commands will accomplish this task?
A. service password-encryption
access-list 1 permit 192.168.1.0 0.0.0.255
line vty 0 4
login
password cisco
access-class 1
A. enable password secret
line vty 0
login
password cisco
B. service password-encryption
line vty 1
login
password cisco
C. service password-encryption
line vty 0 4
login
password cisco |
|
Definition
C. Service password-encryption
line vty 0 4
login
password cisco |
|
|
Term
[image]
What is the meaning of the output MTU 1500 bytes?
A. The maximum number of bytes that can traverse this interface per second is 1500.
B. The minimum segment size that can traverse this interface is 1500 bytes.
C. The minimum segment size that can traverse this interface is 1500 bytes.
D. The minimum packet size that can traverse this interface is 1500 bytes.
E. The maximum packet size that can traverse this interface is 1500 bytes.
F. The maximum frame size that can traverse this interface is 1500 bytes. |
|
Definition
E. the Maximum packet size that can travers the interface is 1500 bytes |
|
|
Term
[image]
A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enters the system configuration dialog as shown. What is the cause of the problem?
A. The network administrator failed to save the configuration.
B. The configuration register is set to 0×2100.
C. The boot system flash command is missing from the configuration.
D. The configuration register is set to 0×2102.
E. The router is configured with the boot system startup command. |
|
Definition
A. The network administraor failed to save the configuration. |
|
|
Term
Which command can you use to determine the Cisco IOS feature set on a cisco router?
A. show version
B. dir flash:|include ios
C. show environment
D. show diag
E. show inventory |
|
Definition
|
|
Term
A cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?
A. It checks the configuration register
B. It attempts to boot from a TFTP server
C. It loads the first image file in flash memory
D. It inspects the configuration file in NVRAM for boot instructions |
|
Definition
A. It checks the configuration register |
|
|
Term
The network administrator normally establishes a Telnet session with the switch from Host A. The administrator's attempt to establish a a connect via Telnet to the switch from host B fails, but pings from host B to other two hosts are successful. What is the issue for this problem?[image]
A. Host B and the switch need to be in the same subnet.
B. The switch needs and appropriate default gateway assigned.
C. The switch interface connected to the router is down.
D. Host B need to be assigned an IP address in vlan 1. |
|
Definition
B. The switch needs an appropriate deafault gateway assigned. |
|
|
Term
Which command can be executed on a router to verify the Layer 3 path to a host?
A. traceroute address
B. tracer address
C. ssh address
D. telnet address |
|
Definition
|
|
Term
Which command shows your active telnet connection?
A. show sessions
B. show cdp neighbors
C. show users
D. show queue |
|
Definition
|
|
Term
There are no boot system commands in a route configuration in NVRAM. What is the fallback sequence that router will use to find an IOS during reload?
A. Flash, TFTP server, ROM
B. Flash, NVRAM, ROM
C. ROM, NVRAM, TFTP server
D. NVRAM, TFTP server, ROM
E. TFTP server, Flash, NVRAM
|
|
Definition
A. Flash, TFTP server, ROM |
|
|
Term
[image]
The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
A. 3MB
B. 5MB
C. 7MB
D. 4MB |
|
Definition
|
|
Term
[image]
Which user-mode password has just been set?
A. Telnet
B. Auxiliary
C. SSH
D. Console |
|
Definition
|
|
Term
Which two location can be configured as a source for the IOS image in the boot system command?
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server |
|
Definition
C. Flash memory
E. TFTP Server |
|
|
Term
What are the two reasons a network administrator would use a CDP?
A. to verify the type of cable interconnecting two devices
B. to determine the status of network services on a remote device
C. to obtain VLAN information from directly connected switches
D. to verify Layer 2 connectivity between two devices when Layer 3 fails
E. to obtain the IP address of a connected device in order to telnet to the device
F. to determine the status of the routing protocols between directly connected routers |
|
Definition
D. To verify Layer 2 Connectiviy between two devices whe Layer 3 fails
E. To obtain the IP address of a connected device in order to telnet to the device |
|
|
Term
A network administrator changes the configuration register to 0x2142 and reboots the router. What are two results of making this change?
A. The IOS image will be ignored.
B. The router will prompt to enter initial configuration mode.
C. The router will boot to ROM.
D. Any configuration entries in NVRAM will be ignored.
E. The configuration in flash memory will be booted. |
|
Definition
B. The router will prompt to enter intial configuration mode.
D. Any configuration entries in NVRAM will be ignored |
|
|
Term
QoS policies are applied on the switches of a LAN. Which type of command will show the effects of the policy in real time?
A. show command
B. debug command
C. configuration command
D. rommon command |
|
Definition
|
|
Term
Which command is used to debug a ping command?
A. debug icmp
B. debug ip icmp
C. debug tcp
D. debug packet |
|
Definition
|
|
Term
Which command displays CPU utilization?
A. show protocols
B. show process
C. show system
D. show version |
|
Definition
|
|
Term
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version |
|
Definition
|
|
Term
[image]
You are connected to the router as user Mike. Which command allows you to see output from the OSPF debug command?
A. terminal monitor
B. show debugging
C. show sessions
D. show ip ospf interface |
|
Definition
|
|
Term
For this network, which of the following commands must be configured on Core2 to allow it to be managed remotely from and subnet on the network? (Choose Three)
[image]
A. Core2(config)# interface f0/0
Core2(config-if)# ip address 192.168.1.10 255.255.255.248
B. Core2(config)# interface vlan 1
Core2(config-if)# ip address 192.168.1.11 255.255.255.248
C. Core2(config)# line con 0
Core2(config-line)# password cisco
D. Core2(config)# line vty 0 4
Core2(config-line)# password cisco
E. Core2(config)# ip default-gateway 192.168.1.9
F. Core2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.8
|
|
Definition
B. Core2(config)# intervade vlan1
Core2(config-IF)# ip address 192.168.1.11 255.255.255.248
D. Core2(config)# line vty 0 4
Core2(config-line)# password cisco
E. Core2(config)# ip default-gateway 192.168.1.9 |
|
|
Term
What should be done prior to backing up an IOS image to a TFTP server? (choose 3)
A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer. |
|
Definition
A. Make sure the server can be reached
C. Assure that the network server has adequate space for the IOS image
D. Verify file naming and path requirements |
|
|
Term
[image]
The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three staments are true of these devices? (three)
A. The Manchester serial address is 10.1.1.1
B. The Manchester serial address is 10.1.1.2
C. The London router is a Cisco 2610.
D. The Manchester router is a Cisco 2610.
E. The CDP information was received on port Serial0/0 of the Manchester router.
F. The CDP information was sent by port Serial0/0 of the London Router. |
|
Definition
A. The manchester serial address is 10.1.1.1
C. The longdon router is a cisco 2610
E. The CDP information was received on port S0/0 of the manchester router |
|
|
Term
[image]
A router boots to the prompt shown in the exhibit. What does this signify and how should the network admin respond?
A. This prompt signifies that the configuration file was not found in NVRAM. The network administrator should follow the prompts to enter a basic configuration.
B. The prompt signifies that the configuration file was not found in flash memory. The network administrator should use TFTP to transfer a configuration file to the router.
C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network administrator should use TFTP to transfer an IOS image to the router.
D. The prompt signifies that the router could not authenticate the user. The network administrator should modify the IOS image and reboot the router. |
|
Definition
C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network admin should use TFTP to tranfer an IOS image to the router. |
|
|
Term
[image]
Why is flash memory erased prior to upgrading the IOS image from the TFTP server?
A. The router cannot verify that the Cisco IOS image currently in flash is valid
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. In order for the router to use the new image as the default, it must be the only IOS image in flash. |
|
Definition
C. Erasing current flash content is requested during the copy dialog |
|
|
Term
[image]
For what two reasons has the router loaded its IOS image from the location that is shown?
A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
B. Router1 is acting as a TFTP server for other routers.
C. Router1 cannot locate a valid IOS image in flash memory.
D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.
E. Cisco routers will first attempt to load an image from TFTP for management purposes. |
|
Definition
A. Router1 has specific boot system commands that instruct it to load IOS from a TFTP server.
C. Router1 cannot locate a valid IOS image in flash memory |
|
|
Term
Which two privieged mode Cisco IOS commands can be used to determine a Cisco router chassis serial number?
A. show inventory
B. show flash:filesys
C. dir flash:|include chassis
D. show diag
E. show controllers |
|
Definition
A. Show inventory
D. Show Diag |
|
|
Term
Which command helps a network admin to manage memory by displaying flash memory and NVRAM utilization?
A. show secure
B. show file systems
C. show flash
D. show version |
|
Definition
|
|
Term
[image]
What is the effect of the configuration that is shown?
A. It tells the router or switch to try establish an SSH connection first and if that fail to use telnet.
B. It configures a cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures the virtual terminal lines with the password 030752180500.
E. It configures SSH globally for all logins.
|
|
Definition
B. it configures a cisco network device to use the SSH protocol on incoming communication via the virutal terminal ports. |
|
|
Term
Which commands is necessary to permit SSH and Telnet access to a Catalyst?
A. transport type all
B. transport output all
C. transport preferred all
D. transport input all |
|
Definition
|
|
Term
[image]
The networks connected to router R2 have been summarized as a 192.168.176.0/21 route and sent to R1. Which two packet destination addresses will R1 forward to R2?
A. 192.168.194.160
B. 192.168.183.41
C. 192.168.159.2
D. 192.168.183.255
E. 192.168.179.4
F. 192.168.184.45 |
|
Definition
B. 192.168.1.183.41
E. 192.168.179.4 |
|
|
Term
[image]
What three statements correctly describe network device a?
A. With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique
IP subnet.
C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not require an IP address. |
|
Definition
B. With a network wide mask of 255.255.255.128, each interface does required an IP address on a unique IP subnet.
D. With a network wide mask of 255.255.255.0, must be a layer 3 device for the PCs to communicate with each other.
E. With a network wide mask of 255.255.254.0, each interface does not requries an IP address. |
|
|
Term
What is the principle reason to use a prive IP address on an internal network?
A. Subnet strategy for private companies.
B. Manage and scale the growth of the internal network.
C. Conserve public IP addresses so that we do not run out of them.
D. Allow access reserved to the devices. |
|
Definition
C. conserve public IP addresses so that we do not run out of them |
|
|
Term
Which IP address can be assigned to an internet interface?
A. 10.180.48.224
B. 9.255.255.10
C. 192.168.20.223
D. 172.16.200.18 |
|
Definition
|
|