1.3-1.4 Flashcards
A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function?
Multicast addressing
Tunneling
Unique Local Addressing (ULA)
Dual-stack
Tunneling
Tunneling is an alternative to dual-stack routing. Tunneling can be used to deliver Internet Protocol version 6 (IPv6) packets across the Internet Protocol version 4 (IPv4) Internet. The IPv6 packets are inserted into IPv4 packets and routed over the IPv4 network to their destination.
A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches?
Virtual Local Area Network (VLAN) tag
Access port
Trunks
Tagged port
Trunks
A trunk is used for interconnections between switches on large networks. Each switch will be configured as a trunk port for this purpose.
A network manager adds a power injector to a switch that does not support Power over Ethernet (PoE). The only option available to the network manager is to use phantom power for the injector. Evaluate the characteristics of PoE and decide which pairs the network manager will use. (Select two).
3/6
4/5
7/8
1/2
3/6
1/2
If a switch does not support Power over Ethernet (PoE), a device called a power injector can be used. There are two modes, Mode A and Mode B, that can be used for this solution. Gigabit Ethernet only uses the Mode A method (also called phantom power). The scenario uses a 10GBASE Ethernet solution which requires the Mode A method. Power runs over pairs 1/2 and 3/6 for the Mode A method.
A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth and load. Which routing protocol is in use?
Border Gateway Protocol (BGP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Open Shortest Path First (OSPF)
Routing Information Protocol (RIP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements.
A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?
Demilitarized Zone (DMZ)
Port Address Translation (PAT)
Port forwarding
Network Address Translation (NAT)
Demilitarized Zone (DMZ)
The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly.
If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it.
A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.
A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.
What application can define policy decisions on the control plane?
Distributed switching
Software Defined Networking (SDN)
Storage Area Network (SAN)
Network Controller
A Software Defined Networking (SDN) application, or suite of applications, can be used to define policy decisions on the control plane.
Which of these simulates the use of port forwarding on a network?
A network has a 1:1 mapping between private network addresses and public addresses.
A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host.
A firewall allows a host access based on the Internet Protocol (IP) address and the port the host uses.
A company has a single public Internet Protocol (IP) address that forwards packets to private IP addresses within the network.
A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host.
Port forwarding uses a router’s public address for something like a web server. The router forwards incoming requests to a different Internet Protocol (IP) address. Port forwarding means that the router takes requests from the Internet for a specific application and changes the destination address to send the packet to a designated host.
A host uses Internet Protocol version 6 (IPv6). The host sends a packet to another host and a router informs the host of a better route to take. Which protocol provides this function?
Neighbor Discovery Protocol (ND)
Router Advertisement (RA)
Dual-stack
Dynamic Host Configuration Protocol (DHCP)
Neighbor Discovery Protocol (ND)
The Neighbor Discovery Protocol’s (ND) main functions include redirection, which enables a router to inform a host of a better route to a particular destination.
A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use.
00: 5a:3b:08:5c:02
192. 152.160.120
ff: ff:ff:ff:ff:ff
ff02: 11
ff02:11
A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.
A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The manager uses the ping command and can reach the IP address. Recommend a command the network manager can use for troubleshooting the issue.
arp 192.150.060.024
arp -a 192.150.060.024
arp -d 192.150.060.024
arp -s 192.150.060.024
arp -a 192.150.060.024
It is possible that two systems on the network have the same Internet Protocol (IP) address and the Address Resolution Protocol (ARP) table has the other system stored in the cache. This can be verified by using the command arp -a 192.150.060.024 and reviewing the returned Media Access Control (MAC) address.
Compare and differentiate the features of tagged and untagged ports. (Select two)
A frame will get tagged if it goes over a trunk port.
A switch receiving a tagged frame on an access port will block the frame.
A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.
An untagged port will normally be one that is operating as a trunk.
A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.
A frame will get tagged if it goes over a trunk port.
The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2, until the media is clear. Which Ethernet Protocol is providing this function?
Virtual Local Area Network (VLAN)
Broadcast Domain
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes such as “request to send” to gain access to the media. Nodes listen to the media before transmitting, and transmit when the media is clear. A node wanting to transmit, but detecting activity, must wait and try later.
Identify the function that copies packets sent to one or more source ports to a destination port.
Switching loops
Bridge Protocol Data Unit (BPDU)
Port mirroring
Spanning tree
Port mirroring
Port mirroring copies all of the packets sent to one or more source ports to a mirror (or destination) port. On a Cisco switch, this is referred to as a Switched Port Analyzer (SPAN).
What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port?
When the bridges in a network organize themselves into a hierarchy
When the MAC address table cannot find the MAC address
When frames begin to circulate the network perpetually.
When capturing and analyzing network traffic occurs
When the MAC address table cannot find the MAC address
If a Media Access Control (MAC) address cannot be found in the MAC address table, then the switch acts like a hub and transmits the frame out of all of the ports, except for the source port.
What technology uses a router to rewrite an Internet Protocol version 6 (IPv6) packet to an Internet Protocol version 4 (IPv4) packet within the same network?
IPv6 Tunneling
Neighbor Discovery (ND)
Dual-stack
Router Advertisement (RA)
Dual-stack
Dual-stack hosts can run both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) simultaneously and communicate with devices configured with either type of address. One technology is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) which uses a dual-stack router to rewrite an IPv6 packet to an IPv4 packet.
A packet passes through a router and the router classifies the packet using the Type of Service field. The classification prioritizes delivery. What framework provides this service?
Traffic shaping
Quality of Service (QoS)
Class of Service (CoS)
Differentiated Services (DiffServ)
Differentiated Services (DiffServ)
The Differentiated Services (DiffServ) framework classifies each packet passing through a device. DiffServ is a service tagging mechanism. It uses the Type of Service field in the Internet Protocol version 4 (IPv4) header and renames it the Differentiated Services field.
A network manager configures a Routing Information Protocol (RIP) on the network. Consider the types of dynamic routing protocols to determine what features the protocol will provide.
The protocol will use a metric composed of several administrator weighted elements.
The protocol will perform routing between domains and is the routing protocol Internet Service Providers (ISPs) use.
The protocol will consider only one route to a given destination network.
The protocol will group networks, their connected hosts and routers within an autonomous system.
The protocol will consider only one route to a given destination network.
Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.