2.13 Flashcards
- Refer to the exhibit. Which highlighted value represents a specific destination network in the routing table?
- 0.0.0
- 16.100.64
- 16.100.2
110
791
172.16.100.64
- Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?
1
2
3
4
5
6
2
- Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?
standard static route
floating static route
default static route
summary static route
floating static route*
- Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?
C 172.16.2.0/24 is directly connected, Serial0/0/0
S 192.168.2.0/24 [1/0] via 172.16.2.2
S 192.168.2.0/24 is directly connected, Serial 0/0/0
S 0.0.0.0/0 [1/0] via 172.16.2.2
S 192.168.2.0/24 [1/0] via 172.16.2.2*
- What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?
::/128
::/0
::1/64
FFFF::/128
::/0*
- A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?
ip route 172.16.0.0 255.255.240.0 S0/0/0 200
ip route 172.16.32.0 255.255.224.0 S0/0/0 200
ip route 172.16.0.0 255.255.224.0 S0/0/0 100
ip route 172.16.32.0 255.255.0.0 S0/0/0 100
ip route 172.16.32.0 255.255.224.0 S0/0/0 200*
- Which statement describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
It is automatically updated and maintained by routing protocols.*
- Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)
They improve network security.
They use fewer router resources.
They improve the efficiency of discovering neighboring networks.
They take less time to converge when the network topology changes.
They automatically switch the path to the destination network when the topology changes.
They improve network security.*
They use fewer router resources.*
- A network administrator adds the default-information originate command to the configuration of a router that uses RIP as the routing protocol. What will result from adding this command?
The router will be reset to the default factory information.
The router will not forward routing information that is learned from other routers.
The router will propagate a static default route in its RIP updates, if one is present.
The router will only forward packets that originate on directly connected networks.
The router will propagate a static default route in its RIP updates, if one is present.*
- A network administrator reviews the routing table on the router and sees a route to the destination network 172.16.64.0/18 with a next-hop IP address of 192.168.1.1. What are two descriptions of this route? (Choose two.)
default route
supernet route
ultimate route
parent route
level 2 child route
ultimate route
level 2 child route
- Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)
scalability
ISP selection
speed of convergence
the autonomous system that is used
campus backbone architecture
scalability
speed of convergence
- Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate?
distribution
data link
physical
access
core
access*
- What is a characteristic of the distribution layer in the three layer hierarchical model?
acts as the backbone for the network, aggregating and distributing network traffic throughout the campus
provides access to the rest of the network through switching, routing, and network access policies
distributes access to end users
represents the network edge
provides access to the rest of the network through switching, routing, and network access policies*
- Which information does a switch use to populate the MAC address table?
the destination MAC address and the incoming port
the destination MAC address and the outgoing port
the source and destination MAC addresses and the incoming port
the source and destination MAC addresses and the outgoing port
the source MAC address and the incoming port
the source MAC address and the outgoing port
the source MAC address and the incoming port
- Which statement is correct about Ethernet switch frame forwarding decisions?
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
Cut-through frame forwarding ensures that invalid frames are always dropped.
Only frames with a broadcast destination address are forwarded out all active switch ports.
Unicast frames are always forwarded regardless of the destination MAC address.
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.*
- Which switching method drops frames that fail the FCS check?
borderless switching
cut-through switching
ingress port buffering
store-and-forward switching
store-and-forward switching*
- In what situation would a Layer 2 switch have an IP address configured?
when the Layer 2 switch needs to forward user traffic to another device
when the Layer 2 switch is the default gateway of user traffic
when the Layer 2 switch needs to be remotely managed
when the Layer 2 switch is using a routed port
when the Layer 2 switch needs to be remotely managed*
- A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)
IP address
VTP domain
vty lines
default VLAN
default gateway
loopback address
IP address
default VLAN
loopback address
- A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?
auto secure MAC addresses
dynamic secure MAC addresses
static secure MAC addresses
sticky secure MAC addresses
sticky secure MAC addresses*