ccna2 theory 90-105 Flashcards
After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?
The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.
Match the purpose with its DHCP message type. (Not all options are used.)
locate DHCP = discover
identify = request
acknowledge = pack
client = offer
Which protocol adds security to remote connections?
SSH
Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?
The encapsulation dot1Q 5 command contains the wrong VLAN.
Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?
It identifies the VLAN number.
Match each DHCP message type with its description. (Not all options are used.)
message – DHCPDISCOVER
client – DHCPOFFER
IP – DHCPREQUEST
server confirming – DHCPACK
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
DHCP starvation
Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?
The IP address of the default gateway router is not contained in the excluded address list.
Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.
What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)
R1(config-if)# ip helper-address 10.2.0.250
R1(config)# interface G0/0
What protocol or technology uses source IP to destination IP as a load-balancing mechanism?
EtherChannel
What protocol should be disabled to help mitigate VLAN attacks?
DTP
What protocol or technology requires switches to be in server mode or client mode?
VTP
What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
to enhance user bandwidth
to isolate traffic between segments
What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?
the ipv6 unicast-routing command
A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router?
Configure the port as an 802.1q trunk port.