Communicating Between Networks Flashcards

1
Q

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

A. The cable is not connected properly to the NIC.
B. The computer has an invalid IP address.
C. The computer has an incorrect subnet mask.
D. The computer has an invalid default gateway address.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statement describes a feature of the IP protocol?

A. IP encapsulation is modified based on network media.
B. IP relies on Layer 2 protocols for transmission error control.
C. MAC addresses are used during the IP packet encapsulation.
D. IP relies on upper layer services to handle situations of missing or out-of-order packets.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is NAT not needed in IPv6?​

A. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​
B. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​
C. The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​
D. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which parameter does the router use to choose the path to the destination when there are multiple routes available?

A. the lower metric value that is associated with the destination network
B. the lower gateway IP address to get to the destination network
C. the higher metric value that is associated with the destination network
D. the higher gateway IP address to get to the destination network

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two services provided by the OSI network layer? (Choose two.)

A. performing error detection
B. routing packets toward the destination
C. encapsulating PDUs from the transport layer
D. placement of frames on the media
E. collision detection

A

Answer: BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Within a production network, what is the purpose of configuring a switch with a default gateway address?

A. Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination.
B. A switch must have a default gateway to be accessible by Telnet and SSH.
C. The default gateway address is used to forward packets originating from the switch to remote networks.
D. It provides a next-hop address for all traffic that flows through the switch.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a basic characteristic of the IP protocol?

A. connectionless
B. media dependent
C. user data segmentation
D. reliable end-to-end delivery

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

A.. Sequence Number
B. Time-to-Live
C. Acknowledgment Number
D. Differentiated Services

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one advantage that the IPv6 simplified header offers over IPv4?

A. smaller-sized header
B. little requirement for processing checksums
C. smaller-sized source and destination IP addresses
D. efficient packet handling

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What IPv4 header field identifies the upper layer protocol carried in the packet?

A. Identification
B. Protocol
C. Version
D. Differentiated Services

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information does the loopback test provide?

A. The TCP/IP stack on the device is working correctly.
B. The device has end-to-end connectivity.
C. DHCP is working correctly.
D. The Ethernet cable is working correctly.
E. The device has the correct IP address on the network.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What routing table entry has a next hop address associated with a destination network?

A. directly-connected routes
B. local routes
C. remote routes
D. C and L source routes

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do hosts ensure that their packets are directed to the correct network destination?

A. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​
B. They always direct their packets to the default gateway, which will be responsible for the packet delivery.
C. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway.
D. They send a query packet to the default gateway asking for the best route.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

A. Next Header
B. Flow Label
C. Traffic Class
D. Differentiated Services

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What statement describes the function of the Address Resolution Protocol?

A. ARP is used to discover the IP address of any host on a different network.
B. ARP is used to discover the IP address of any host on the local network.
C. ARP is used to discover the MAC address of any host on a different network.
D. ARP is used to discover the MAC address of any host on the local network.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)

A. The frame has the broadcast address as the destination address.
B. The destination address is unknown to the switch.
C. The source address in the frame header is the broadcast address.
D. The source address in the frame is a multicast address.
E. The destination address in the frame is a known unicast address.

A

Answer: AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which statement describes the treatment of ARP requests on the local link?

A. They must be forwarded by all routers on the local network.
B. They are received and processed by every device on the local network.
C. They are dropped by all switches on the local network.
D. They are received and processed only by the target device.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which destination address is used in an ARP request frame?

A.    0.0.0.0
B.    255.255.255.255
C.    FFFF.FFFF.FFFF
D.    AAAA.AAAA.AAAA
E.    the physical address of the destination host
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?

A. The ARP cache is cleared.
B. The current content of the ARP cache is displayed.
C. The detailed information of the ARP cache is displayed.
D. The ARP cache is synchronized with the router interface.

A

Answer: A

20
Q

Which two types of IPv6 messages are used in place of ARP for address resolution?

A.    anycast
B.    broadcast
C.    echo reply
D.    echo request
E.    neighbor solicitation
F.    neighbor advertisement
A

Answer: EF

21
Q

What is the aim of an ARP spoofing attack?

A. to flood the network with ARP reply broadcasts
B. to fill switch MAC address tables with bogus addresses
C. to associate IP addresses to the wrong MAC address
D. to overwhelm network hosts with ARP requests

A

Answer: C

22
Q

Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?

A. neighbor table
B. ARP cache
C. routing table
D. MAC address table

A

Answer: B

23
Q

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

A.    source MAC address
B.    source IP address
C.    destination MAC address
D.    Ethernet type
E.    destination IP address
A

Answer: C

24
Q

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

A. Reboot the device.
B. Enter CTRL-Z at the privileged mode prompt.
C. Exit global configuration mode.
D. Power cycle the device.
E. Exit privileged EXEC mode and press Enter.

A

Answer: E

25
Q

What are two functions of NVRAM? (Choose two.)

A. to store the routing table
B. to retain contents when power is removed
C. to store the startup configuration file
D. to contain the running configuration file
E. to store the ARP table

A

Answer: BC

26
Q

A router boots and enters setup mode. What is the reason for this?

A. The IOS image is corrupt.
B. Cisco IOS is missing from flash memory.
C. The configuration file is missing from NVRAM.
D. The POST process has detected hardware failure.

A

Answer: C

27
Q

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

A. The switch will have a management interface with the address 172.16.100.1.
B. The switch can be remotely managed from a host on another network.
C. The switch can communicate with other hosts on the 172.16.100.0 network.
D. The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.

A

Answer: B

28
Q

What happens when the transport input ssh command is entered on the switch vty lines?

A. The SSH client on the switch is enabled.
B. Communication between the switch and remote users is encrypted.
C. The switch requires a username/password combination for remote access.
D. The switch requires remote connections via a proprietary client software.

A

Answer: B

29
Q

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

A.    interface fastethernet 0/0
B.    line vty 0 4
C.    line console 0
D.    enable secret cisco
E.    login
F.    password cisco
A

Answer: CEF

30
Q

Which two functions are primary functions of a router? (Choose two.)

A.    packet forwarding
B.    microsegmentation
C.    domain name resolution
D.    path selection
E.    flow control
A

Answer: AD

31
Q

What is the effect of using the Router# copy running-config startup-config command on a router?

A. The contents of ROM will change.
B. The contents of RAM will change.
C. The contents of NVRAM will change.
D. The contents of flash will change.

A

Answer: C

32
Q

What will happen if the default gateway address is incorrectly configured on a host?

A. The host cannot communicate with other hosts in the local network.
B. The switch will not forward packets initiated by the host.
C. The host will have to use ARP to determine the correct address of the default gateway.
D. The host cannot communicate with hosts in other networks.
E. A ping from the host to 127.0.0.1 would not be successful.

A

Answer: D

33
Q

What are two potential network problems that can result from ARP operation? (Choose two.)

A. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.
B. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.
C. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
D. Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.
E. Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

A

Answer: BC

34
Q

Open the PT activity. Perform the tasks in the activity instructions and then answer the question.
Which interfaces in each router are active and operational?

A.    R1:  G0/0 and S0/0/0
       R2:  G0/0 and S0/0/0
B.    R1:  G0/1 and S0/0/1
       R2:  G0/0 and S0/0/1
C.    R1: G0/0 and S0/0/0
       R2: G0/1 and S0/0/0
D.    R1: G0/0 and S0/0/1
       R2: G0/1 and S0/0/1
A

Answer: C

35
Q

Which term describes a field in the IPv4 packet header used to identify the next level protocol?

A. protocol
B. destination IPv4 address
C. source IPv4 address
D. TTL

A

Answer: A

36
Q

Which term describes a field in the IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet?

A. differentiated services
B. destination IPv4 address
C. source IPv4 address
D. protocol

A

Answer: A

37
Q

Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device?

A. source IPv4 address
B. destination IPv4 address
C. protocol
D. TTL

A

Answer: A

38
Q

Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?

A. source IPv4 address
B. protocol
C. header checksum
D. TTL

A

Answer: C

39
Q

Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?

A. destination IPv4 address
B. protocol
C. TTL
D. header checksum

A

Answer: A

40
Q

Which term describes a field in the IPv4 packet header used to limit the lifetime of a packet?

A. source IPv4 address
B. TTL
C. protocol
D. header checksum

A

Answer: B

41
Q

Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?

A. version
B. source IPv4 address
C. protocol
D. TTL

A

Answer: A

42
Q

Which term describes a field in the IPv4 packet header that contains a 4-bit binary value set to 0100?

A. differentiated services
B. header checksum
C. TTL
D. version

A

Answer: D

43
Q

What property of ARP causes cached IP-to-MAC mappings to remain in memory longer?

A. Entries in an ARP table are time-stamped and are purged after the timeout expires.
B. A static IP-to-MAC address entry can be entered manually into an ARP table.
C. The type field 0x806 appears in the header of the Ethernet frame.
D. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

A

Answer: A

44
Q

What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?

A. A static IP-to-MAC address entry can be entered manually into an ARP table.
B. Entries in an ARP table are time-stamped and are purged after the timeout expires.
C. The type field 0x806 appears in the header of the Ethernet frame.
D. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

A

Answer: A

45
Q

What property of ARP allows hosts on a LAN to send traffic to remote networks?

A. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
B. The source MAC address appears in the header of the Ethernet frame.
C. Local hosts learn the MAC address of the default gateway.
D. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.

A

Answer: C

46
Q

What property of ARP forces all Ethernet NICs to process an ARP request?

A. The source MAC address appears in the header of the Ethernet frame.
B. The type field 0x806 appears in the header of the Ethernet frame.
C. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
D. ARP replies are broadcast on the network when a host receives an ARP request.

A

Answer: C

47
Q

What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?

A. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
B. The type field 0x806 appears in the header of the Ethernet frame.
C. Entries in an ARP table are time-stamped and are purged after the timeout expires.
D. ARP replies are broadcast on the network when a host receives an ARP request.

A

Answer: B