F Flashcards
Under which circumstance is a router on a stick most appropriate?
A. When the router must route a single across multiple physical links.
B. When the router must route multiple subnets across multiple physical links.
C. When the router must route a single across single physical links.
D. When the router must route multiple subnets across single physical links.
D. When the router must route multiple subnets across single physical links.
Dhcp client in the back can not communicate with hosts in the outside of their subnet?
- ip dhcp pool my pool**
- network 192.168.10.0/27*
- domain name cisco.com*
- name server some ip
A. need to activate dhcp pool
B. need to configure default gateway
C. other option
D. other option
B. need to configure default gateway
What command can you enter to configure the switch as an authoritative ntp server with site id : XXXXXXXX?
A. Switch(config)#ntp master 3
B. Switch(config)#ntp peer IP 193.168.2.2
C. Switch(config)#ntp server IP 193.168.22
D. Switch(config)#ntp source IP 193.168.2.2
A. Switch(config)#ntp master 3
Router R1 has a static router that is configured to a destination network. A directly connected inference is configured with an ip address in the same destination network. Which statement about R1 is true ?
A. It refuses to advertise the dynamic route to other neighbors
B. It sends a withdrawal signal to the neighboring router
C. It disables the routing protocol
D. It prefers the static route
D. It prefers the static route
To enable router on a stick on a router subinterface, which two steps must you perform? choose two
A. configure full duplex and speed
B. configure a default to route traffic between subinterfaces
C. configure the subinterface with an ip address
D. configure encapsulation dot1q
E. configure an ip route to the vlan destination network
C. configure the subinterface with an ip address
D. configure encapsulation dot1q
Which command can you enter to determine the addresses that have been assigned on a DHCP Server? A. Show ip DHCP database. B. Show ip DHCP pool. C. Show ip DHCP binding. D. Show ip DHCP server statistic.
C. Show ip DHCP binding
Which statement about recovering a password on a cisco router is true?
A. it requires physical access to the router
B. the default reset password is cisco
C. a factory reset is required if you forget the password
D. it requires a secure SSL/VPN connection
A. it requires physical access to the router
While troubleshooting a DCHP client that is behaving erratically, you discover that the client has been assigned the same IP address as a printer that is a staticIP address. Which option is the best way to resolve the problem?
A. Configure a static route to the client.
B. Assign the client the same IP address as the router.
C. Move the client to another IP subnet
D. Move the printer to another IP subnet.
E. Reserve the printer IP address.
E. Reserve the printer IP address.
Which symptom can cause duplex mismatch problem?
A. no earner
B. collisions on interface
C. giants
D. CRC errors
B. collisions on interface
Which type of routing protocol operates by exchanging the entire routing information ?
A. distance vector protocols
B. link state protocols
C. path vector protocols
D. exterior gateway protocols
A. distance vector protocols
Which port security violation mode allows traffic from valid mac address to pass but block traffic from invalid mac address?
A. protect
B. shutdown
C. shutdown vlan
D. restrict
A. protect
Which IPsec security protocol should be used when confidentiality is required?
A. MD5
B. PSK
C. AH
D. ESP
D. ESP
Which definition of a host route is true?
A. A route that is manually configured
B. A route used when a destination route is missing.
C. A route to the exact /32 destination address
D. Dynamic route learned from the server.
B. A route used when a destination route is missing.
Which statement about DHCP snooping is true?
A. it blocks traffic from DHCP servers on untrusted interfaces.
B. it can be configured on switches and routers.
C. it allows packets from untrusted ports if their source MAC address is found in the binding table.
D. it uses DHCPDiscover packets to identify DHCP servers.
A. it blocks traffic from DHCP servers on untrusted interfaces.
Which three commands are required to enable NTP authentication on a Cisco router? (Choose three) A. ntp peer B. ntp max-associations C. ntp authenticate D. ntp trusted-key E. ntp authentication-key F. ntp refcloc
C. ntp authenticate
D. ntp trusted-key
E. ntp authentication-key
Which IPv6 routing protocol uses multicast group FF02::9 to send updates?
A. static
B. RIPng
C. OSPFv3
D. IS-IS for IPv6
B. RIPng
Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose three)
A. The subnet ID is 14920bf83d B. The subnet ID is 4079 C. The global ID is 14920bf83d D. The address is a link-local address E. The global ID is 4079 F. The address is a unique local address
B. The subnet ID is 4079
C. The global ID is 14920bf83d
F. The address is a unique local address
Which three statements about DWDM are true? (Choose three)
A. It allows a single strand of fiber to support bidirectional communications
B. It is used for long-distance and submarine cable systems
C. It can multiplex up to 256 channels on a single fiber
D. It supports both the SDH and SONET standards
E. Each channel can carry up to a 1-Gbps signal
F. It supports simplex communications over multiple strands of fiber
C. It can multiplex up to 256 channels on a single fiber
D. It supports both the SDH and SONET standards
E. Each channel can carry up to a 1-Gbps signal
Which tunneling mechanism embeds an IPv4 address within an IPv6 address? A. Teredo B. 6to4 C. 4to6 D. GRE E. ISATAP
B. 6to4
Which protocol does ipv6 use to discover other ipv6 nodes on the same segment? A. CLNS B. TCPv6 C. NHRP D. NDP E. ARP
D. NDP
What is the most efficient subnet mask for a point to point ipv6 connection? A. /127 B. /128 C. /64 D. /48 E. /32
A. /127
Which type of secure MAC address must be configured manually?
A. dynamic
B. bia
C. static
D. sticky
C. static
Where does a switch maintain DHCP snooping information ?
A. in the MAC address table
B. in the CAM table
C. in the DHCP binding database
D. in the VLAN database
C. in the DHCP binding database
Which two statements about IPv6 address 2002:ab10:beef::/48 are true?(choose two)
A. The embedded IPv4 address can be globally routed. B. It is used for an ISATAP tunnel
C. The embedded IPv4 address is an RFC 1918 address
D. The MAC address 20:02:b0:10:be:ef is embedded into the IPv6 address
E. It is used for a 6to4 tunnel
A. The embedded IPv4 address can be globally routed.
E. It is used for a 6to4 tunnel
If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?
A. 1
B. 2
C. 4
D. 8
C. 4
What are three parts of an IPv6 global unicast address? (Choose three.)
A. an interface ID that is used to identify the local host on the network
B. an interface ID that is used to identify the local network for a particular host.
C. a subnet ID that is used to identify networks inside of the local enterprise site
D. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
E. a global routing prefix that is used to identify the portion of the network address provided by a local administrator
A. an interface ID that is used to identify the local host on the network
C. a subnet ID that is used to identify networks inside of the local enterprise site
D. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
What is true about Cisco Discovery Protocol?
A. it discovers the routers, switches and gateways.
B. it is network layer protocol
C. it is physical and data link layer protocol
D. it is proprietary protocol
D. it is proprietary protocol
What layer of the OSI Model is included in TCP/IP Model’s INTERNET layer?
A. Application B. Session C. Data Link D. Presentation E. Network
E. Network
What are types of IPv6 static routes? (Choose Three.)
A. Recursive routes B. Directly connected routes C. Fully specified routes D. Advertised routes E. Virtual links F. Redistributed routes
A. Recursive routes
B. Directly connected routes
C. Fully specified routes
How to configure RIPv2? (Choose Two.)
A. Enable RIP
B. Connect RIP to WAN interface
C. Enable no auto-summary
D. Enable authentication
A. Enable RIP
C. Enable no auto-summary
Which value must the device send as its username when using CHAP to authenticate with the remote peer site id: XXXXXXXX over a PPP link?
A. The automatically generated user name
B. The local host name
C. The user name defined by the administrator
D. The host name of the remote device
B. The local host name
Which statement about IPv6 link-local addresses is true ?
A. They must be configured on all IPv6 interface
B. They must be globally unique
C. They must be manually configured
D. They are advertised globally on the network
A. They must be configured on all IPv6 interface
Which configuration can be used with PAT to allow multiple inside address to be translated to a single outside address?
A. Dynamic Routing
B. DNS
C. Preempt
D. overload
D. overload
Which command can you enter to create a NAT pool of 6 addresses?
A. Router(config)#ip nat pool test 175.17.12.69 175.17.12.74 prefix-length 24
B. Router(config)#ip nat pool test 175.17.12.69 175.17.13.74 prefix-length 16
C. Router(config)#ip nat pool test 175.17.12.66 175.17.12.72 prefix-length 8
D. Router(config)#ip nat pool test 175.17.12.69 175.17.12.76 prefix-length 8
A. Router(config)#ip nat pool test 175.17.12.69 175.17.12.74 prefix-length 24
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?
A. 802.1x
B. 802.11
C. 802.2x
D. 802.3x
A. 802.1x
Which two statements about floating static routes are true? (Choose two)
A. They are routes to the exact /32 destination address B. They are used when a route to the destination network is missing
C. They have a higher administrative distance than the default static route administrative distance
D. They are used as back-up routes when the primary route goes down
E. They are dynamic routes that are learned from a server
C. They have a higher administrative distance than the default static route administrative distance
D. They are used as back-up routes when the primary route goes down
Which networking Technology is currently recognized as the standard for computer networking?
A. System network architecture
B. Transmission control protocol/Internet protocol
C. Open system Interconnect D. Open network architecture
B. Transmission control protocol/Internet protocol
Which command you enter on a switch to display the ip address associated with connected devices?
A. Show cdp neighbors detail
B. Show cdp neighbor
C. Show cdp interface
D. Show cdp traffic
A. Show cdp neighbors detail
Which Type of ipv6 unicast ip address is reachable across the internet?
A. Unique Local
B. Compatible
C. Link local
D. Global Unicast
D. Global
Which value indicate the distance from the ntp authoritative time source?
A. priority
B. location
C. layer
D. stratum
D. stratum
If you want multiple hosts on a network, where do you configure the setting?
A. in the IP protocol
B. in the multicast interface
C. in the serial interface
D. in the global configuration
A. in the IP protocol
Where information about untrusted hosts are stored?
A. CAM table
B. Trunk table
C. MAC table
D. binding database
D. binding database
In which two situations should you use out-of-band management?
A. when a network device fails to forward packets
B. when you require ROMMON access
C. when management applications need concurrent access to the device
D. when you require administrator access from multiple locations
E. when the control plane fails to respond
A. when a network device fails to forward packets
B. when you require ROMMON access
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?
A. The access point transmits, but the node is unable to receive.
B. A connection occurs
C. Both the node and the access point are unable to transmit.
D. The node transmits, but the access point is unable to receive
D. The node transmits, but the access point is unable to receive
Which two command can you enter to display the current time sources statistics on devices ? (Choose
two.)
A. Show ntp associations B. Show clock details C. Show clock. D. Show time. E. Show ntp statu
A. Show ntp associations
E. Show ntp statu
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)
A. Session B. transport C. presentation D. application E. data-link F. network
A. Session
C. presentation
D. application
Which effect of the passive-interface command on R1 is true? R1 Interface FastEthernet0/0 description site id: XXXXXXXX ip address 172.16.0.1 255.255.0.0 Interface FastEthernet0/1 description site id: XXXXXXXX ip address 172.17.0.1 255.255.0.0 router rip passive-interface FastEthernet0/0 network 172.16.0.0 network 172.17.0.0 version 2
A. It prevents interface Fa0/0 from sending updates.
B. Interface Fa 0/0 operates in RIPv1 mode.
C. It removes the 172.16.0.0 network from all updates on all interfaces on R1.
D. It removes the 172.16.0.0 network from all updates on all interfaces on R1.
A. It prevents interface Fa0/0 from sending updates.
What is the command to see assigned address in DHCP?
A. show ip DHCP statistic
B. show ip dhcp pool
C. show ip dhcp binding
D. show ip dhcp database
C. show ip dhcp binding
Which two statements about Ethernet frame formats are true? (Choose two.)
A. The FCS is appended to the VLAN tag.
B. The receiving MAC always recalculates the FCS.
C. The VLAN tag precedes the Length/Type field.
D. The second bit in the Destination Address field indicates whether the address is an individual or group address. E. The first bit in the Destination Address field determines whether the address is handled globally or locally.
F. The preamble checks the FCS to identify the start and end of a packet
B. The receiving MAC always recalculates the FCS.
C. The VLAN tag precedes the Length/Type field.
By default, which speed does an interface attempt to negotiate if IEEE autonegotiation is enabled on only one side of a link?
A. speed of the neighbor side of the link
B. slowest supported speed of the interface
C. fastest supported speed of the interface
D. average supported speed of the two interfaces
C. fastest supported speed of the interface
How can you prevent a MAC address from aging out of the MAC address table?
A. Clear the MAC address table.
B. Disable the MAC address aging timer.
C. Manually enter the MAC address into the MAC address table.
D. Enable IGMP snooping.
C. Manually enter the MAC address into the MAC address table.
Which statement about DNS lookup on a Cisco router is true?
A. When it is disabled, the administrator must use IP addresses to reach to network devices.
B. When it is enabled, the router queries a public DNS, by default, for network device name resolution.
C. When it is disabled, reachability to end users and hosts must be addressed through their IP addresses.
D. It is disabled by default.
C. When it is disabled, reachability to end users and hosts must be addressed through their IP addresses.
Which two statements about VTP are true? (Choose two.)
A. The VLANs can be configured on a VTP server without a VTP domain name.
B. Each switch sends the VTP password in every summary-advertisement.
C. IOS switches cannot turn off VTP.
D. VTP negotiates a secure channel for VTP advertisements.
E. The switches must be reloaded when you update from VTP version 1 to VTP version 2.
B. Each switch sends the VTP password in every summary-advertisement.
C. IOS switches cannot turn off VTP.
Which statement about 802.1q trunking is true?
A. It supports PVST for load balancing.
B. The native VLAN must have the same configuration on each connected device.
C. It can support a maximum of 1000 VLANs.
D. It is a Cisco-proprietary technology.
B. The native VLAN must have the same configuration on each connected device.
Which configuration must you perform to enable VTP in a switching domain?
A. Configure a switch as a client.
B. Configure a switch with a VTP domain.
C. Configure a switch with VTP mode off to serve as the server switch.
D. Configure a switch in transparent mode.
B. Configure a switch with a VTP domain.
Which technology allows multiple VLANs to be extended across the network without the need for Layer 3 routing?
A. trunk ports
B. MPLS tunnels
C. access ports
D. IPsec tunnels
A. trunk ports