F Flashcards

1
Q

Under which circumstance is a router on a stick most appropriate?

A. When the router must route a single across multiple physical links.
B. When the router must route multiple subnets across multiple physical links.
C. When the router must route a single across single physical links.
D. When the router must route multiple subnets across single physical links.

A

D. When the router must route multiple subnets across single physical links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dhcp client in the back can not communicate with hosts in the outside of their subnet?

  • ip dhcp pool my pool**
  • network 192.168.10.0/27*
  • domain name cisco.com*
  • name server some ip

A. need to activate dhcp pool
B. need to configure default gateway
C. other option
D. other option

A

B. need to configure default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What command can you enter to configure the switch as an authoritative ntp server with site id : XXXXXXXX?

A. Switch(config)#ntp master 3
B. Switch(config)#ntp peer IP 193.168.2.2
C. Switch(config)#ntp server IP 193.168.22
D. Switch(config)#ntp source IP 193.168.2.2

A

A. Switch(config)#ntp master 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Router R1 has a static router that is configured to a destination network. A directly connected inference is configured with an ip address in the same destination network. Which statement about R1 is true ?

A. It refuses to advertise the dynamic route to other neighbors
B. It sends a withdrawal signal to the neighboring router
C. It disables the routing protocol
D. It prefers the static route

A

D. It prefers the static route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To enable router on a stick on a router subinterface, which two steps must you perform? choose two

A. configure full duplex and speed
B. configure a default to route traffic between subinterfaces
C. configure the subinterface with an ip address
D. configure encapsulation dot1q
E. configure an ip route to the vlan destination network

A

C. configure the subinterface with an ip address

D. configure encapsulation dot1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which command can you enter to determine the addresses that have been assigned on a DHCP Server?
A. Show ip DHCP database. 
B. Show ip DHCP pool. 
C. Show ip DHCP binding. 
D. Show ip DHCP server statistic.
A

C. Show ip DHCP binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which statement about recovering a password on a cisco router is true?

A. it requires physical access to the router
B. the default reset password is cisco
C. a factory reset is required if you forget the password
D. it requires a secure SSL/VPN connection

A

A. it requires physical access to the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While troubleshooting a DCHP client that is behaving erratically, you discover that the client has been assigned the same IP address as a printer that is a staticIP address. Which option is the best way to resolve the problem?

A. Configure a static route to the client.
B. Assign the client the same IP address as the router.
C. Move the client to another IP subnet
D. Move the printer to another IP subnet.
E. Reserve the printer IP address.

A

E. Reserve the printer IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which symptom can cause duplex mismatch problem?

A. no earner
B. collisions on interface
C. giants
D. CRC errors

A

B. collisions on interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of routing protocol operates by exchanging the entire routing information ?

A. distance vector protocols
B. link state protocols
C. path vector protocols
D. exterior gateway protocols

A

A. distance vector protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which port security violation mode allows traffic from valid mac address to pass but block traffic from invalid mac address?

A. protect
B. shutdown
C. shutdown vlan
D. restrict

A

A. protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which IPsec security protocol should be used when confidentiality is required?

A. MD5
B. PSK
C. AH
D. ESP

A

D. ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which definition of a host route is true?

A. A route that is manually configured
B. A route used when a destination route is missing.
C. A route to the exact /32 destination address
D. Dynamic route learned from the server.

A

B. A route used when a destination route is missing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement about DHCP snooping is true?

A. it blocks traffic from DHCP servers on untrusted interfaces.
B. it can be configured on switches and routers.
C. it allows packets from untrusted ports if their source MAC address is found in the binding table.
D. it uses DHCPDiscover packets to identify DHCP servers.

A

A. it blocks traffic from DHCP servers on untrusted interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which three commands are required to enable NTP authentication on a Cisco router? (Choose three)
A. ntp peer 
B. ntp max-associations 
C. ntp authenticate 
D. ntp trusted-key 
E. ntp authentication-key 
F. ntp refcloc
A

C. ntp authenticate
D. ntp trusted-key
E. ntp authentication-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which IPv6 routing protocol uses multicast group FF02::9 to send updates?

A. static
B. RIPng
C. OSPFv3
D. IS-IS for IPv6

A

B. RIPng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose three)

A. The subnet ID is 14920bf83d 
B. The subnet ID is 4079 
C. The global ID is 14920bf83d 
D. The address is a link-local address E. The global ID is 4079 
F. The address is a unique local address
A

B. The subnet ID is 4079
C. The global ID is 14920bf83d
F. The address is a unique local address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which three statements about DWDM are true? (Choose three)

A. It allows a single strand of fiber to support bidirectional communications
B. It is used for long-distance and submarine cable systems
C. It can multiplex up to 256 channels on a single fiber
D. It supports both the SDH and SONET standards
E. Each channel can carry up to a 1-Gbps signal
F. It supports simplex communications over multiple strands of fiber

A

C. It can multiplex up to 256 channels on a single fiber
D. It supports both the SDH and SONET standards
E. Each channel can carry up to a 1-Gbps signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which tunneling mechanism embeds an IPv4 address within an IPv6 address?
A. Teredo 
B. 6to4 
C. 4to6 
D. GRE 
E. ISATAP
A

B. 6to4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?
A. CLNS 
B. TCPv6 
C. NHRP 
D. NDP 
E. ARP
A

D. NDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
What is the most efficient subnet mask for a point to point ipv6 connection?
A. /127 
B. /128 
C. /64 
D. /48 
E. /32
A

A. /127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of secure MAC address must be configured manually?

A. dynamic
B. bia
C. static
D. sticky

A

C. static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where does a switch maintain DHCP snooping information ?

A. in the MAC address table
B. in the CAM table
C. in the DHCP binding database
D. in the VLAN database

A

C. in the DHCP binding database

24
Q

Which two statements about IPv6 address 2002:ab10:beef::/48 are true?(choose two)

A. The embedded IPv4 address can be globally routed. B. It is used for an ISATAP tunnel
C. The embedded IPv4 address is an RFC 1918 address
D. The MAC address 20:02:b0:10:be:ef is embedded into the IPv6 address
E. It is used for a 6to4 tunnel

A

A. The embedded IPv4 address can be globally routed.

E. It is used for a 6to4 tunnel

25
Q

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?

A. 1
B. 2
C. 4
D. 8

A

C. 4

26
Q

What are three parts of an IPv6 global unicast address? (Choose three.)
A. an interface ID that is used to identify the local host on the network
B. an interface ID that is used to identify the local network for a particular host.
C. a subnet ID that is used to identify networks inside of the local enterprise site
D. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
E. a global routing prefix that is used to identify the portion of the network address provided by a local administrator

A

A. an interface ID that is used to identify the local host on the network
C. a subnet ID that is used to identify networks inside of the local enterprise site
D. a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP

27
Q

What is true about Cisco Discovery Protocol?

A. it discovers the routers, switches and gateways.
B. it is network layer protocol
C. it is physical and data link layer protocol
D. it is proprietary protocol

A

D. it is proprietary protocol

28
Q

What layer of the OSI Model is included in TCP/IP Model’s INTERNET layer?

A. Application 
B. Session 
C. Data Link 
D. Presentation 
E. Network
A

E. Network

29
Q

What are types of IPv6 static routes? (Choose Three.)

A. Recursive routes 
B. Directly connected routes 
C. Fully specified routes 
D. Advertised routes 
E. Virtual links 
F. Redistributed routes
A

A. Recursive routes
B. Directly connected routes
C. Fully specified routes

30
Q

How to configure RIPv2? (Choose Two.)

A. Enable RIP
B. Connect RIP to WAN interface
C. Enable no auto-summary
D. Enable authentication

A

A. Enable RIP

C. Enable no auto-summary

31
Q

Which value must the device send as its username when using CHAP to authenticate with the remote peer site id: XXXXXXXX over a PPP link?

A. The automatically generated user name
B. The local host name
C. The user name defined by the administrator
D. The host name of the remote device

A

B. The local host name

32
Q

Which statement about IPv6 link-local addresses is true ?

A. They must be configured on all IPv6 interface
B. They must be globally unique
C. They must be manually configured
D. They are advertised globally on the network

A

A. They must be configured on all IPv6 interface

33
Q

Which configuration can be used with PAT to allow multiple inside address to be translated to a single outside address?

A. Dynamic Routing
B. DNS
C. Preempt
D. overload

A

D. overload

34
Q

Which command can you enter to create a NAT pool of 6 addresses?

A. Router(config)#ip nat pool test 175.17.12.69 175.17.12.74 prefix-length 24
B. Router(config)#ip nat pool test 175.17.12.69 175.17.13.74 prefix-length 16
C. Router(config)#ip nat pool test 175.17.12.66 175.17.12.72 prefix-length 8
D. Router(config)#ip nat pool test 175.17.12.69 175.17.12.76 prefix-length 8

A

A. Router(config)#ip nat pool test 175.17.12.69 175.17.12.74 prefix-length 24

35
Q

Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?

A. 802.1x
B. 802.11
C. 802.2x
D. 802.3x

A

A. 802.1x

36
Q

Which two statements about floating static routes are true? (Choose two)

A. They are routes to the exact /32 destination address B. They are used when a route to the destination network is missing
C. They have a higher administrative distance than the default static route administrative distance
D. They are used as back-up routes when the primary route goes down
E. They are dynamic routes that are learned from a server

A

C. They have a higher administrative distance than the default static route administrative distance
D. They are used as back-up routes when the primary route goes down

37
Q

Which networking Technology is currently recognized as the standard for computer networking?

A. System network architecture
B. Transmission control protocol/Internet protocol
C. Open system Interconnect D. Open network architecture

A

B. Transmission control protocol/Internet protocol

38
Q

Which command you enter on a switch to display the ip address associated with connected devices?

A. Show cdp neighbors detail
B. Show cdp neighbor
C. Show cdp interface
D. Show cdp traffic

A

A. Show cdp neighbors detail

39
Q

Which Type of ipv6 unicast ip address is reachable across the internet?

A. Unique Local
B. Compatible
C. Link local
D. Global Unicast

A

D. Global

40
Q

Which value indicate the distance from the ntp authoritative time source?

A. priority
B. location
C. layer
D. stratum

A

D. stratum

41
Q

If you want multiple hosts on a network, where do you configure the setting?

A. in the IP protocol
B. in the multicast interface
C. in the serial interface
D. in the global configuration

A

A. in the IP protocol

42
Q

Where information about untrusted hosts are stored?

A. CAM table
B. Trunk table
C. MAC table
D. binding database

A

D. binding database

43
Q

In which two situations should you use out-of-band management?

A. when a network device fails to forward packets
B. when you require ROMMON access
C. when management applications need concurrent access to the device
D. when you require administrator access from multiple locations
E. when the control plane fails to respond

A

A. when a network device fails to forward packets

B. when you require ROMMON access

44
Q

What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

A. The access point transmits, but the node is unable to receive.
B. A connection occurs
C. Both the node and the access point are unable to transmit.
D. The node transmits, but the access point is unable to receive

A

D. The node transmits, but the access point is unable to receive

45
Q

Which two command can you enter to display the current time sources statistics on devices ? (Choose
two.)

A. Show ntp associations
B. Show clock details 
C. Show clock. 
D. Show time. 
E. Show ntp statu
A

A. Show ntp associations

E. Show ntp statu

46
Q

Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)

A. Session 
B. transport 
C. presentation 
D. application 
E. data-link 
F. network
A

A. Session
C. presentation
D. application

47
Q

Which effect of the passive-interface command on R1 is true? R1 Interface FastEthernet0/0 description site id: XXXXXXXX ip address 172.16.0.1 255.255.0.0 Interface FastEthernet0/1 description site id: XXXXXXXX ip address 172.17.0.1 255.255.0.0 router rip passive-interface FastEthernet0/0 network 172.16.0.0 network 172.17.0.0 version 2

A. It prevents interface Fa0/0 from sending updates.
B. Interface Fa 0/0 operates in RIPv1 mode.
C. It removes the 172.16.0.0 network from all updates on all interfaces on R1.
D. It removes the 172.16.0.0 network from all updates on all interfaces on R1.

A

A. It prevents interface Fa0/0 from sending updates.

48
Q

What is the command to see assigned address in DHCP?

A. show ip DHCP statistic
B. show ip dhcp pool
C. show ip dhcp binding
D. show ip dhcp database

A

C. show ip dhcp binding

49
Q

Which two statements about Ethernet frame formats are true? (Choose two.)
A. The FCS is appended to the VLAN tag.
B. The receiving MAC always recalculates the FCS.
C. The VLAN tag precedes the Length/Type field.
D. The second bit in the Destination Address field indicates whether the address is an individual or group address. E. The first bit in the Destination Address field determines whether the address is handled globally or locally.
F. The preamble checks the FCS to identify the start and end of a packet

A

B. The receiving MAC always recalculates the FCS.

C. The VLAN tag precedes the Length/Type field.

50
Q

By default, which speed does an interface attempt to negotiate if IEEE autonegotiation is enabled on only one side of a link?

A. speed of the neighbor side of the link
B. slowest supported speed of the interface
C. fastest supported speed of the interface
D. average supported speed of the two interfaces

A

C. fastest supported speed of the interface

51
Q

How can you prevent a MAC address from aging out of the MAC address table?

A. Clear the MAC address table.
B. Disable the MAC address aging timer.
C. Manually enter the MAC address into the MAC address table.
D. Enable IGMP snooping.

A

C. Manually enter the MAC address into the MAC address table.

52
Q

Which statement about DNS lookup on a Cisco router is true?

A. When it is disabled, the administrator must use IP addresses to reach to network devices.
B. When it is enabled, the router queries a public DNS, by default, for network device name resolution.
C. When it is disabled, reachability to end users and hosts must be addressed through their IP addresses.
D. It is disabled by default.

A

C. When it is disabled, reachability to end users and hosts must be addressed through their IP addresses.

53
Q

Which two statements about VTP are true? (Choose two.)

A. The VLANs can be configured on a VTP server without a VTP domain name.
B. Each switch sends the VTP password in every summary-advertisement.
C. IOS switches cannot turn off VTP.
D. VTP negotiates a secure channel for VTP advertisements.
E. The switches must be reloaded when you update from VTP version 1 to VTP version 2.

A

B. Each switch sends the VTP password in every summary-advertisement.
C. IOS switches cannot turn off VTP.

54
Q

Which statement about 802.1q trunking is true?

A. It supports PVST for load balancing.
B. The native VLAN must have the same configuration on each connected device.
C. It can support a maximum of 1000 VLANs.
D. It is a Cisco-proprietary technology.

A

B. The native VLAN must have the same configuration on each connected device.

55
Q

Which configuration must you perform to enable VTP in a switching domain?

A. Configure a switch as a client.
B. Configure a switch with a VTP domain.
C. Configure a switch with VTP mode off to serve as the server switch.
D. Configure a switch in transparent mode.

A

B. Configure a switch with a VTP domain.

56
Q

Which technology allows multiple VLANs to be extended across the network without the need for Layer 3 routing?

A. trunk ports
B. MPLS tunnels
C. access ports
D. IPsec tunnels

A

A. trunk ports