Flackbox CCNA 200-301 v1.0 Flashcards

1
Q

<div>Its seven-layered approach to data transmission divides the operations into specific related groups of actions at each layer.</div>

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-1

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-2

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-3

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-4

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-5

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-6

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

25be42c1a3764350893c38ff8ee2d6c9-oa-7

A

OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

13633472f782438c8a3fb4b127100eb3-oa-1

A

TCP/IP Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

13633472f782438c8a3fb4b127100eb3-oa-2

A

TCP/IP Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

13633472f782438c8a3fb4b127100eb3-oa-3

A

TCP/IP Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

13633472f782438c8a3fb4b127100eb3-oa-4

A

TCP/IP Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

<div>It is a protocol stack that consists of multiple protocols including TCP (Transmission Control Protocol) and IP (Internet Protocol).</div>

A

TCP/IP Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

<div>Which OSI layer provides network services to the applications of the user?</div>

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

<div>Which OSI layer defines the specifications needed for activating, maintaining, and deactivating the physical link between end devices?</div>

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

<div>This OSI layer defines services to segment, transfer and reassemble the data for individual communications between the end devices.</div>

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

<div>This OSI layer provides connectivity and path selection between two host systems that may be located on geographically separated networks.</div>

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

<div>The Cisco operating system used on the majority of Cisco enterprise grade network devices.</div>

A

IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

<div>Where is the IOS operating system image is stored?</div>

A

Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

<div>Where is the startup configuration is stored?</div>

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

<div>This command drops you back to the Privileged Exec mode from any level.</div>

A

end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

<div>What cable will you use for a direct connection to the console port on the router or switch?</div>

A

Console Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

“What Cisco IOS command line mode is ‘Router>’ in?”

A

User Exec mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

“What Cisco IOS command line mode is ‘Router(config-if)#’ in?”

A

Interface Configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This command is used to go to the Privileged Exec mode from the User Exec mode.

A

enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

<div>This command makes the running configuration persistent across reboot.</div>

A

copy running-config startup-config or copy run start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

“The ‘show’ command that displays the entire running configuration on the router.”

A

show running-config or show run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

<div>The process of adjusting the flow of data from the sender to ensure that the receiving host can handle all of it.</div>

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

<div>The process by which a host is able to support multiple sessions simultaneously and manage the individual traffic streams over a single link.</div>

A

Session Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

<div>This OSI layer provides transparent transfer of data between hosts and is responsible for end-to-end error recovery and flow control.</div>

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

“<span>Which</span>transport layer protocol<span>is used by TFTP</span><span>?</span>”

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does the acronym UDP stand for?

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which transport layer protocol sends traffic best effort? TCP or UDP?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

<div>This transport layer protocol carries out sequencing to ensure segments are processed in the correct order and none are missing.</div>

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

<div>Which transport layer protocol is connection oriented? TCP or UDP?</div>

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

This transport layer protocol does <b>not</b> carry out sequencing to ensure segments are processed in the correct order and none are missing.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

<div>Which transport layer protocolis not reliable, meaning the receiving host does not send acknowledgments back to the sender?</div>

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which transport layer protocol does <b>not</b> perform flow control? TCP or UDP?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which transport layer protocol is reliable where lost segments are resent? TCP or UDP?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

“<span>Which</span>transport layer protocol<span>is used by Telnet</span><span>?</span>”

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

<div>This OSI layer is responsible forrouting packets to their destination and for Quality of Service.</div>

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is1100 1011 in decimal?

A

203

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is 255.255.192.0 in slash notation?

A

/18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is /27 in dotted decimal notation?

A

255.255.255.224

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

<div>This defines where the boundary between the IP address network portion and host portion.</div>

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

<div>Traffic with this as destination address will be sent to all hosts in the subnet.</div>

A

Broadcast Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

<div>This address class is reserved for IP multicast addresses.</div>

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This address class is‘experimental and reserved for future use’.

A

Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

<div>This address class is assigned to networks with a <b>very large</b> number of hosts.</div>

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

<div>What is the default subnet mask of Class A addresses?</div>

A

/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does IANA stand for?

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

<div>This address class is assigned to <b>medium-sized to large-sized</b> networks.</div>

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

<div>What is the valid network address range of Class B?</div>

A

128.0.0.0to191.255.0.0 /16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

<div>This address class is used for <b>small </b>networks.</div>

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

<div>These addresses are valid to be assigned to hosts but they are not routable on the public internet.</div>

A

Private Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the Class A private IP address range?

A

<div>10.0.0.0 to 10.255.255.255</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the Class B private IP address range?

A

<div>172.16.0.0 to 172.31.255.255</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the Class C private IP address range?

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the Class E IP address range?

A

<div>240.0.0.0 to 255.255.255.255</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

<div>What does CIDR stand for?</div>

A

Classless Inter-Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

<div>This allows us to size subnets differently according to how many hosts they have.</div>

A

Variable Length Subnet Masking (VLSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

e7310797b17246ad9c64abaed64ef965-ao-1

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

e7310797b17246ad9c64abaed64ef965-ao-2

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What network does 192.123.45.67 255.255.255.192 belongs to?

A

192.123.45.64 /26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

How many usable IP addresses are in a /27 network?

A

30 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

“You are asked to subnet 10.150.100.0/24 using VLSM, which office would you allocate the first subnet to?<br></br><img></img>”

A

Management Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

How many subnets are available in 172.205.7.0 /25?

A

512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the usable IP address range of172.80.250.148 255.255.224.0?

A

172.80.224.1 - 172.80.255.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the broadcast address of10.64.250.14 255.192.0.0?

A

10.127.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the valid IP address range of126.12.16.0 255.255.254.0?

A

126.12.16.1 - 126.12.17.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

68292c91321b4dc4b3f22fe411c7852b-ao-1

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

68292c91321b4dc4b3f22fe411c7852b-ao-2

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

68292c91321b4dc4b3f22fe411c7852b-ao-3

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

68292c91321b4dc4b3f22fe411c7852b-ao-4

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

68292c91321b4dc4b3f22fe411c7852b-ao-5

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

68292c91321b4dc4b3f22fe411c7852b-ao-6

A

VLSM Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

How many subnet bits do 100.1.1.0 255.255.240.0 have?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

How many host bits does 172.17.7.2 255.255.255.128 have?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

<div>Error detection and correction for the Physical Layer can be provided in this OSI layer.</div>

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

<div>How many bits does a MAC address have?</div>

A

48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What does MAC stand for?

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The term for the message in the Data Link Layer.

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What part of Ethernet header is at the start?

A

Preamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which Ethernet header part helps the sender and the receiver to synchronize?

A

Preamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What does the acronym FCS stand for?

A

Frame Check Sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

The MAC address is how many bytes long?

A

6 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

In the MAC address BC:54:2F:70:E2:43, what is theOUI portion?

A

BC:54:2F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In the MAC address 08:97:98:AC:2E:95, what is the vendor assigned portion?

A

AC:2E:95

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

This OSI layer puts the actual bits onto the wire.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

<div>This OSI layer provides thehardwaremeans of sending and receiving data, including defining cables, interface cards and physical aspects.</div>

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What does UTP stand for?

A

Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

<div>These type of cables are used to connect an end device such as a PC or router to a switch.</div>

A

Straight-through cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

<div>These cables are most often used to connect two devices of the same type directly, like two switches to each other.</div>

A

Crossover cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

This fiber cable type is more expensive and supports higher bandwidth and longer distances.

A

Single Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What does PoE stand for?

A

Power over Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

It delivers power to the devices over the standard network cable. It that saves you having to use a separate power supply for all connected devices.

A

Power over Ethernet (PoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

“What’s the maximum length of UTP cables?”

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Hubs operate in this duplex mode.

A

Half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

“In this duplex mode, the attached hosts can either send or receive data. They can’t do both at the same time.”

A

Half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What does the acronym CSMA/CD stand for?

A

Carrier-Sense Multiple Access with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

When operating in this duplex mode, the attached host can both send and receive data at the same time using their receive and transmit wires.

A

Full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

With this duplex mode, all hosts have their own dedicated collision domain.

A

Full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

“With Auto MDI-X disabled, what UTP cable is used to connect the device below?<br></br><img></img>”

A

Crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

“With Auto MDI-X disabled, what UTP cable is used to connect the devices below?<br></br><img></img>”

A

Straight-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What connector type is on the end of standard UTP cable?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

This fiber cable type supports a few hundred meters maximum distance.

A

Multi Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

<div>These are advanced switches that are Layer 3 aware and can route traffic between different IP subnets.</div>

A

Layer 3 switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

“The switch MAC address table is empty. PC2 sends traffic to PC3. What MAC address will the switch enter in the MAC address table?<br></br><img></img>”

A

0002.2222.000B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

“The switch MAC address table is empty. PC2 sends traffic to PC3. What Port will the switch enter in the MAC address table?<br></br><img></img>”

A

F0/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

“PC1 receives a frame with a destination MAC address of 0003.3333.000C. What will PC1 do with the frame?<br></br><img></img>”

A

Discard/Drop the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

“The switch MAC address table has a single existing entry of 0001.1111.000A mapped to Port F0/1. PC4 sends traffic to PC1. What MAC address will the switch enter in the MAC address table?<br></br><img></img>”

A

0004.4444.000D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

“The switch MAC address table has an existing entry of 0003.3333.000C mapped to Port F0/3. PC1 sends traffic to PC3. Which port/s will the switch forward the traffic to?<br></br><img></img>”

A

F0/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

The switch is just plugged into the network. It receives a frame with a source MAC address of 1001.00A5.30A9 and a destination MAC address of 505C.1000.F008. What MAC address will the switch enter on its MAC address table?

A

1001.00A5.30A9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What doesFQDN stand for?

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What resolves an FQDN to an IP address?

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

<div>This is used to map the IP address to MAC address.</div>

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What does ARP stand for?

A

“<span>Address Resolution Protocol</span>”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What commands are entered on a router for it to be able to resolve hostnames?

A

ip domain-lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

“You are tasked to create a primary domain named ‘flackbox.com’. What command will you enter?”

A

ip domain-name flackbox.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What command is entered on a router for it to act as a DNS server?

A

ip dns server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

“What command is entered on the DNS-Clientto allow it to look up or send DNS queries to DNS-Server?<br></br><img></img>”

A

ip name-server 172.16.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

“PC1 sends an ARP Request to PC2. PC1 don’t know PC2’s MAC address yet. What will be the Destination MAC of the ARP Request?<br></br><img></img>”

A

FFFF.FFFF.FFFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

“PC1 wants to send a packet to PC2. The ARP Request will be sent to what IP address?<br></br><img></img>”

A

192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

453b9e33735040b39cbdbce3531723f1-ao-1

A

ARP Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

453b9e33735040b39cbdbce3531723f1-ao-2

A

ARP Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

“PC1 sends an IP packet to PC2. What is the Source IP Address?<br></br><img></img>”

A

192.168.1.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

“PC1 sends an IP packet to PC2. What is the Destination IP Address?<br></br><img></img>”

A

192.168.1.20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Ping uses what protocol?

A

ICMP (Internet Control Message Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

This command does a ping, hop by hop, from the source to the destination, and it will often indicate which router along the path has got the problem.

A

Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

The Cisco troubleshooting methodology thatstarts off at the Application Layer then moving down through the layers.

A

Top Down Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

The Cisco troubleshooting methodology thatstarts at the Physical Layer then moving up through the layers.

A

Bottom Up Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

“Router1 has the following Ping results. Which router is the most likely to have a problem?<br></br><img></img>”

A

Router3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What does SVI stand for?

A

Switched Virtual Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

<div>This command configures a descriptive hostname that makes it easier to identify the device.</div>

A

hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

<div>This Cisco proprietaryLayer 2 protocol is used to share information with other directly connected Cisco equipment, such as theoperating systemversion andIP address.</div>

A

Cisco Discovery Protocol(CDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

<div>This is an open standardprotocol which provides similar information to CDP.</div>

A

LLDP (Link Layer Discovery Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What command will you enter to configure the IP address 10.128.254.255 /30 on an interface?

A

ip address 10.128.254.255 255.255.255.252

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

This command is used to configure the default gateway.

A

<div>ip default-gateway</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What command will set the interface to full duplex?

A

duplex full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What command is entered on the interface level to configure a speed of 100 Mbps?

A

speed 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

This command enables auto duplex configuration.

A

duplex auto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

This command shows the entire running configuration on the device.

A

show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

This command shows you the version of IOSthat is running on the device. It will also show additional informationlike how much memory is installed in the device.

A

show version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

CDP stands for?

A

Cisco Discovery Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

To disable CDP at the interface level, this command is used.

A

no cdp enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

<div>This show interface brief command output indicates a Layer 2 issue or speed mismatch.</div>

A

up/down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

<div>IPv6 standards state that addresses assigned to individual hosts should use this mask.</div>

A

/64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

<div>Global Unicast Addresses are assigned from this range.</div>

A

2000::/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

This command enables IPv6 routing.

A

<div>ipv6 unicast-routing</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

<div>These Neighbor Discovery message types are sent to the Solicited-Node multicast address which reaches all hosts on the subnet.</div>

A

NeighborSolicitation messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

<div>It is the IPv6 version of ARP.</div>

A

NeighborDiscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

<div>These IPv6 addresses are similar to IPv4 RFC 1918 private addresses. They are not publicly reachable.</div>

A

Unique Local Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

<div>These IPv6 addresses are valid for communications on that link only.</div>

A

Link local addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What is the host portion of this IPv6 address 2001:100B:00D8:35A3:C004:7B01:09F0:1C01 /64?

A

C004:7B01:09F0:1C01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What is the network potion of this IPv6 address 2001:26CC:0F1D:C001:D330:5AF7:11A2:8000 /64?

A

2001:26CC:0F1D:C001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What is the long format of 2001:F:12::34:0:A3?

A

2001:000F:0012:0000:0000:0034:0000:00A3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

<div>These IPv6 addresses are mandatory on IPv6 enabled interfaces.</div>

A

Link local addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

<div>This is means Unspecified address or Unknown address. Itis also used as the source when an interface is trying to acquire an address.</div>

A

::

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

<div>This provides a virtual tunnel between private networks across a shared public network such as the Internet.</div>

A

Virtual Private Network(VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

<div>This Site-to-Site VPN configuration option is open standard and it does not support multicast.</div>

A

IPsec Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

This is a Cisco proprietary Site-to-Site VPN configuration option, which provides scalable simple hub and spoke style configuration enables direct full mesh connectivity between all offices.

A

DMVPN (Dynamic Multipoint VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

<div>This Site-to-Site IPsec VPN configuration option is Cisco proprietary. It enables scalable centralised policy for VPN over non-public infrastructure.</div>

A

GETVPN (GroupEncrypted TransportVPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

<div>This WAN connectivity option uses a shared core infrastructure at the service provider. It can be used for connectivity to the Internet and/or connectivity between offices over VPN.</div>

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What does the acronym MPLS stand for?

A

Multi Protocol Label Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

“It combines or ‘multiplexes’ multiple optical signals into one optical signal transmitted over a single fiber strand.”

A

DWDM (Dense Wavelength Division Multiplexing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

<div>These routers do not run MPLS but they peer at Layer 3 with the provider PE routers.</div>

A

Customer Edge (CE) routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What does the acronym DSL stand for?

A

<div>Digital Subscriber Line</div>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

<div>These attacks are directed against a particular individual or organisation. Skilled attackers will typically start off with low impact reconnaissance.</div>

A

Targeted Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

<div>It is a derogatory term for low skilled attackers who download and use off-the-shelf hacking software to launch exploits.</div>

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

<div>This type of malware encrypts data with the attacker’s key and asks the victim to pay a ransom to obtain the key.</div>

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

<div>It is a Social Engineering attack where the victim is often directed to enter their personal details into the attacker’s website which looks like the reputable company’s legitimate website.</div>

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

<div>It sits alongside the traffic flow and informs security administrators of any potential concerns.</div>

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

It sits inline with the traffic flow and can also block attacks.

A

Itrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

<div>It transforms readable messages into an unintelligible form and then later reverses the process</div>

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

<div>This type of encryption uses private and public key pairs where in the data encrypted with the public key can only be decrypted with the private key, and vice versa.</div>

A

Asymmetric encryption

176
Q

What does HMAC stand for?

A

Hash-Based Message Authentication Codes

177
Q

<div>This solves the secure key distribution problem and it uses Certificate Authority for the two parties who need secure communication.</div>

A

Public Key Infrastructure (PKI)

178
Q

<div>This is the successor to SSL.</div>

A

Transport Layer Security (TLS)

179
Q

<div>This type of VPN uses symmetric encryption algorithms such to send encrypted traffic between locations over an untrusted network such as the Internet.</div>

A

Site-to-Site VPN

180
Q

<div>It defines the procedures for authenticating and communicating peer creation and management of Security Associations. It typically uses IKE for key exchange.</div>

A

Internet Security Association and Key Management Protocol (ISAKMP)

181
Q

<div>What does ESP stand for?</div>

A

Encapsulating Security Payload

182
Q

This IPsec modeprotects the internal routing information by encrypting the IP header of the original packet.

A

Tunnel mode

183
Q

This IPsec mode encypts only the payload and the ESP trailer, so the IP header of the original packet is not encrypted.

A

Transport mode

184
Q

<div>It buffers any excess traffic so the overall traffic stays within the desired rate limit.</div>

A

TrafficShaping

185
Q

<div>It drops or re-marks excess traffic to enforce the specified rate limit.</div>

A

Traffic Policing

186
Q

<div>Voice and traditional standard definition video packets should have this Latency value to have an acceptable quality call.</div>

A

≤ 150ms

187
Q

<div>This can be experienced whenever packets come in quicker than they can be sent out.</div>

A

Congestion

188
Q

<div>This can reduce latency, jitter and loss for particular traffic by giving each type of traffic the service it requires.</div>

A

QoS Queuing

189
Q

What is the default value of CoS?

A

0

190
Q

What is the maximum recommended Jitter value?

A

30 ms

191
Q

This classification and marking method can recognize traffic based on its own Layer 3 to Layer 7 characteristics.

A

NBAR (Network Based Application Recognition)

192
Q

<div>This gives bandwidth guarantees to specified traffic types.</div>

A

CBWFQ (Class Based Weighted Fair Queuing)

193
Q

This MQC section defines the traffic to take an action on.

A

Class Maps

194
Q

This MQC section takes the action on thedefined the traffic.

A

<div>Policy Maps</div>

195
Q

This MQC sectionapplies the policy map to an interface.

A

Service Policies

196
Q

<div>This type of hypervisor run directly on the system hardware.</div>

A

Type 1 (Bare Metal) Hypervisor

197
Q

This type of hypervisor run on top of a host operating system.

A

Type 2 Hypervisor

198
Q

It is a model for enabling ubiquitous, convenient On-Demand Network access to a shared pool of configurable computing resources.

A

Cloud Computing

199
Q

“This is a server where the operating system is running directly on the hardware. It’s not running a hypervisor.”

A

Bare Metal server

200
Q

The cloud deployment model where the cloud infrastructure is provisioned for open use by the general public.

A

Public Cloud

201
Q

The cloud deployment model where the cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers.

A

Private Cloud

202
Q

The cloud deployment model where the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns.

A

Community Cloud

203
Q

The cloud deployment model where the cloud infrastructure is composed of two or more distinct cloud infrastructures that remain unique entities, bound together by standardized technology.

A

Hybrid Cloud

204
Q

“What type of hypervisor is used below?<br></br><img></img>”

A

Type 1 Hypervisor

205
Q

“What type of hypervisor is used below?<br></br><img></img>”

A

Type 2 Hypervisor

206
Q

<div>The system will load the first IOS image found in here by default.</div>

A

Flash

207
Q

What command is used to copy the running configuration to the TFTP server?

A

copy running-configtftp

208
Q

<div>This Configuration Register value ignores contents of NVRAM (startup-config).</div>

A

0x2142

209
Q

What configuration register value will allow you to boot into ROMMON?

A

<div>0x2120</div>

210
Q

“This command is used to copy the IOS image to the device’s Flash using TFTP.”

A

copy tftpflash

211
Q

<div>You can set where the system will find the IOS image to load using this command.<br></br></div>

A

boot system

212
Q

This memory isused as the normal working memory of the device.

A

RAM

213
Q

What does POST stand for?

A

<div>Power On Self Test</div>

214
Q

<div>This message is generated when something happens on the device, such as an interface going down or an OSPF neighbour adjacency coming up.</div>

A

Syslog Message

215
Q

What Syslog severity level value is Informational?

A

6

216
Q

<div>What is the name for severity level 0?</div>

A

Emergency

217
Q

This is where events are saved in RAM memory on the device.

A

Logging Buffer

218
Q

This command disables logging to the console line.

A

no logging console

219
Q

<div>This command causes a new line to be printed where you were in the command line.</div>

A

logging synchronous

220
Q

<div>What command will you enter to enable debug output to the VTY lines?<br></br>R1#<br></br></div>

A

terminal monitor

221
Q

What does NMS stand for?

A

Network Management System

222
Q

<div>This is the first SNMP version. It uses plain text authentication between the Manager and Agent using matching Community strings.</div>

A

SNMPv1

223
Q

<div>This SNMP version uses plain text Community strings and itsupports bulk retrieval.</div>

A

SNMPv2c

224
Q

<div>This SNMP version supports strong authentication and encryption with the use of usernames and passwords.</div>

A

SNMPv3

225
Q

This SNMPv3 security level uses password authentication. Communications between the agent and the server are also encrypted.

A

AuthPriv

226
Q

<div>This SNMPv3 security level uses password authentication, but no encryption is used for communications between the devices.</div>

A

AuthNoPriv

227
Q

This SNMPv3 view is used to send notifications to members of the group.

A

Notify view

228
Q

In this SNMPv3 security level, no authentication password is exchanged and the communications between the agent and the server are not encrypted.

A

noAuthnoPriv

229
Q

This specifies what a particular user is allowed to do, such as whether they are allowed to run a particular command or not.

A

Authorization

230
Q

This keeps track of the options that a user has carried out.This can be used as an audit trail to check what commands an administrator entered.

A

Accounting

231
Q

<div>This verifies somebody is who they say they are and it is most commonly achieved with a username and password.</div>

A

Authentication

232
Q

<div>These lines are used for both Telnet and SSH connections.</div>

A

VTYlines

233
Q

This is the command to generate a digital certificate.

A

crypto key generate rsa

234
Q

<div>How many privilege levels of admin access are available on a Cisco router or switch?</div>

A

16

235
Q

<div>This privilege level access allows only five commands—logout, enable, disable, help, and exit.</div>

A

Zero (level 0)

236
Q

<div>This privilege level provides complete control over the router. When you enter Privileged Exec Mode with the ‘enable’ command, you’re at this level by default.</div>

A

Privileged (level 15)

237
Q

<div>This privilege level provides very limited read-only access to the router. When you enter User Exec Mode you’re at this levelby default.</div>

A

User (level 1)

238
Q

This command configures a password that can be viewed in plain text in the running configuration by default.

A

enable password

239
Q

<div>This command encrypts all passwords in the running configuration</div>

A

service password-encryption

240
Q

<div>You entered the following command:<br></br>R1(config-line)#exec-timeout 15 30<br></br>How long can the administrator stay inactive before getting logged out?</div>

A

15 minutes 30 seconds

241
Q

“You are tasked to enter an encrypted password of ‘FlackboxPass0!’ for the Privileged Exec mode access. What command will you enter?<br></br>R1(config)#”

A

enable secret FlackboxPass0!

242
Q

What command is used to configure a login banner?

A

banner login

243
Q

What does NTP stand for?

A

Network Time Protocol

244
Q

<div>This command configures a router to become an NTP server.</div>

A

ntp master

245
Q

This wireless network type have devices that are within 10 meters of each other and bluetooth is often used.

A

<div>Wireless Personal Area Network (WPAN)</div>

246
Q

<div>It allows devices to be connected to an Access Point and also be part of a peer-to-peer wireless network.</div>

A

WiFi Direct

247
Q

<div>This wireless network type provides access to a campus network, without the need for a cable. The devices are within 100m of a Wireless Access Point.</div>

A

Wireless Local Area Network (WLAN)

248
Q

Using this WLAN network, two or more wireless stations communicate directly with each other.

A

Ad Hoc Network

249
Q

This device provides connectivity between wireless stations and between the wireless and wired networks.

A

Wireless Access Point

250
Q

This is a wireless coverage area of an Access Point. Itis also known as a wireless cell.

A

Basic Service Area (BSA)

251
Q

This is a unique identifier that names a wireless network (WLAN).

A

Service Set Identifier (SSID)

252
Q

With this, Lighweight Access Points can discover the Wireless LAN Controller and then download their configurations from there.

A

Zero Touch Provisioning (ZTP)

253
Q

<div>This protocol is a standardized protocol that enables a Wireless LAN Controller to manage a collection of Wireless Access Points.</div>

A

Control And Provisioning of Wireless Access Points (CAPWAP)

254
Q

What does CAPWAP stand for?

A

Control And Provisioning of Wireless Access Points

255
Q

Thiswireless security standard came out in 2018. It supports AES encryption, CCMP, and protection against KRACK attack.

A

WPA3

256
Q

<div>It is a version control system for tracking changes in source code and files.</div>

A

Git

257
Q

<div>It is a set of operating principles and practices that enable application development teams to deliver code changes more frequently and reliably.</div>

A

CI/CD

258
Q

<div>It is the process of converting structured data to a standardized format that allows sharing or storage of the data in a form that allows recovery of its original structure.</div>

A

Data Serialization

259
Q

This JSON data typeis an unordered collection of key/value pairs which are surrounded by curly braces {}.

A

Object

260
Q

This JSON data typeis an ordered list of values which are surrounded by square brackets [].

A

Array

261
Q

<div>This markup language was standardized in 1998 and it was designed to describe and transfer data.</div>

A

eXtensible Markup Language (XML)

262
Q

<div>It is a standard communication protocol system that permits processes using different operating systems like Linux and Windows to communicate.</div>

A

Simple Object Access Protocol (SOAP)

263
Q

<div>It is an architecture that gives guidelines for the structure and organization of an API. It also supports any transport and data format.</div>

A

Representational State Transfer

264
Q

“This REST response code means ‘Internal Server Error’.”

A

500

265
Q

What does SOAP stand for?

A

Simple Object Access Protocol

266
Q

“The ‘C’ in CRUD stands for what operation?”

A

Create

267
Q

<div>It is the router/switch plane that makes decisions about how to forward traffic. Its packets are destined to or locally originated on the device itself.</div>

A

Control Plane

268
Q

<div>The device is configured and monitored in this router/switch plane. For example at the CLI through Telnet or SSH, via a GUI using HTTPS, or via SNMP or an API.</div>

A

Management Plane

269
Q

What does APIC stand for?

A

Application Policy Infrastructure Controller

270
Q

<div>It is the main component of the Cisco ACI solution and it is designed to manage data center environments with Nexus switches.</div>

A

<div>APIC (Application Policy Infrastructure Controller)</div>

271
Q

<div>It is a Cisco SDN controller which is designed to manage enterprise environments – campus, branch and WAN.</div>

A

DNACenter

272
Q

<div>This transforms a traditional manual network into a controller led network that translates the business needs into policies that can be automated and applied consistently across the network.</div>

A

Intent Based Networking (IBN)

273
Q

<div>This SD-Access network is the underlying physical network. It provides the underlying physical connections which the overlay network is built on top of.</div>

A

Underlay network

274
Q

<div>This SD-Access network is a logical topology used to virtually connect devices. It is built over the physical underlay network.</div>

A

Overlay network

275
Q

<div>This was implemented as a temporary workaround to mitigate the lack of IPv4 addresses until organisations had time to migrate to IPv6.</div>

A

<div>NAT (Network Address Translation)</div>

276
Q

<div>This NAT type offers permanent one-to-one mapping usually between a public and private IP address. It is used for servers which must accept incoming connections.</div>

A

Static NAT

277
Q

<div>This NAT type uses a pool of public addresses which are given out on an as needed first come first served basis.</div>

A

Dynamic NAT

278
Q

<div>The NAT type that allows the same IP address to be reused.</div>

A

PAT (Port Address Translation)

279
Q

<div>This command is used to remove all dynamic translations from the translation table.</div>

A

clear ip nat translation *

280
Q

<div>It is the IP address actually configured on the inside host’s Operating System.</div>

A

InsideLocal Address

281
Q

<div>The NAT’d address of the inside host as it will be reached by the outside network.</div>

A

Inside GlobalAddress

282
Q

<div>The IP address of the outside host as it appears to the inside network.</div>

A

OutsideLocal Address

283
Q

<div>It is the IP address assigned to the host on the outside network by the host’s owner.</div>

A

Outside Global Address

284
Q

“You are tasked to create a NAT pool named ‘FlackboxNAT’ with global address range of 100.1.2.3 to 100.1.2.10 and a subnet mask of /27. What commands will you enter?<br></br>R1(config)# ?”

A

ip nat pool FlackboxNAT 100.1.2.3 100.1.2.10 netmask 255.255.255.224

285
Q

This keyword will allow multiple hosts to reuse the top address in the pool.

A

overload

286
Q

“In the topology below, which Router interface will be configured with ‘ip nat inside’?<br></br><img></img>”

A

interface G0/2

287
Q

“In the topology below, which Router interface will be configured with ‘ip nat outside’?<br></br><img></img>”

A

interface G0/1

288
Q

This show command shows the Inside Global, Inside Local, Outside Local, and Outside Global address translations.

A

show ip nat translation

289
Q

This show command willoutput how many addresses have been translated by NAT.

A

show ip nat statistics

290
Q

This RIP version does not send subnet mask information with routing updates, so VLSM is not supported.

A

RIPv1

291
Q

Which RIP version supports VLSM?

A

RIPv2

292
Q

What does EIGRP stand for?

A

Enhanced Interior Gateway Routing Protocol

293
Q

<div>This routing protocol can be configured to perform unequal cost load balancing.</div>

A

EIGRP

294
Q

“<div>What does ‘20’ signify in the command below?<br></br>Router(config)#router eigrp 20</div>”

A

Autonomous System (AS)

295
Q

What is the wildcard mask of /21?

A

0.0.7.255

296
Q

“<div>What command will you enter to manually configure a router’s EIGRP Router ID of 10.10.10.1?<br></br>R1(config-router)# ?</div>”

A

eigrprouter-id 10.10.10.1

297
Q

RIPv2 updates are sent using what multicast address?

A

224.0.0.9

298
Q

What command is used to disable automatic summarization?

A

no auto-summary

299
Q

If the Loopback address and the Router ID are not configured on the router, EIGRP will use this as the Router ID instead.

A

Highest other IP address

300
Q

This show command is used to check EIGRP neighbor adjacency.

A

show ip eigrp neighbors

301
Q

This RIP version supports authentication.

A

RIPv2

302
Q

Which version of RIP does not support authentication?

A

RIPv1

303
Q

What is 255.192.0.0 in wildcard mask?

A

0.63.255.255

304
Q

What is the default Administrative Distance of RIP?

A

120

305
Q

<div>OSPF routers use these advertisements to pass on routing updates.</div>

A

Link State Advertisements (LSA)

306
Q

<div>Adjacent OSPF routers will tell each other the networks they know about using this packet.</div>

A

DataBase Description (DBD)

307
Q

What OSPF packet type is sent to the neighbor ifa router is missing information about any of the networks in the received DBD?

A

Link State Request (LSR)

308
Q

What OSPF packet contains a list of LSA’s which should be updated?

A

Link State Update (LSU)

309
Q

What does 10 signify in the command below?<br></br><div>Router(config)#router ospf 10</div>

A

Process ID

310
Q

<div>Serial interfaces transmit at what rate by default?</div>

A

1.544 Mbps

311
Q

What command will you enter to manually specify a OSPF cost value of 15?<br></br>R1(config-if)# ?

A

ip ospf cost 15

312
Q

<div>It is how long a router waits to hear from a neighbor before declaring it out of service. The default is 4x the Hello Interval.</div>

A

Dead Interval

313
Q

This is how often a router sends Hello packets. The default is 10 secs.

A

Hello Interval

314
Q

<div>Routers which have all their OSPF interfaces in this area are Backbone Routers.</div>

A

Area 0

315
Q

<div>These are routers which have interfaces in multiple areas.</div>

A

Area Border Routers (ABRs)

316
Q

<div>What is the OSPF router type that redistribute into OSPF?</div>

A

Autonomous System Boundary Router (ASBR)

317
Q

<div>The Designated Router multicasts the update to this address (‘all OSPF routers’).</div>

A

224.0.0.5

318
Q

<div>It consists of directly connected networks and routes configured statically by the administrator or dynamically learned through a routing protocol.</div>

A

Routing Table

319
Q

“What type of route is shown below?<br></br><br></br><div style="">Router1#show ip route</div><div style="">C 10.10.10.0/24 is directly connected, GigabitEthernet0/0/0</div>”

A

Connected Route

320
Q

“What type of route is shown below?<br></br><br></br><div style="">Router1#show ip route</div><div><div style="">L 10.10.20.1/32 is directly connected, GigabitEthernet0/0/1</div></div>”

A

Local Route

321
Q

Which of the following has the longest prefix match?<br></br>192.168.10.0/24<br></br>192.168.10.0/28<br></br>192.168.0.0/16

A

192.168.20.0/28

322
Q

“This is a route going out to everywhere else that we haven’t specifically had a route for elsewhere.”

A

Default Route

323
Q

This route is a catch-all for any traffic that does not match one of our more specific routes.

A

Default Route

324
Q

What is the show command used to view the routing table on a router?

A

show ip route

325
Q

“What is the IP address of Router1’s interface that is connected to Router2?<br></br><img></img><br></br><img></img>”

A

10.10.20.1

326
Q

You are asked to configure a static route going to 172.16.0.0/16 with the next hop address of 172.17.1.1. What command will you enter?<br></br><div>Router(config)# ?</div>

A

<div>ip route 172.16.0.0 255.255.0.0 172.17.1.1</div>

327
Q

<div>What is the metric of RIP?</div>

A

Hop Count

328
Q

<div>This is a measure of how trusted the routing protocol is.</div>

A

Administrative Distance

329
Q

Which route is most preferred?<br></br>192.168.1.0/24 OSPF route<br></br>192.168.1.0/28 RIP route<br></br>192.168.0.0/16 Static route

A

192.168.1.0/28 RIP route

330
Q

Which of the following routes is the most preferred?<br></br>10.10.1.0/24 RIP route<br></br>10.10.1.0/24 EIGRP route<br></br>10.10.1.0/24 OSPF route

A

10.10.1.0/24 EIGRP route

331
Q

<div>These interfaces allow you to include an IP subnet in the routing protocol without sending updates out of the interface.</div>

A

Passive interfaces

332
Q

“RIP is enabled in the routers in the network. Which is the preferred path from R1 to reach R5? R1>R6>R7>R5 or R1>R2>R3>R4>R5?<br></br><img></img>”

A

R1>R6>R7>R5

333
Q

“OSPF is enabled in the routers in the network. Which is the preferred path from R1 to reach R5? R1>R6>R7>R5 or R1>R2>R3>R4>R5?<br></br><img></img>”

A

R1>R2>R3>R4>R5

334
Q

This groups multiple physical interfaces into a single logical interface.

A

Etherchannel

335
Q

<div>This combines multiple physical network cards into a single logical interface.</div>

A

NIC Teaming

336
Q

What does VSS stand for?

A

Virtual Switching System

337
Q

What does vPC stand for?

A

Virtual Port Channel

338
Q

<div>What is the recommended oversubscription is for the distribution to core layer links?</div>

A

4:1

339
Q

What does PAgP stand for?

A

Port Aggregation Protocol

340
Q

This EtherChannel protocol is Cisco proprietary.

A

Port Aggregation Protocol (PAgP)

341
Q

This EtherChannel protocol is open standard.

A

<div>Link Aggregation Control Protocol (LACP)</div>

342
Q

<div>With this EtherChannel configuration, the switches do not negotiate creation and maintenance. The settings must still match on both sides.</div>

A

Static EtherChannel

343
Q

What command will you enter if you are asked to create an LACP port channel 10 in Active mode?<br></br>Switch(config-if-range)# ?

A

channel-group 10 mode active

344
Q

What command will you enter if you are asked to create a PAgP port channel 5 in Desirable mode?<br></br>Switch(config-if-range)# ?

A

channel-group 5 mode desirable

345
Q

<div>ACLs are applied at the interface level with this command.</div>

A

access-group

346
Q

<div>This is the default wildcard mask for a Standard ACL. It means individual host address.</div>

A

0.0.0.0

347
Q

What commands will you enter to confugure a standard ACL with an access-list number of 10 andto allow traffic from 192.168.10.0/24?<br></br>Router(config)# ?

A

<div>access-list 10 permit 192.168.10.0 0.0.0.255</div>

348
Q

What commands are entered to configure a Standard ACL with access list number of 1 and will allow all traffic?<br></br>Router(config)# ?

A

access-list 1 permit any

349
Q

“What command will you enter to configure an extended ACL for ‘FlackboxACL’?<br></br><div>Router(config)# ?</div>”

A

<div>ip access-list extended FlackboxACL</div>

350
Q

What keyword is used in the ACL command to match packets on a given port number?

A

eq

351
Q

What keyword is used in the ACL command to match packets in the specified range of port numbers?

A

range

352
Q

<div>This ACL keyword is used to log to the console or an external monitoring server.</div>

A

log

353
Q

What command will you enter to enable DHCP snooping on VLAN 20?<br></br>Switch(config)# ?

A

ip dhcp snooping vlan 20

354
Q

With DHCP snooping, what command will you enter to make an interface a trusted port?<br></br>Switch(config-if)# ?

A

ip dhcp snooping trust

355
Q

This access layer switch security mechanism can prevent attacks from rogue DHCP servers by droppingDHCP server traffic that comes in a port that is not trusted.

A

DHCP snooping

356
Q

What does DAI stand for?

A

Dynamic ARP Inspection

357
Q

It is an ARP update which is not in response to an actual request.

A

Gratuitous ARP

358
Q

What command will you enter to enable DAI on VLAN 100?<br></br>Switch(config)# ?

A

ip arp inspection vlan 100

359
Q

“It is used to authenticate users on the network. They don’t get access to the network at all until they put in a valid username and password which is checked by theauthentication server.”

A

802.1x

360
Q

<div>This enables an administrator to specify which MAC address or addresses can send traffic in to an individual switch port.</div>

A

Port Security

361
Q

This show command is used to verify the port security addresses.

A

show port-security address

362
Q

This port security violation action places the interfaces into error-disabled state, blocking all traffic.

A

Shutdown

363
Q

<div>With this port security violation action, the traffic from unauthorised address is dropped, logged and the violation counter is incremented.</div>

A

Restrict

364
Q

What command will you enter to set the maximum number of MAC address allowed to send traffic into the interface to 5?<br></br>Switch(config-if)# ?

A

<div>switchport port-security maximum 5</div>

365
Q

What does FHRP stand for?

A

First Hop Redundancy Protocol

366
Q

<div>This FHRP protocol is Cisco proprietary. It is deployed in active/standby pair.</div>

A

Hot Standby RouterProtocol(HSRP)

367
Q

This FHRP protocol is open standard. It is deployed in active/standby pair.

A

Virtual Router Redundancy Protocol (VRRP)

368
Q

<div>What does GLBP stand for?</div>

A

Gateway Load Balancing Protocol

369
Q

This show command will show what the virtual IP address is, the state, and the virtual MAC address.

A

show standby

370
Q

<div>With FHRP, the hosts will use this as their default gateway address.</div>

A

Virtual IP address

371
Q

What command will you enter to configure a VIP of 172.16.1.1 with HSRP group number 1.<br></br>Router(config-if)# ?

A

standby 1 ip 172.16.1.1

372
Q

What is the default HSRP priority value?

A

100

373
Q

What command is entered to configure a priority of 50 on HSRP group 10?<br></br>Router(config-if)# ?

A

<div>standby 10 priority 50</div>

374
Q

What command is entered to enable pre-emption on HSRP group 10?<br></br>Router(config-if)# ?

A

standby 10 preempt

375
Q

<div>It is a client/server protocol that automatically provides a host with its IP address and other related configuration information such as the subnet mask and default gateway.</div>

A

Dynamic Host Configuration Protocol (DHCP)

376
Q

<div>This is used to forward initial DHCP messages and it eliminates the need for a DHCP server on every subnet.</div>

A

DHCP relay agent

377
Q

What show command is used to get information about the DHCP lease?

A

show dhcp lease

378
Q

What command is entered to make a Cisco router a DHCP client?<br></br>Router(config-if)# ?

A

ip address dhcp

379
Q

What command is entered so that the router interface will be able to forward DHCP requests to the external DHCP server at 172.100.10.1?<br></br>Router(config-if)# ?

A

ip helper-address 172.100.10.1

380
Q

DHCP requests are what type of messages?

A

Broadcast messages

381
Q

“You are tasked to create a DCHP pool named ‘Flackbox’, what commands will you enter?<br></br>Router(config)# ?”

A

ip dhcp pool Flackbox

382
Q

To see the addresses that were given out by the DHCP server and who they were given out to, this show command is used.

A

show ip dhcp binding

383
Q

The DHCP server has an IP address of 172.16.1.1. What command will you enter to tell the DHCP clients where their default gateway is?<br></br>Router(dhcp-config)# ?

A

default-router 100.10.1.1

384
Q

The DNS server is at 172.16.2.1, what command is entered to tell the DCHP clients where the DNS server is?<br></br><div>Router(dhcp-config)# ?</div>

A

dns-server 172.16.2.1

385
Q

The DHCP server is to allocate IP addresses from the 172.16.1.0/24 network. What command should be entered?<br></br>Router(dhcp-config)# ?

A

<div>network 172.16.1.0 255.255.255.0</div>

386
Q

<div>This VTP mode does not participate in the VTP domain. It does not advertise or learn VLAN information but will pass it on.</div>

A

VTP Transparent

387
Q

“<div>This VTP mode will synchronise its VLAN database from the Server with the highest revision number. It can’t add, edit or delete VLANs.</div>”

A

VTPClient

388
Q

What protocol allows you to add, edit or delete VLANs on switches configured as VTP Servers?

A

VLAN Trunking Protocol (VTP)

389
Q

What command is entered when configuring a switch as a VTP server?<br></br>Switch(config)# ?

A

<div>vtp mode server</div>

390
Q

“What command is entered to configure a VTP domain with a name ‘Flackbox’?<br></br>Switch(config)# ?”

A

<div>vtp domain Flackbox</div>

391
Q

What does DTP stand for?

A

Dynamic Trunking Protocol

392
Q

What is the configuration to disable DTP?<br></br><div>Switch(config-if)#</div>

A

switchport nonegotiate

393
Q

<div>This command will form a trunk if the neighbour switch port is set to trunk or desirable.<br></br>Switch(config-if)# ?</div>

A

switchportmode dynamic auto

394
Q

<div>Using this command will form a trunk if the neighbour switch port is set to trunk, desirable or auto.<br></br>Switch(config-if)# ?</div>

A

switchportmode dynamic desirable

395
Q

<div>What is the default Native VLAN?</div>

A

VLAN 1

396
Q

All ports are in this VLAN by default.

A

VLAN 1

397
Q

<div>The Distribution and Core layer functions are performed on the same hardware device.</div>

A

Collapsed Distribution and Core

398
Q

“This is the preferred design when there’s a lot more traffic going in East and West bound direction, meaning, between the actual servers themselves in the data center.”

A

Spine-Leaf Data Center Design

399
Q

This design is more suitable for North-South bound traffic.

A

Traditional Campus Design

400
Q

These ports carry traffic for multiple VLANs.

A

Trunk ports

401
Q

What command will you enter to allow VLANs 50 and 120 only on the trunk port?<br></br>Switch(config-if)# ?

A

switchport trunk allowed vlan 50,120

402
Q

What command is used to configure an interface as an access port?<br></br>Switch(config-if)# ?

A

switchport mode access

403
Q

<div>What is the default Bridge Priority value?</div>

A

32768

404
Q

<div>What is the port on the neighbour switch opposite the Root Port?</div>

A

Designated Port

405
Q

<div>These are the ports which have not been selected as a Root Port or Designated Port pair and would potentially form a loop.</div>

A

Blocking Ports

406
Q

<div>It prevents Layer 2 loops by detecting potential loops and blocking ports to prevent them</div>

A

Spanning Tree Protocol

407
Q

<div>This STP version is the original Spanning Tree implementation. It uses one Spanning Tree for all VLANs in the LAN.</div>

A

802.1DSpanning Tree Protocol (STP)

408
Q

What is the STP version that enablesgrouping and mappingVLANsinto different spanning treeinstances for load balancing?

A

<div>802.1s Multiple Spanning Tree Protocol (MSTP)</div>

409
Q

“<div>It is Cisco’s enhancement to 802.1D. This is the default on Cisco switches.</div>”

A

Per VLAN Spanning Tree Plus (PVST+)

410
Q

“<div>This is Cisco’s enhancement to 802.1w RSTP. It significantly improved convergence time over PVST+.</div>”

A

Rapid Per VLAN Spanning Tree Plus (RPVST+)

411
Q

<div>This prevents an unintended switch from becoming the root bridge.</div>

A

<div>Root Guard</div>

412
Q

What command will set all ports to Portfast by default?<br></br><div>Switch(config)# ?</div>

A

spanning-treeportfastdefault

413
Q

What command will enable BPDU Guard on an interface?<br></br>Switch(config-if)#?

A

<div>spanning-tree bpduguard enable</div>

414
Q

To configure Root Guard on an interface, what command is used?<br></br>Switch(config-if)# ?

A

spanning-tree guard root

415
Q

What command will you enter on a switch for it to become the Root Bridge for VLAN 10?<br></br><div>Switch(config)# ?</div>

A

spanning-tree vlan 10 root primary

416
Q

“The Bridge Priority is not configured. What switch will be elected as the Root Bridge?<br></br><img></img>”

A

Switch 1

417
Q

“What port state is Switch5 F0/1 interface?<br></br><img></img>”

A

Root Port

418
Q

With this Inter-VLAN connectivity option, the traffic being routed has to go up and down the same physical Ethernet cable to the router.

A

Router on a Stick

419
Q

With this Inter-VLAN connectivity option, the traffic being routed within the campus is routed across the switch backplane.

A

Layer 3 Switch Inter-VLAN Routing

420
Q

What command will allow you to create a sub-interface with a number of 15on Fast Ethernet 0/5?<br></br>Router(config)# ?

A

<div>interface FastEthernet 0/5.15</div>

421
Q

“<div>What is the number ‘3’ in the command ‘interface GigEthernet 0/0/1.3’?</div>”

A

sub-interface number

422
Q

<div>This command enables IP routing on a Layer 3 switch.<br></br>Switch(config)# ?</div>

A

ip routing

423
Q

This command allows a Layer 3 switch physical interface to act like a router port.<br></br>Switch(config-if)# ?

A

no switchport

424
Q

“Router2 pings PC2. What will be the source IP address of the ICMP echo request?<img></img>”

A

10.10.3.1

425
Q

“What does ‘U’ in ping results mean?”

A

Unreachable

426
Q

The ping will have this result if the router discards the packet.

A

U (Unreachable)

427
Q

It will go through a wizard that will ask you the options you want to set for the ping.

A

Extended Ping

428
Q

What does MTU stand for?

A

Maximum Transmission Unit

429
Q

What is the default ping timeout?

A

2 seconds

430
Q

“This command is similar with ping and it traces the path the traffic is taking when it’s going across the network.”

A

Traceroute

431
Q

What protocol is used by traceroute?

A

ICMP

432
Q

This is used as a route loop prevention mechanism. Every time that a router passes a packet on from one interface to another, it decrements by one.

A

TTL (Time to Live)

433
Q

What is the shortened IPv6 version of 1000:00B8:0000:000F:0050:0000:0000:B001?

A

1000:B8:0:F:50::B001

434
Q

This is the IPv6 equivalent of 0.0.0.0 0.0.0.0 (default route)in IPv4.

A

::/0

435
Q

Link local addresses are assigned from this range.

A

FE80::/10 – FEB0::/10