ICND1 - Study Guide 2 Flashcards

1
Q

What enables multiple VLANs to be routed on a single interface?

a. Router on a Stick
b. Multiple interfaces
c. VLAN Trunking Protocol
d. DTP

A

a. Router on a Stick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which routing protocol has an administrative distance of 90 and uses a code of D?

a. OSPF
b. EIGRP
c. DUAL
d. DGP
e. RIP

A

b. EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A switch has 24 ports and 2 VLANs how many Collision and Broadcast domains are there? (Collison/Broadcast)

a. 24, 1
b. 2, 24
c. 2, 2
d. 24, 24
e. 24, 2

A

e. 24, 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which feature prevents routing protocols from sending HELLO packets?

a. Default-information originate
b. Shutdown
c. Passive-Interface
d. EIGRP AS 1

A

c. Passive-Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With router on a stick configured, which of the following is true?

a. Router on a stick uses subinterfaces for each VLAN in the same subnet
b. Router on a stick uses subinterfaces for each subnet on the same VLAN
c. Router on a stick uses subinterfaces for each VLAN on a different subnet
d. Router on a stick uses subinterfaces for different subnets on the same VLAN

A

c. Router on a stick uses subinterfaces for each VLAN on a different subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In 6to4 tunneling, both endpoints must support IPv4 and IPv6.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a router prepares to send a packet after it has checked the routing table, what portion of the packet is replaced?

a. Transport header port numbers
b. IP header source and destination addresses
c. Data-link source and destination addresses
d. Nothing is changed to preserve routing information

A

c. Data-link source and destination addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network topology has a central point of failure?

a. Star
b. Hub
c. Bus
d. Ring
e. Mesh

A

a. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The native VLAN is:

a. Disabled by default
b. Tagged by default
c. Vlan 0
d. Untagged by default

A

d. Untagged by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Before setting up a FTP connection to a remote server across the internet, what must first happen?

a. A UDP connection established between the endpoint and the router
b. A TCP connection established between the endpoint and the FTP server
c. A UDP connection established between the endpoint and the FTP server
d. A TCP connection established between the endpoint and the router

A

b. A TCP connection established between the endpoint and the FTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user is on the local company network and is experiencing sporadic network connectivity issues, what is a possible reason?

a. Multicast storms
b. Access Control List misconfiguration
c. Broadcast storms
d. Layer 1 cable issues

A

c. Broadcast storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the exec-timeout 10 command do?

a. Set the timeout to 10 seconds
b. Set the timeout to 10 minutes
c. Set the timeout to not occur after 10 seconds
d. Set the timeout to not occur after 10 minutes

A

b. Set the timeout to 10 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What makes a layer 2 switch different from a hub?

a. It decreases collision domains
b. It separates devices
c. It increases collision domains
d. It decreases broadcast domains
e. It increases broadcast domains

A

c. It increases collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A 192.168.0.0 /28 address is being used for a network, which of the following IP addresses are usable within the same subnet? (CHOOSE 2)

a. 192.168.0.77
b. 192.168.0.15
c. 192.168.0. 32
d. 192.168.0.65
e. 192.168.0.7
f. 192.168.0.0

A

a. 192.168.0.77

d. 192.168.0.65

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called when we permit one public IP address to handle many private IP addresses?

a. Static NAT
b. Nat Pool
c. Dynamic Nat
d. Overload

A

d. Overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Of the following, which routing protocol has the lowest AD?

a. RIP
b. EIGRP
c. iBGP
d. eBGP
e. OSPF
f. ISIS

A

d. eBGP

17
Q

Which of the following routing protocols uses only bandwidth as its metric?

a. RIP
b. EIGRP
c. OSPF
d. Static
e. BGP

A

c. OSPF

18
Q

What is CSMA/CD? (CHOOSE 2)

a. The process of CSMA detecting if the line is in use, and if it is, letting others transmit.
b. The process of CSMA detecting if the line is in use and if it is, stopping devices from transmitting.
c. The process of ensuring all devices run an identical timer before checking the line to transmit if a collision has occurred previously.
d. The process of ensuring all devices run a random timer before checking the line to transmit if a collision had occurred previously.

A

b. The process of CSMA detecting if the line is in use and if it is, stopping devices from transmitting.
d. The process of ensuring all devices run a random timer before checking the line to transmit if a collision had occurred previously.

19
Q

If a category 6a cable is being used and is ran across a field measuring 145 meters, what possible issues could occur?

a. Early collisions
b. Runts
c. Giants
d. Input errors
e. Late Collisions

A

e. Late Collisions

20
Q

What is the best way to separate two departments in an organization when they are on a network that has too many hosts?

a. Implement another switch with VLANs so that they can communicate and increase broadcasts.
b. Implement VLANs with a router so that they can communicate and increase the broadcast domain count.
c. Implement a router with VLANs so they can communicate and decrease broadcast domains.
d. Implement a switch so that they can communicate but be on different switches to prevent broadcasts.

A

b. Implement VLANs with a router so that they can communicate and increase the broadcast domain count.

21
Q

Which VLANs are not able to be used and are considered reserved? (CHOOSE 2)

a. 1
b. 10
c. 0
d. 4000
e. 1001
f. 1003
g. 4095

A

c. 0

g. 4095

22
Q

What is it called when devices use a group of NAT IP addresses for communication?

a. Static
b. Dynamic
c. Pool
d. Overload

A

c. Pool

23
Q

What device can have two radios that transmit on 2.4Ghz and 5 Ghz?

a. Wireless LAN controller
b. Antenna
c. Access Point
d. Parabolic Dish

A

c. Access Point

24
Q

What is used when a router chooses the best route and inserts it into the routing table?

a. Netmask
b. Prefix
c. Next Hop
d. Interface

A

b. Prefix

25
Q

When would it be a good idea to use static routing instead of a routing protocol? (CHOOSE 2)

a. When traversing a high bandwidth link
b. When traversing a link from an isolated remote office
c. When traversing a link with low bandwidth
d. When traversing a link with multiple endpoints

A

b. When traversing a link from an isolated remote office

c. When traversing a link with low bandwidth

26
Q

When looking at a routing table and examining the next hop, what is identified?

a. The IP address of the interface of the next hop
b. The prefix of the next hop
c. The interface of the next hop router
d. The metric of the interface of the next hop
e. The metric of the next hop

A

a. The IP address of the interface of the next hop

27
Q

What address permits a device to contact other devices on other subnets with just one address?

a. Unicast
b. Broadcast
c. Anycast
d. Multicast

A

d. Multicast

28
Q

When configuring DHCP locally, the subinterface on a router needs to be in the same subnet in order for the devices to use the DHCP pool.

a. True
b. False

A

a. True

29
Q

A network director wants all MAC addresses on a switch to be learned dynamically and have those MAC addresses recorded to the running configuration, what port security setting must be used?

a. Port-security mode restrict
b. Port-security static MAC
c. Port-security mode protect
d. Port-security dynamic
e. Port-security mode shutdown
f. Port-security sticky MAC

A

f. Port-security sticky MAC

30
Q

What must be enabled on a Cisco switch so that Cisco phones may function?

a. STP
b. VTP
c. DTP
d. NTP
e. CDP
f. LT2P

A

e. CDP

31
Q

How would you configure a administrative distance for a static route other than the default?

a. Ip route 10.0.0.0 255.255.255.0 s0/0/0
b. Ip route 10.0.0.0 255.255.255.0 s0/0/0 1
c. Ip route 10.0.0.0 255.255.255.0 172.16.2.1 10
d. Ip route 10.0.0.0 255.255.255.0 172.16.2.1 AD 10
e. Ip route 10.0.0.0 255.255.255.255 172.16.2.1

A

c. Ip route 10.0.0.0 255.255.255.0 172.16.2.1 10

32
Q

CEF can be disabled by:

a. Using the ip route-cache command
b. Using the no CEF command
c. Using IPv6 disables CEF
d. Using tunnels disabled CEF

A

a. Using the ip route-cache command