ICND1v3 New Questions - Things I Don't Know Flashcards
What is the maximum size of an Ethernet frame that uses 802.1Q tagging?
A. 1514 bytes
B. 128 bytes
C. 68 bytes
D. 1522 bytes
D
What is the purpose of a standard access list?
A. to filter traffic based on destination address
B. to deny traffic
C. to filter traffic based on source address
C
Which forwarding technology stores destination addresses in the cache?
A. MPLS
B. Cisco express forwarding
C. Process switching
D. Fast switching
B
A router receives identical prefixes from OSPF, EIGRP, RIP and the same route is configured statically. Which route does the router use to forward traffic?
A. Static route
B. RIP route
C. EIGRP route
D. OSPF route
A
Which syslog severity level logs informational messages?
A. 2
B. 6
C. 4
D. 0
B
Which option describes a standard role that a firewall plays in an enterprise network?
A. It can permit unauthorized packets to pass to less secure segments of the network
B. It can decide which packets can traverse from a less secure segment of the network to a more secure
C. It can forward packets based on rules that are predetermined by IEEE standards
D. It can deny all packets from entering an administrative domain.
B
What is the binary of the IPv6 multicast address
Answer: 11111111
Explanation
IPv6 multicast addresses are distinguished from unicast addresses by the value of the high-order octet of the addresses: a value of 0xFF (binary 11111111) identifies an address as a multicast address; any other value identifies an address as a unicast address
What is the lowest AD (IS-IS, IBGP, EIGRP, RIPv2 or OSPF)?
Answer: EIGRP
Explanation: Direct Connect 0 Static 1 EIGRP 90 EIGRP Sum. Route 5 OSPF 110 RIP 120 IS-IS 115 Internal BGP 120
Which statement describes the dynamic route correctly?
A. more secure than static
B. high scaling for large network
C. easier to configure than static route
D. build for small network
B
What would the router use as metrics when having different routing protocol in the routing table
A. Prefix length
Which of the following command can be use to access all the files in a system?
A. syslog
B. IFS
C. ping
D. NTP
B
A host is attempting to communicate with a server from an application layer. The connection has failed, what would be the first layer to start from the troubleshooting standpoint?
A. network
B. Application
C. physical
D. session
C
Which destination IP address can a host use to send one message to multiple devices across …?
A. 239.255.0.1
B. 172.20.1.0
C. 192.168.0.119
D. 127.0.0.1
Answer: A (multicast address)
Which value is of primary importance when a router populates its routing table for unique routes?
A. Administrative distance
B. Prefix length
C. Network address
D. Metric
A
Explanation
Making a forwarding decision actually consists of three sets of processes: the routing protocols, the routing table, and the actual process which makes a forwarding decision and switches packets. The longest prefix match always wins among the routes actually installed in the routing table, while the routing protocol with the lowest administrative distance always wins when installing routes into the routing table.
Which IPv6 address type is a public address?
A. Global unicast
B. Multicast
C. Link local
D. Unique-local
A
Which statement is true about port-security violations is true?
A. When a violation occurs on a switch port in restrict mode, the switch port continues to accept traffic from unknown MAC address until the administrator manually disables it.
B. When a violation occurs on a switch port in protect mode, it sends a syslog notification message
C. A port In the err-disabled state must be re-enabled manually, if recovery is disabled
D. When a switch port is in protect mode, it allows traffic from unknown MAC address until it has learned the maximum allowable number of MAC addresses
C
Which statement about native VLAN traffic over 802.1Q trunk is true?
A. It is discarded by STP
B. It is placed is a high-priority queue
C. It is tagged with a value of 1
D. It is untagged
D
Which protocol can identify connected devices within a mixed-vendor infrastructure?
A. Virtual terminal protocol
B. Network time protocol
C. Link level discovery protocol
D. Cisco discovery protocol
C