Module 5 Quiz Flashcards

1
Q

What is the maximum number of MAC addresses allowed on fa0/1?

Select one:

A

a.2

b.0

c.3

d.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State whether the following is true or false:

The data link layer is responsible for framing and local physical addressing. The network layer takes on the responsibility of routing traffic and logical addressing.

A

Select one:
True
False

The data link layer is responsible for framing and local physical addressing. The network layer takes on the responsibility of routing traffic and logical addressing. It is responsible for encapsulating packets of information and sending it across the network. The main protocol in use on the network layer is IP. This protocol is deemed to be unreliable and performs best-effort delivery. It is deemed unreliable because it does not perform any checking to determine whether the destination host is available to receive traffic and it has no built-in mechanism for ensuring delivery of packets and resending them should delivery fail.

The correct answer is ‘True’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would the port number 500 be classified as?

Select one:

A

a.
Dynamic or private port

b.
Well-known port

c.
Registered port

Port numbers generally fall into the following ranges:

Well-known ports (0 – 1023): These are port numbers used by well-known system processes such as the File Transfer Protocol (FTP). They are usually used as destination ports by clients.
Registered ports (1024 – 49151): The Internet Assigned Numbers Authority (IANA) may assign these ports to organizations for use with their applications, e.g. certain Microsoft products always use specific ports. It is not illegal for these ports to be used for other purposes, but it might yield unexpected results since some applications expect these port numbers to be available.
Dynamic or private ports (49152 - 65535): These port numbers are completely open for use. They are usually dynamically allocated as source ports during communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Match the protocol with its port number.

A

Telnet
23

DNS
53

FTP
21

SMTP
25

Port number
Protocol
Application
20
TCP
FTP data

21
TCP
FTP control

22
TCP
SSH

23
TCP
Telnet

25
TCP
SMTP

53
UDP, TCP
DNS

67
UDP
DHCP Server

68
UDP
DHCP Client

69
UDP
TFTP

80
TCP
HTTP (WWW)

110
TCP
POP3

161
UDP
SNMP

443
TCP
SSL

514
UDP
Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command(s) are required to assign the router the hostname of Bergen?

Router (config)# ________ _________

A

Router (config)# hostname Bergen

hostname name Bergen Router host Oslo

The task of configuring the Cisco device would probably fall to a network administrator. At any given time, the administrator may have the task of working on multiple devices at a time and switching between them on the same screen. This may be very confusing if all the devices have the same names, e.g. Router or Switch. Therefore, one of the first configuration tasks to perform on any new device is to give the device a new hostname. That is accomplished via a command from the global configuration mode, which has the following format:

Router (config)#hostname <the></the>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ protocols do not require a connection termination phase. ________ protocols require an initial connection setup phase before data transfer can begin.

A

Connectionless protocols do not require a connection termination phase. Connection‑oriented protocols require an initial connection setup phase before data transfer can begin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which command would result in the following output?

A

Select one:

a.show interface

b.show interface brief

c.show ip route

d.show ip interface

e. show ip interface brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given the following image:

Which of the following statements regarding the image are true?

A

Select one:

a.Both IP addresses have /30 masks.

b.OSLO is the DTE.

c.The configuration will not work.

d.The no shutdown commands have turned the interfaces off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Company EZ Net uses RIP as its dynamic routing protocol. What should be configured to provide a backup route for the routes created by RIP?

A

Select one:

a.static route
b.default gateway
c.floating static route
d.dynamic route

A static route has a default administrative distance of 1. That makes it impossible for a static route to serve as the backup route to anything except a directly connected network, since the route with the lowest administrative distance to any destination is always the one installed in the routing table.

To facilitate this functionality, it is possible to configure both an IPv4 and IPv6 static route with an alternate administrative distance. The administrative distance chosen should be higher than the target administrative distance, e.g. if the static route has to serve as a backup to the dynamic routing protocol RIP, which has an administrative distance of 120, the static route needs to have an administrative distance assigned of at least 121. If the RIP routing process fails, the floating static route would automatically become the route with the next lowest administrative route and be installed in the routing table, thereby acting as a backup route to RIP.

The syntax for declaring a floating IPv4 static route is as follows:

Router (config)#ip route <network> <subnet> <exit> <1-255>
or
Router (config)#ip route <network> <subnet> <next> <1-255></next></subnet></network></exit></subnet></network>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which command(s) should be used to set a password that needs to be entered for a user to establish a console session? The password should be set to Noroff.

Oslo (config)# line console 0

Oslo (config-line)# password Noroff

Oslo (config-line)# login

A

Oslo (config)# line console 0

Oslo (config-line)# password Noroff

Oslo (config-line)# login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A router has been booted up and shows the following message:

Would you like to enter the initial configuration dialog? [yes/no]:

What does this mean?

A

a.
The start-up configuration file was not found in NVRAM.

b.
The running-config file was not found in NVRAM.

c.
A new interface has been added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The TCP process of connection establishment does not include:
Select one:

A

a.
Assigning IP addresses

b.
Initializing Acknowledgement fields

c.
Agreeing on port numbers

d.
Initializing Sequence fields

The TCP process of connection establishments includes

  • Initializing Sequence fields
  • Initializing Acknowledgement fields
  • Agreeing on port numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command(s) should be issued to move to privileged EXEC mode?

Oslo> enable

configure disable end terminal

A

Oslo> enable

configure, disable, end, terminal

The next command mode, after user EXEC mode, is called privileged EXEC mode or the enable mode. It is called the enable mode because of the command that a user must enter in order to access the privileged mode:

Router>enable

Once entered, the device’s prompt will change to the following:

Router#

This mode is referred to as the privileged mode because more powerful commands may be executed in this mode. It may be recognised by the # at the end of the prompt. As noted, commands at this level are a bit more powerful and may be used to disrupt device operations, but none of the commands at this level are able to change the device’s configuration. To return to user Exec mode, the user may enter the command:

Router#disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ sends a message from a client computer to a mail server or between mail servers. ____ delivers a message from a recipient’s mail server to the recipient’s email client.

Message transfer agent Message access agent Message text agent

A

Message transfer agent sends a message from a client computer to a mail server or between mail servers. Message access agent delivers a message from a recipient’s mail server to the recipient’s email client.

Browsing the web is just one of the basic activities performed via the application layer. Another such activity is sending and receiving email. To send email requires two things:

  • Message transfer agent (MTA): Transfers a message from a client computer to a mail server or between mail servers. The Simple Mail Transfer Protocol (serves) this purpose.
  • Message access agent (MAA) or message delivery agent (MDA): The message access (or delivery, depending on which resource you consult) agent delivers a message from a recipient’s mail server to the recipient’s email client. This purpose may be served by the Post Office Protocol (POP3) or Internet Mail Access Protocol (IMAP).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which command(s) are used to set a password for accessing the privileged EXEC mode? This password should be shown in plain text in the running-config file. The password should be Noroff.

Oslo (config)# enable password Noroff

A

Oslo (config)# enable password Noroff

Once a user has access to the user EXEC mode, the next step would be to access the privileged EXEC mode. If a user has access to privileged EXEC mode, they are able to see many more configuration details than on the user EXEC mode. It makes sense, therefore, to attempt to block a user from accessing this mode needlessly. To do so, there are two commands a user may issue.They are as follows:

Router (config)#enable password <password>
Router (config)#enable secret <password></password></password>

To the user, these passwords would have the exact same effect. The router or switch will request a password once the user attempts to move to the privileged mode.The password created with the password command is shown in plain text, whereas the password created with the secret command is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which command(s) should be issued to return to privileged EXEC mode?

Oslo (config)# end

A

Oslo (config)# end
terminal disable configure enable

To configure any settings on the device, the user needs to proceed to the next command mode, called the global configuration mode. This mode may be reached by entering the following command:

Router#configure terminal

To return to privileged EXEC mode, the user may enter either of the following:

Router (config)#end or Router (config)#Ctrl-z

The global configuration mode may be recognised by a prompt ending in (config)#. Global configuration mode consists of several sub-configuration modes, all of which may be used to update the configuration of the device.

17
Q

State whether the following is true or false:

Router (config)#service password-encryption applies strong encryption to all plain text passwords in the running-config file.

A

Select one:
True
False

To apply a weak form of encryption to all plain text passwords in the running-config, issue the following command:

Router (config)#service password-encryption

18
Q

Which of the following are characteristics of dynamic routing? Marks are deducted for incorrect selections.

Select one or more:

A

a. **The network could possibly recover if a route goes down.
**
b. Less resource intensive.

c. Administrator knows the exact route traffic takes.

d. The network is unable to recover if a route goes down.

e. More resource intensive.

f. The administrator doesn’t know the exact route traffic takes.

19
Q

Match the file sharing protocol with its description.

A

Traditionally used for file downloads.
FTP

It is most often used between Cisco routers and switches to perform file transfers.
TFTP

A peer-to-peer file sharing protocol.
BitTorrent

Windows File and Printer sharing is based on this protocol.
SMB

20
Q

Which commands are required to configure RIP version 2 on R2?

R2 (config): blank blank

R2 (config-router): blank blank

R2 (config-router): blank 192.168.1.0

R2 (config-router): blank blank

R2 (config-router): no auto-summary

A

R2 (config): [router] [rip]

R2 (config-router): [version] [2]

R2 (config-router): [network] 192.168.1.0

R2 (config-router): [network] [192.168.3.0]

R2 (config-router): no auto-summary

21
Q

State whether the following is true or false:

Link-state protocols work on the principle that to route traffic a distance (metric) and a vector / direction (an output interface / next-hop address) is required.

A

Select one:
True
False

  • Distance vector: Distance vector protocols work on the principle that to route traffic a distance (metric) and a vector / direction (an output interface / next-hop address) is required. The router only requires information from its directly connected neighbours in order to make its routing decisions. When it sends out updates to its neighbours, it sends all of the routes it has in its routing table and it does so in fixed intervals.
  • Link-state: A link-state routing protocol makes its routing decisions based on all of the information in the network. A router running a link-state routing protocol requires the information from all of the routers in the network. Connections between routers are referred to as links. Every router needs to know the state of all links in the network in order to make routing decisions. These protocols are more resource intensive on the device, but they tend to be more efficient. Whenever these protocols send out updates, they only send out the portion of the routing table which has changed and they only do so when there is a change in the network (not at fixed intervals).
22
Q

Given the following statement:

Because conversations use a combination of IP addresses and port numbers to identify a conversation, it is possible to have more than one application communicating from the same device. The different communication streams might all share the same IP address, but they would use different port numbers and, thus, different sockets.

Which of the following provides a solution to the above statement?

Select one:

A

a.
Routing

b.
Multiplexing

c.
Framing

d.
Micro-segmentation

e.
Segmentation

Because conversations use a combination of IP addresses and port numbers to identify a conversation, it is possible to have more than one application communicating from the same device. The different communication streams might all share the same IP address, but they would use different port numbers and, thus, different sockets. This functionality allows different conversations to be interleaved across a single network connection, in a process called multiplexing.

23
Q

Which commands are required to configure a static route to the network 200.50.70.32 /27 using Serial 0/0/0 as the exit interface?

Oslo (config)# ip route 200.50.70.32 255.255.255.224 s0/0/0

200.50.70.32 route 200.50.70.0 ip s0/0/0 fa0/0 255.255.255.224 path 255.255.255.0 200.50.70.62 static

A

Oslo (config)# **ip route 200.50.70.32 255.255.255.224 s0/0/0 **

There are three basic requirements for configuring a static route:

A network address for the remote network to which the route should point.
The subnet mask of the remote network.
An exit interface on the local device out of which the traffic intended for the destination network may be sent or the next IP address on the way to the remote destination, i.e. an IP address on the neighbouring router, which shares a local network with the current device.
The basic command structure for configuring an IPv4 static route is as follows:

**Router (config)#ip route <network> <subnet> <exit>**
or
**Router (config)#ip route <network> <subnet> <next>**</next></subnet></network></exit></subnet></network>

24
Q

Which of the following is not a feature of port security?

Select one:

A

a.
What the device should do if it detects an unauthorised MAC address.

b.
Defining the number of allowed IP addresses on a port.

c.
Defining the number of allowed MAC addresses on a port.

d.
Defining how MAC addresses are learned by the device on a specific port.

Port security allows:

  • The number of allowed MAC addresses on a port to be defined.
  • How MAC addresses are learned by the device on a specific port to be defined.
  • What the device should do if it detects an unauthorised MAC address. This is referred to as the interface’s violation mode.**
25
Q

Given the following router prompt:

Oslo#

In which command mode is the device?

A

Select one:

a.
user EXEC mode

b.
global configuration mode

c.
privileged EXEC mode

user EXEC mode: Oslo>
privileged EXEC mode: Oslo#
global configuration mode: Oslo (config)#

26
Q

State whether the following is true or false:

Flow control is the process of determining how many segments may be sent before an acknowledgement is expected by the sending host.

Select one:

A

True
FALSE

27
Q

Which command(s) are required to configure port security on FastEthernet0/1?

KRS (config)# interface fa0/1

KRS (config-if)# switchport mode port‑security

KRS (config-if)# switchport port‑security

access port‑security trunk switchport interface line

access port‑security trunk switchport interface line

A

KRS (config)# [interface] fa0/1

KRS (config-if)# [switchport] mode [access]

KRS (config-if)# switchport [port‑security]

The following commands demonstrate how to enable port security on FastEthernet0/1:

Switch (config)#interface fa0/1
Switch (config)#switchport mode access
Switch (config)#switchport port-security

The first step in this series of commands is to make sure that the interface is actually an access port, with the command switchport mode access. An access port may be seen as a port which carries traffic for a single VLAN (VLANs will be discussed in another lesson). Access ports may also be seen as user or host ports. The second step is to enable port-security with the command switchport port-security.

28
Q

Complete the command(s) required to display a router’s configuration stored in NVRAM.

Oslo# show startup‑config

show running‑config NVRAM startup‑config display RAM

A

Oslo# show startup‑config

To view the stored configuration of the device, i.e. the startup-config / the configuration stored in NVRAM, enter the following command:

Router#show startup-config

29
Q

Which commands are required to configure a default route using the next hop IP address 200.50.70.2?

Oslo (config)# ip route 0.0.0.0 0.0.0.0 200.50.70.2

255.255.255.224 0.0.0.0 path 200.50.70.32 200.50.70.2 fa0/0 s0/0/0 255.255.255.0 route ip 200.50.70.0 static 200.50.70.62

A

Oslo (config)# ip route 0.0.0.0 0.0.0.0 200.50.70.2

A default route is a very special static route with a destination network of all zeros and a subnet mask of all zeros. The logic behind this is that an IP address of all zeros is the lowest possible IP address and a mask of all zeros means that the entire address. This has the effect of matching any possible address or route. The syntax of an IPv4 default route is shown below.

Router (config)#ip route 0.0.0.0 0.0.0.0 <exit>
or
Router (config)#ip route 0.0.0.0 0.0.0.0 <next></next></exit>