Modules 8 – 10: Communicating Between Networks Flashcards

1
Q

Which information is used by routers to forward a data packet toward its destination?

  1. source IP address
  2. destination IP address
  3. source data-link address
  4. destination data-link address
A
  1. destination IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

  1. The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.
  2. The packet will be sent directly to the destination host.
  3. The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.
  4. The packet will be sent only to the default gateway.
A
  1. The packet will be sent directly to the destination host.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A router receives a packet from the Gigabit 0/0 interface and determines that the packet needs to be forwarded out the Gigabit 0/1 interface. What will the router do next?

  1. route the packet out the Gigabit 0/1 interface
  2. create a new Layer 2 Ethernet frame to be sent to the destination
  3. look into the ARP cache to determine the destination IP address
  4. look into the routing table to determine if the destination network is in the routing table
A
  1. create a new Layer 2 Ethernet frame to be sent to the destination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which IPv4 address can a host use to ping the loopback interface?

  1. 126.0.0.1
  2. 127.0.0.0
  3. 126.0.0.0
  4. 127.0.0.1
A
  1. 127.0.0.1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?

  1. The cable is not connected properly to the NIC.
  2. The computer has an invalid IP address.
  3. The computer has an incorrect subnet mask.
  4. The computer has an invalid default gateway address.
A
  1. The computer has an invalid default gateway address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement describes a feature of the IP protocol?

  1. IP encapsulation is modified based on network media.
  2. IP relies on Layer 2 protocols for transmission error control.
  3. MAC addresses are used during the IP packet encapsulation.
  4. IP relies on upper layer services to handle situations of missing or out-of-order packets.
A
  1. IP relies on upper layer services to handle situations of missing or out-of-order packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is NAT not needed in IPv6?​

  1. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​
  2. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​
  3. The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​
  4. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.
A
  1. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which parameter does the router use to choose the path to the destination when there are multiple routes available?

  1. the lower metric value that is associated with the destination network
  2. the lower gateway IP address to get to the destination network
  3. the higher metric value that is associated with the destination network
  4. the higher gateway IP address to get to the destination network
A
  1. the lower metric value that is associated with the destination network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two services provided by the OSI network layer? (Choose two.)

  1. performing error detection
  2. routing packets toward the destination
  3. encapsulating PDUs from the transport layer
  4. placement of frames on the media
  5. collision detection
A
  1. routing packets toward the destination
  2. encapsulating PDUs from the transport layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within a production network, what is the purpose of configuring a switch with a default gateway address?

  1. Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination.
  2. A switch must have a default gateway to be accessible by Telnet and SSH.
  3. The default gateway address is used to forward packets originating from the switch to remote networks.
  4. It provides a next-hop address for all traffic that flows through the switch.
A
  1. The default gateway address is used to forward packets originating from the switch to remote networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a basic characteristic of the IP protocol?

  1. connectionless
  2. media dependent
  3. user data segmentation
  4. reliable end-to-end delivery
A
  1. connectionless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

  1. Time-to-Live
  2. Sequence Number
  3. Acknowledgment Number
  4. Differentiated Services
A
  1. Time-to-Live
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one advantage that the IPv6 simplified header offers over IPv4?

  1. smaller-sized header
  2. little requirement for processing checksums
  3. smaller-sized source and destination IP addresses
  4. efficient packet handling
A
  1. efficient packet handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What IPv4 header field identifies the upper layer protocol carried in the packet?

  1. Protocol
  2. Identification
  3. Version
  4. Differentiated Services
A
  1. Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

packets with destination of 172.17.10.5

packets with destination of 172.17.12.10

packets with destination of 172.17.14.8

packets with destination of 172.17.8.20

packets with destination of 172.17.6.15

A

packets with destination of 172.17.10.5 = FastEthernet1/1

packets with destination of 172.17.12.10 = FastEthernet1/0

packets with destination of 172.17.14.8 = FastEthernet0/1

packets with destination of 172.17.8.20 = Serial0/0/0

packets with destination of 172.17.6.15 = FastEthernet0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information does the loopback test provide?

  1. The TCP/IP stack on the device is working correctly.
  2. The device has end-to-end connectivity.
  3. DHCP is working correctly.
  4. The Ethernet cable is working correctly.
  5. The device has the correct IP address on the network.
A
  1. The TCP/IP stack on the device is working correctly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What routing table entry has a next hop address associated with a destination network?

  1. directly-connected routes
  2. local routes
  3. remote routes
  4. C and L source routes
A
18
Q

How do hosts ensure that their packets are directed to the correct network destination?

  1. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​
  2. They always direct their packets to the default gateway, which will be responsible for the packet delivery.
  3. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway.
  4. They send a query packet to the default gateway asking for the best route.
A
  1. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​
19
Q

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

  1. Next Header
  2. Flow Label
  3. Traffic Class
  4. Differentiated Services
A
  1. Flow Label
20
Q

What statement describes the function of the Address Resolution Protocol?

  1. ARP is used to discover the IP address of any host on a different network.
  2. ARP is used to discover the IP address of any host on the local network.
  3. ARP is used to discover the MAC address of any host on a different network.
  4. ARP is used to discover the MAC address of any host on the local network.
A
  1. ARP is used to discover the MAC address of any host on the local network.
21
Q

Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)

  1. The frame has the broadcast address as the destination address.
  2. The destination address is unknown to the switch.
  3. The source address in the frame header is the broadcast address.
  4. The source address in the frame is a multicast address.
  5. The destination address in the frame is a known unicast address.
A
  1. The frame has the broadcast address as the destination address.
  2. The destination address is unknown to the switch.
22
Q

Which statement describes the treatment of ARP requests on the local link?

  1. They must be forwarded by all routers on the local network.
  2. They are received and processed by every device on the local network.
  3. They are dropped by all switches on the local network.
  4. They are received and processed only by the target device.
A
  1. They are received and processed by every device on the local network.
23
Q

Which destination address is used in an ARP request frame?

  1. 0.0.0.0
  2. 255.255.255.255
  3. FFFF.FFFF.FFFF
  4. AAAA.AAAA.AAAA
  5. the physical address of the destination host
A
  1. FFFF.FFFF.FFFF
24
Q

A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?

  1. The ARP cache is cleared.
  2. The current content of the ARP cache is displayed.
  3. The detailed information of the ARP cache is displayed.
  4. The ARP cache is synchronized with the router interface.
A
  1. The ARP cache is cleared.

Hint

Issuing the arp –d * command on a PC will clear the ARP cache content. This is helpful when a network technician wants to ensure the cache is populated with updated information.

25
Q

Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?

  1. The switch will discard the frame.
  2. The switch will forward the frame only to port 2.
  3. The switch will forward the frame to all ports except port 4.
  4. The switch will forward the frame to all ports.
  5. The switch will forward the frame only to ports 1 and 3.
A
  1. The switch will forward the frame to all ports except port 4.

Hint

The MAC address of PC3 is not present in the MAC table of the switch. Because the switch does not know where to send the frame that is addressed to PC3, it will forward the frame to all the switch ports, except for port 4, which is the incoming port.

26
Q

Which two types of IPv6 messages are used in place of ARP for address resolution?

  1. anycast
  2. broadcast
  3. echo reply
  4. echo request
  5. neighbor solicitation
  6. neighbor advertisement
A
  1. neighbor solicitation
  2. neighbor advertisement
27
Q

What is the aim of an ARP spoofing attack?

  1. to flood the network with ARP reply broadcasts
  2. to fill switch MAC address tables with bogus addresses
  3. to associate IP addresses to the wrong MAC address
  4. to overwhelm network hosts with ARP requests
A
  1. to associate IP addresses to the wrong MAC address
28
Q

Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?

  1. the MAC address of S1
  2. the MAC address of the G0/0 interface on R1
  3. the MAC address of the G0/0 interface on R2
  4. the MAC address of S2
  5. the MAC address of File_server1
A
  1. the MAC address of the G0/0 interface on R1
29
Q

Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?

  1. neighbor table
  2. ARP cache
  3. routing table
  4. MAC address table
A
  1. ARP cache
30
Q

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

  1. source MAC address
  2. source IP address
  3. destination MAC address
  4. Ethernet type
  5. destination IP address
A
  1. destination MAC address

Hint

The Layer 2 device, such as a switch, uses the destination MAC address to determine which path (interface or port) should be used to send the data onward to the destination device.

31
Q

Match the commands to the correct actions. (Not all options are used.)

provides security on the console = ?

displays a message when the router is accessed = ?

configures a name on the router = ?

  1. Router(config)# enable Cisco password
  2. Router(config)# banner motd #
  3. Router(config)# hostname CL1
  4. Router(config)# password Cisco
  5. Router(config-line)# password class
A

provides security on the console =

  1. Router(config)# enable Cisco password

displays a message when the router is accessed =

  1. Router(config)# banner motd #

configures a name on the router =

  1. Router(config)# hostname CL1
32
Q

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

  1. Reboot the device.
  2. Enter CTRL-Z at the privileged mode prompt.
  3. Exit global configuration mode.
  4. Power cycle the device.
  5. Exit privileged EXEC mode and press Enter.
A
  1. Exit privileged EXEC mode and press Enter.

Hint

While at the privileged mode prompt such as Router#, type exit,press Enter, and the banner message appears. Power cycling a network device that has had the banner motd command issued will also display the banner message, but this is not a quick way to test the configuration.

33
Q

A network administrator requires access to manage routers and switches locally and remotely. Match the description to the access method. (Not all options are used.)

remote access via a dialup connection = ?

preferred out-of-band access method = ?

remote access method that uses encryption = ?

unsecure remote access = ?

  1. Telnet
  2. AUX
  3. SSH
  4. console
A

remote access via a dialup connection = AUX

preferred out-of-band access method = console

remote access method that uses encryption = SSH

unsecure remote access = Telnet

Hint

Both the console and AUX ports can be used to directly connect to a Cisco network device for management purposes. However, it is more common to use the console port. The AUX port is more often used for remote access via a dial up connection. SSH and Telnet are both remote access methods that depend on an active network connection. SSH uses a stronger password authentication than Telnet uses and also uses encryption on transmitted data.

34
Q

Match the phases to the functions during the boot up process of a Cisco router. (Not all options are used.)

phase 1 = ?

phase 2 = ?

phase 3 = ?

  1. locate and load the startup configuration file
  2. enter setup mode
  3. perform the POST and load the bootstrap program
  4. locate and load the Cisco IOS software
A

phase 1 = 3. perform the POST and load the bootstrap program

phase 2 = 4. locate and load the Cisco IOS software

phase 3 = 1. locate and load the startup configuration file

35
Q

Match the command with the device mode at which the command is entered. (Not all options are used.)

login = ?

service password-encryption = ?

ip address 192.168.4.4 255.255.255.0 = ?

copy running-config startup-config = ?

enable = ?

  1. R1(config-if)#
  2. R1(config)#
  3. R1(config-line)#
  4. R1>
  5. R1#
A

login = 3. R1(config-line)#

service password-encryption = 2. R1(config)#

ip address 192.168.4.4 255.255.255.0 = 1. R1(config-if)#

copy running-config startup-config = 5. R1#

enable = 4. R1>

36
Q

What are two functions of NVRAM? (Choose two.)

  1. to store the routing table
  2. to retain contents when power is removed
  3. to store the startup configuration file
  4. to contain the running configuration file
  5. to store the ARP table
A
  1. to retain contents when power is removed
  2. to store the startup configuration file

Hint

NVRAM is permanent memory storage, so the startup configuration file is preserved even if the router loses power.

37
Q

A router boots and enters setup mode. What is the reason for this?

  1. The IOS image is corrupt.
  2. Cisco IOS is missing from flash memory.
  3. The configuration file is missing from NVRAM.
  4. The POST process has detected hardware failure.
A
  1. The configuration file is missing from NVRAM.
38
Q

The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

  1. The switch will have a management interface with the address 172.16.100.1.
  2. The switch can be remotely managed from a host on another network.
  3. The switch can communicate with other hosts on the 172.16.100.0 network.
  4. The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
A
  1. The switch can be remotely managed from a host on another network.

Hint

A default gateway address is typically configured on all devices to allow them to communicate beyond just their local network.In a switch this is achieved using the command ip default-gateway .

39
Q

What happens when the transport input ssh command is entered on the switch vty lines?

  1. The SSH client on the switch is enabled.
  2. Communication between the switch and remote users is encrypted.
  3. The switch requires a username/password combination for remote access.
  4. The switch requires remote connections via a proprietary client software.
A
  1. Communication between the switch and remote users is encrypted.

Hint

The transport input ssh command when entered on the switch vty (virtual terminal lines) will encrypt all inbound controlled telnet connections.

40
Q

Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network?

  1. 172.24.255.17
  2. 172.24.1.22
  3. 172.20.0.254
  4. 172.24.255.4
  5. 172.20.1.18
A
  1. 172.20.0.254