Network Fundamentals Flashcards

1
Q

The headquarter router receives a packet with the destination address 192.168.4.127/25 on its fast Ethernet port 0. What actions will the router take regard to the packet?

A. It will add a source address to the packet before routing further.

B. It will forward the packet to the next hop.

C. It will discard the packet.

D. It will add a TCP header before forwarding the packet to the next destination.

A

C. It will discard the packet.

The router will discard any packet with the destination address 192.168.4.127/25.

The IP address 192.168.4.127 is a broadcast address. A router, by default, discards broadcast packets. The IP address 192.168.4.127/25 has a subnet mask, 255.255.255.128, which defines the block size as 128, so there will be two subnets, 0 and 128. The IP addresses 192.168.4.0 and 192.168.4.128 are subnet IDs, whereas 192.168.4.127 and 192.168.4.255 are broadcast addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator needs to select hardware for a new branch office. The office will be divide into three parts for three teams, and each will have a separate subnet. The network assigned for the finance team, sales team, and accounts team devices are 192.168.10.0/26, 172.168.170.0/27 and 10.6.8.0/28, respectively. Which device should the network administrator select to ensure smooth communication?

A. Hub

B. Router

C. Switch

D. Bridge

A

B. Router

The administrator should select a router for communication between all devices. A router helps connect different sets of subnets. It operates at layer 3 of the OSI Model and makes all the routing decisions based on IP addresses. A router creates a routing table, which is used to forward packets to the next destination. By default, routers don’t forward broadcast. They are also used for filtering network-related information and path selection based on IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The employees at a company head office are unable to access the Internet due to network failure. The network engineer finds that the router’s serial interface status shown is ‘down’. In which layer of the OSI Model has the problem occurred? The router shows the interface command as follows:

Serial0/1 is down, line protocol is down
Hardware is GT9K Serial
Description: WAN Link to Exeter
Interface is unnumbered, Using address of FastEthernet0/0 (172.16.6.234)
MTU 1500 bytes, BW 2048 Kbit, DLY 20000 usec,
reliability 255/255, txload 25/255, rxload 5/255
Encapsulation PPP, LCP Open
Open: CDPCP, IPCP, loopback not set
Last input 00:00:00, output 00:00:03, output hang never

A. Transport layer

B. Data layer

C. Physical layer

D. Network layer

A

C. Physical layer

The problem has occurred in the physical layer of the OSI Model as the Serial0/1 interface status is ‘down’. The first parameter refers to the physical layer, which is ‘down’. If the Serial0/1 interface status shows ‘up’ it means the line protocol is down and there is a Data Link layer problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the best Ethernet cabling standards that supports a maximum length of 100 meters? (Choose all that apply)

A. 10BASE-T

B. 10GBASE-T1

C. 1000BASE-T

D. 1000BASE-SX

A

A. 10BASE-T
C. 1000BASE-T

10BASE-T and 1000BASE-T are the Ethernet standards that support a maximum length of 100 meters. The cable type used for 10BASE-T and 1000BASE-T is UTP, 10GBASE-T1 supports a maximum segment length of 38-to-55 meters, whereas 1000BASE-SX supports up to 550 meters. Ethernet standards are selected based on parameters such as speed and maximum distance allowed between the devices using standard cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command needs to be configured to use only link-local address for an IPv6 network?

A. ipv6 enable

B. ipv6 link-route enabled

C. ipv6 neighbor

D. ipv6 unicast-routing

A

A. ipv6 enable

The ‘ipv6 enable’ command needs to be configured to use only link-local address for an IPv6 network. If a customer has only a link-local address, the person will be able tp communicate only through that local subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network engineer needs to set up a new office in California. The network devices at the new office should be connected in such a way that they provide fault tolerance and full redundancy. Which topology should be used to achieve this?

A. Star

B. Hybrid

C. Mesh

D. Ring

A

C. Mesh

The mesh topology should be used while setting up a new office to provide fault tolerance and full redundancy for the network.

The full mesh topology is a design that creates a link between all pairs of nodes, whereas the partial mesh topology is used to connect a link between some pairs of nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A remote site is San Jose is experiencing a broadcast storm in the local network. What devices should be used to break the broadcast? (Choose all that apply)

A. Bridge

B. Layer 3 Switch

C. Router

D. Access Point

A

B. Layer 3 Switch
C. Router

To break a broadcast storm, the router and layer 3 switches need to be used. Routers, by default, don’t forward broadcast and are used only to break a collision domain. A layer 3 switch is used for IP routing. For intra-VLAN communication, the layer 3 switch uses the MAC address table, whereas for inter-VLAN communication, it uses the IP routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To enable IPv6 on a router, which global configuration command needs to be configured by the network administrator?

A. ipv6 enable

B. ipv6 neighbor

C. ipv6 cdp enable

D. ipv6 unicast-routing

A

D. ipv6 unicast-routing

To enable IPv6 on a router, an administrator needs to configure that ipv6 unicast-routing global command. IPv6 traffic forwarding is disabled on the default router. The administrator needs to enable it using ipv6 unicast-routing command under global configuration mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command needs to be used to migrate a configuration from HDLC to PPP?

A. encapsulation ppp

B. ppp authentication chap

C. ppp multilink group

D. enable ppp

A

A. encapsulation ppp

The “encapsulation ppp” command needs to be used to migrate a configuration from HDLC to PPP. Point-to-Point Protocol (PPP) is a data link protocol used on serial links. It supports both synchronous and asynchronous links. The “show interface” command is used to list PPP details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What information does a network layer packet contain? (Choose all that apply)

A. TCP or UDP

B. IP

C. Data

D. Link header, data, and link trailer

A

A. Data
D. IP

A packet contains IP and data information. A packet is defined to work at a network layer, and any information after the IP header is referred to as data. The TCP/IP messages are referred to as segment, packet, or frame, depending on the layer they work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer needs to design a new setup for an HQ site, which consists of 1000 hosts and and 40 network devices connected between three buildings. The hierarchical internetwork design should be scalable, reliable, and cost-effective. Which option will help the network engineer achieve the design of the new setup?

A. Use the hybrid topology for a connection of network devices.

B. Use the three-tier architecture.

C. Connect the network devices in the mash topology for redundancy.

D. Use the two-layer model.

A

B. Use the three-tier architecture

The network engineer should use a three-tier architecture to design the setup of a new HQ office consisting of 1000 hosts and 40 network devices connected between three buildings.

The three-tier architecture is a scalable, reliable, and cost-effective solution. The three layers in the hierarchical model are core, disturbance, and access. The core level is responsible for forwarding a larger volume of traffic with high speed and reliable connectivity. The distribution layer is used for routing between access layer switches. User endpoints are not directly connected to distribution switches. Access layer provides connection to endpoints. Access layer switches forward frames to another access switch via distribution layer switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A router needs to be configured with IPv6 Stateless Autoconfiguration. What command will help configure the router with IPv6 SLAAC and which one will help verify it?

A. 1) ipv6 stateless autoconfig
2) show interface description

B. 1) interface [inferface_id]
ipv6 autoconfig
2) show ipv6 interface brief

C. 1) interface [interface_id]
ipv6 address autoconfig
2) show ipv6 interface [interface_id]

D. 1) interface [interface_id]
ipv6 stateless autoconfig
2) show ipv6 interface summary

A

C. 1) interface [interface_id]
ipv6 address autoconfig
2) show ipv6 interface [interface_id]

The interface [interface-id] and ipv6 address autoconfig commands are used to configure a router with IPv6 SLAAC. The show ipv6 interface [interface_id] command is used to verify the configuration use command.

There are two ways a router interface dynamically learns an IPv6 address. Stateful DHCP and Stateless Address Autoconfiguration (SLAAC). If the ipv6 address autoconfig command is configured on a router, the interface first listens to the RA message and then assigns itself a global address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator needs to provide network connectivity to 50 computers in different subnets. Which device should the administrator select to facilitate data communication between these computers?

A. Router

B. Hub

C. Firewall

D. Switch

A

A. Router

To facilitate network connectivity between 50 computers in different subnets, the administrator should select a router as a network device. Routers filter networks that are based on layer 3 information such as IP address. By default, routers don’t forward broadcast but are used to break collision domain. The various functions of routers are packet switching, packet filtering, internetwork communication, and path selection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator wants to add another router to a network using stateless auto-configuration on an interface. What command helps accomplish the task?

A. interface fastethernet 0/0
ipv6 address autoconfig default

B. interface fastethernet 0/0
ipv6 address dhcp

C. interface fastethernet 0/0
autoconfig
ipv6 address default

D. interface fastethernet 0/0
ipv6 unicast-routing

A

A. interface fastethernet 0/0
ipv6 address autoconfig default

To add a router using stateless auto-configuration on an interface, the administrator needs to use the following command.

interface fastethernet 0/0
ipv6 address autoconfig default

The command is used to enable automatic configuration of IPv6 addresses using stateless auto-configuration on an interface. It discovers prefixes on the link and then adds the EUI-64-based addresses to the interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A remote site user is unable to access the Microsoft server deployed at the HQ site. The IP address of the user’s computer is 192.168.170.3 What basic troubleshooting steps does a network engineer need to follow to identify the cause? The network setup is as follows:

Site router interface Ethernet 0 has been assigned the IP address 192.168.170.1.
The remote site user’s IP address is in the range of 192.168.170.2 and 192.168.170.31.
The Microsoft server’s IP address is 192.168.192.2.

A. Ping 192.168.192.2 and check the domain name system settings.

B. Ping 127.0.0.1, ping 192.168.170.3, ping 192.168.170.1, and ping 192.168.192.2.

C. Check the Dynamic Host Configuration Protocol settings.

D. Ping the DNS server IP address. If successful, ping the IP address of the HQ router.

A

B. Ping 127.0.0.1, ping 192.168.170.3, ping 192.168.170.1, and ping 192.168.192.2.

The network engineer needs to take the following step:
Ping 127.0.0.1 (loopbackIP), 192.168.170.3 (ping NIC), 192.168.170.1 (default gateway), and 192.168.192.2 (HQ server).
The network engineer needs to take four basic troubleshooting steps on the user’s computer to check network connectivity.

1) The network engineer should ping the loopback IP address. It confirms whether the user’s IP stack is initialized. If it fails, TCP/IP on the host needs to be reinstalled.
2) If step one is successful, the engineer needs to ping the local host IP address to confirm that the NIC card is working. If it fails, there is an issue with the NIC card or LAN driver.
3) If step two is successful, the engineer needs to ping the default gateway IP address to confirm connectivity from the computer to the router.
4) If step three is successful, the last step is to ping the Microsoft server to check the connectivity from the router to the server at the HQ location. If the ping response is fine, DNS settings need to be verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The TCP protocol is preferred over the UDP protocol as the former is considered a reliable transport protocol. Which options define the basic operations of reliability? (Choose all that apply)

A. The TCP protocol tracks all data packets sent over the network.

B. The TCP protocol works on the basis of the best effort delivery process.

C. The TCP protocol retransmits any unacknowledged data packet.

D. The TCP protocol acknowledges the received data packet

A

A. The TCP protocol tracks all data packets sent over the network.
C. The TCP protocol retransmits any unacknowledged data packet.
D. The TCP protocol acknowledges the received data packet

The following options help define the basic operations of reliability of a TCP protocol:

1) The TCP protocol retransmits any unacknowledged data packet.
2) The TCP protocol tracks all data packets sent over the network.
3) The TCP protocol acknowledges the received data packet.

TCP breaks a message into smaller segments, which are numbered before being forwarded over the IP network. The TCP protocol tracks the segments and resends the ones that the receiver does not acknowledge.

17
Q

In a DoS attack against a web server, the attacker uses a tool that creates a large number of TCP connections, driving up RAM and CPU on the server and overloading the latter so that it cannot serve users. Which device should the administrator use to block such attacks?

A. Router

B. Access points

C. Wireless controllers

D. Firewall

A

D. Firewall

The administrator needs to install firewall to block DoS attacks, as it creates a large number of TCP connections driving up RAM and CPU on the server

The firewall tracks the number of TCP connections per second, including the number of requests from the IP address of each client to each server address. It not only filters the packets received by firewall but also pays attention to the host initiating communication. It uses the concept of security zones. Firewall has a set of rules that defines the host that can initiate connections from one zone to another.

18
Q

The remote site users are unable to access the voice mail server. As a first troubleshooting step, the network engineer needs to check the layer 2 connections regarding the OSI Reference model. Which command will be used to achieve this? (Choose all that apply)

A. show interfaces

B. traceroute

C. show ip arp

D. show cdp neighbors

A

A. show interfaces
C. show ip arp
D. show cdp neighbors

The network engineer will use the following commands to check the layer 2 connections regarding the OSI Reference model:

1) show ip arp
2) show cdp neighbors
3) show interfaces

The most important task is to identify the layer of the OSI reference model that is not functional. It helps narrow down the problem to a specific layer, which reduces the time taken to troubleshoot the issue. The traceroute and ping commands are used to troubleshoot layer 3 connections.

19
Q

The IPv6 addressing scheme has been used at an HQ site. A packet is sent to link a local address. Which of the following statements are true regarding the packet? (Choose all that apply)

A. The packet will be forward to the default gateway.

B. The packet will be routed to the next hop address.

C. The packet will not leave the IPv6 subnet.

D. The packet will be forwarded only if a fully specified static IPv6 route is configured.

A

C. The packet will not leave the IPv6 subnet.
D. The packet will be forwarded only if a fully specified static IPv6 route is configured.

The following statements regarding the packet sent to the link local address are true:

1) The packet will not leave the IPv6 subnet.
2) The packet will be forwarded only if a fully specified static IPv6 route is configured.

The routers do not forward packets sent to a link local address. The IPv6 link local addresses are not contained in the IPv6 routing table. A fully specified static route is used when an IPv6 link local address is used as a next hop address.

20
Q

The branch router interface fastethernet 0/1 is configured with a unique local address using IPv6 SLAAC. The router is unable to send IPv6 packets, and it just acts as an IPv6 host. To troubleshoot the issue, the network engineer uses show running-configuration and finds some issue with the configuration. The configuration is given below:

Branch#show running-config
--rest output discarded--
ipv6 enable
!
Interface fastethernet 0/0
ipv6 address 2001:1:2:1::7/64
ipv6 address 2001:1:1:2::156/128 anycast
!
Interface fastethernet 0/1
ipv6 address autoconfig default

What modification in the configuration will resolve the issue? (Choose all that apply)

A. The ipv6 dhcp relay command should be configured under the interface fa0/1.

B. The ipv6 address dhcp command should be configured under the global configuration mode.

C. The ipv6 unicast-routing command needs to be configured under the global configuration mode.

D. The ipv6 enable command should be removed from the configuration

A

C. The ipv6 unicast-routing command needs to be configured under the global configuration mode.
D. The ipv6 enable command should be removed from the configuration.

The following modifications should be made to send IPv6 packets:

1) The ipv6 enable command should be removed from the configuration.
2) The ipv6 unicast-routing command needs to be configured under the global configuration mode.

The ipv6 enable command will be configured only if the link-local address is used for an IPv6 network. The router interface dynamically learns of an IPv6 address by using the Stateless Address Auto configuration (SLAAC). The device uses NDP messages to learn about a part of its address and the prefix length.

21
Q

At an HQ site, all users are unable to access the active directory server. What troubleshooting methodologies should the network engineer follow to resolve the issue? (Choose all that apply.)

A. Verify whether the issue is fixed and monitor it.

B. Try to resolve the issue and, if stuck, use the proper escalation channel.

C. Perform the last step of troubleshooting to resolve the issue.

D. Perform problem isolation and proper documentation.

A

A. Verify whether the issue is fixed and monitor it.
B. Try to resolve the issue and, if stuck, use the proper escalation channel.
D. Perform problem isolation and proper documentation.

The troubleshooting methodologies the network engineer should follow to resolve this issue are as follows:

1) Perform problem isolation and proper documentation.
2) Try to resolve the issue and, if stuck, use the proper escalation channel.
3) Verify whether the issue is fixed and monitor it.

The most important element of troubleshooting is the process or method to be followed. By following the correct process, the network engineer can quickly resolve the problem and avoid such issues in the future.

22
Q

At a remote site, the free IP is exhausted and the engineer doesn’t have a new subnet, which can be configured at the site. Only one free IP address is required to connect a new device. What modification needs to be made regarding the current configuration to free one IP address?

A. Configure the ip subnet-zero command.

B. Resolved the ip dhcp conflict.

C. Configure the ip subnet-zero command.

D. Release DHCP binding

A

C. Configure the ip subnet-zero command.

To free one IP address in current configuration, the network engineer needs to configure the ip subnet-zero command on the Cisco IOS router.

The “ip subnet-zero” command allows the administrator to use the first and last subnet IP addresses in the network.

23
Q

What formula is used to define subnet size?

A. 2H

B. 2(H-2)

C. 2H-2

D. 2H-X

A

C. 2H-2

Subnet size can be defined using the formula 2H-2, where H defines the host bit. Each subnet is divided into three parts: the network ID, the broadcast address, and the host IP address.

The network ID defines the subnet of a host. It is the lowest IP address of the subnet, which can’t be assigned to a host/device. The broadcast ID is the highest address of a subnet. A message sent to the broadcast ID will be received by every host in the subnet. All IP addresses, apart from the network and broadcast IDs, can be used as host IP addresses.

24
Q

The devices at a remote site use IPv6 Stateless Address Auto-Configuration to choose their own IP addresses. What steps are followed to choose this IPv6 address?

A. 1) Use NDP RS and RA messages to learn the IPv6 prefix from a router.

2) The interface ID value follows the learned IPv6 prefix to choose its own IPv6 address.
3) Using DAD process, verify if no other host is already using the same IP address.

B. 1) Use NDP NS and NA messages to learn the IPv6 prefix from a router.

2) The interface ID value follows the learned IPv6 prefix to choose its own IPv6 address.    3) Using Neighbor MAC Discovery, verify if no other host is already using the same IP address.

C. 1) Use NDP RS and RA to learn discovery messages.

2) Host chooses its own IPv6 address by making up the subnet ID to follow learned discovery messages.    3) Using Duplicate Address Detection, verify if any host is already using the same IP address.

D. 1) Use NDP NS and NA messages to learn IPv6 messages.

2) Host chooses its own IPv6 address by making up the interface ID to follow the learned IPv6 messages.
3) Using Neighbor MAC Discovery, verify if no other host is already using the same IP address.

A

A. 1) Use NDP RS and RA messages to learn the IPv6 prefix from a router.

2) The interface ID value follows the learned IPv6 prefix to choose its own IPv6 address.
3) Using DAD process, verify if no other host is already using the same IP address.

The following steps are followed by devices using IPv6 Stateless Address Auto Configuration to choose their own IPv6 addresses:

1) Use NDP RS and RA messages to learn the IPv6 prefix from a router.
2) The interface ID value follows the learned IPv6 prefix to choose its own IPv6 address.
3) Using DAD process, verify if no other host is already using the same IP address.

The device using SLAAC doesn’t lease or learn its IPv6 address. It learns a part of the address, i.e. the prefix, and then makes up the rest of its own IPv6 address.

25
Q

To troubleshoot an issue, which of the following Microsoft commands can be used by a network engineer using the command prompt? (Choose all that apply.)

A. arp -a

B. tracert

C. traceroute

D. ping

A

A. arp -a
B. tracert
D. ping

To troubleshoot an issue, the network engineer can use the following Microsoft commands in the command prompt window:

  1. tracert
  2. arp -a
  3. ping

ICMP echo requests are used by the ping command to check if the end device is alive on the network.
The tracert command is used to find the number of paths/hops between the source and destination address.
The arp -a command is used to show the mapping between the IP address and MAC address on a Windows system.

26
Q

An IT administrator needs to set up a LAN network for a new office. What type of cable should the administrator use to connect the following devices?

a. Computer to Switch
b. Switch to Switch

A. a. straight-through, b. crossover

B. a. crossover, b. straight-through

C. a. straight-through, b. rollover

D. a rollover, b. crossover

A

A. a. straight-through, b. crossover

To set up a LAN network, the administrator needs to use straight-through cables to connect computers and switches, and crossover cables to connect switches.

There are three types of cables used for Ethernet connections:
Straight-through cable
Crossover cable
Rollover cable

A rollover cable is used to connect a computer terminal to a router’s console port.
A straight-through cable is made of twisted pair of copper cables. It is used to connect different types of devices, for example, a host to a client.
A crossover cable is basically used to connect the same type of devices, for example, one host to another (one switch to another).

27
Q

A remote site router has connected CSU/DSU to provide clocking for a router. However, the router clocking stops. To troubleshoot the issue, a network engineer uses the show controller and show ip interface command as follows:

Router#sh controllers serial 0/0/0
HD unit 1, idb = 0x12C174, driver structure at 0x131600
buffer size 1524 HD unit 1, V.35 DCE cable
DTE V.35 clocks stopped
Router#sh ip interface s0/0/0
Serial0/0/0 is up, line protocol is down
Internet address is 172.16.171.2/28
Broadcast address is 255.255.255.255

What is the possible cause for clocking to have stopped?

A. No keepalive is received from the remote device.

B. The service provider has disable clocking on the DSU unit.

C. The Line protocol of the interface s0/0/0 is down

D. A wrong V.35 cable is connected on the serial interface 0/0/0

A

D. A wrong V.35 cable is connected on the serial interface 0/0/0

A wrong V.35 cable is connected on the serial interface 0/0/0 due to which clocking is not received from the DSU unit.
The show controllers command displays information about the physical interface and defines the type of serial cable plugged in to the serial port. Usually, a DTE cable is plugged in to a data service unit. The serial interface with a DCE connection provides clocking to another device.

28
Q

John is unable to access the server from a remote site. The IP address of John’s computer is 2004:1:25A4:886F::1, and the remote sever IP address is 3BA7:94FF:FE07:CBD0. What command does the administrator need to use to test the ping response for loopback IPv6 local host?

A. ping 127.0.0.1

B. ping ::1

C. ping 0.0.::1

D. ping 0.0.0.0

A

B. ping ::1

The administrator needs to use the ping ::1 command to test the ping response for the loopback IPv6 local host. It is used to confirm if the user’s IP stack is initialized in the IPv6 network. If the ping response fails, the administrator needs to reinstall TCP/IP on the host. In IPv4, the command to test local protocol stack is ping 127.0.0.1.

29
Q

A network engineer needs to configure the router interface using dynamically learned IPv6 addresses. What are the possible ways to accomplish the task? (Choose all that apply.)

A. Stateless Address Auto configuration

B. IPv6 Unicast Routing

C. Stateful DHCP

D. Dynamic Unicast Addressing

A

A. Stateless Address Auto configuration
C. Stateful DHCP

The network engineer can use Stateful DHCP and Stateless Address Auto configuration to configure the router interface using dynamically learned IPv6 addresses.

In Stateless Address Auto configuration, the device uses NDP messages to learn the first part of its address with the prefix length.

In Stateful DHCP, the device exchanges messages with a DHCP server. The DHCP server provides configuration information, which includes IPv6 addresses along with prefix length and the DNS server address information.

30
Q

Which type of network topology is used in the access layer of a typical three-tier design?

A. Partial Mesh topology

B. Hybrid topology

C. Star topology

D. Full Mesh topology

A

C. Star topology

The network topology used in the access layer of a typical three-tier design is Star.

The Star topology defines one to many, for example, a switch connected to all hosts or devices within a LAN network where the switch is the central device and the computers are the end devices. Full Mesh is a design where each node is connected to other nodes. Partial Mesh is a design where a node is connected to some pairs of nodes but not to all. Hybrid Mesh is a combination of more than one topology.