Practice Chapters 1-5 Flashcards
1.1 Which one of the following is true about the Cisco core layer in the three-tier design?
A. Never do anything to slow down traffic. This includes making sure you don’t use access lists, perform routing between virtual local area networks, or implement packet filtering.
B. It’s best to support workgroup access here.
C. Expanding the core, e.g., adding routers as the internetwork grows, is highly recommended as a first step in expansion.
D. All cables from the Core must connect to the TOR.
- A. The core layer should be as fast as possible. Never do anything to slow down traffic. This includes making sure you don’t use access lists, perform routing between virtual local area networks, or implement packet filtering.
1.2 Which one of the following best describes a SOHO network?
A. It uses ff:ff:ff:ff:ff:ff as a layer 2 unicast address, which makes it more efficient in a small network
B. It uses UDP as the Transport layer protocol exclusively, which saves bandwidth in a small network.
C. A single or small group of users connecting to a switch, with a router providing a connection to the internet
D. SOHO is the network cabling used from the access layer to the TOR
C. SOHO stands for small office, home office and is a single or small group of users connecting to a switch, with a router providing a connection to the Internet for the small network.
1.3 Which two of the following describe the access layer in the three-tier network design? (Choose two.)
A. Microsegmentation
B. Broadcast control
C. PoE
D. Connections to TOR
A, C. The access layer provides users, phones, and other devices with access to the
internetwork. PoE and switch port security are implemented here.
1.4 Which fiber type is a Cisco standard and has a distance of over 40 miles?
A. 1000Base-SX
B. 1000Base-LX
C. 1000Base-ZX
D. 10GBase-T
C. 1000Base-ZX (Cisco standard) is a Cisco-specified standard for Gigabit Ethernet
communication. 1000Base-ZX operates on ordinary single-mode fiber-optic links with spans up to 43.5 miles (70 km).
1.5 What is the speed of a T3?
A. 1.544Mbps
B. 2.0Mbps
C. 100Mpbs
D. 44.736Mbps
D. A T3, referred to as an S3, comprises 28 DS1s bundled together, or 672 DS0s, for a bandwidth of 44.736 Mbps.
1.6 Which of the following is not provided by today’s NGFWs?
A. IPS Inspection
B. Layer 2 deep packet inspection
C. Application Visibility and Control (AVC)
D. Network Address Translation (NAT)
B. Since there is no such thing as layer 2 packets, we wouldn’t be able to do packet
inspection with any device on this nonexistent packet type.
1.7 Which of the following is the standard for PoE+?
A. 802.3P
B. 802.3af
C. 802.3at
D. 802.3v6
C. The IEEE has created a standard for PoE called 802.3af. For PoE+, it’s referred to as 802.3at.
1.8 Which of the following defines a two-tier design?
A. The access layer connects to the distribution layer, and the 2-tiers then connect to the core layer.
B. In a two-tier design, the distribution layer is merged with the core layer.
C. It’s best to support workgroup access in the two-tier layer
D. All cables from the core must connect to the two-tier TOR
B. In a two-tier, the design is meant to maximize performance and user availability to the network, while still allowing for design scalability over time.
1.9 What is the speed of the 802.3.an standard?
A. 100Mbps
B. 1Gbps
C. 10Gbps
D. 100Gbps
C. 10GBase-T is a standard proposed by the IEEE 802.3an committee to provide 10 Gbps
connections over conventional UTP cables (category 5e, 6, or 7 cables).
1.10 In a spine-leaf design, which is true?
A. The switches are found at the top of each rack that connect to the servers in the rack.
B. The distribution layer is merged with the core layer.
C. The access layer connects to the distribution layer, and the two-tiers then connect to the core layer.
D. All cables from the core must connect to the spine, which connects to the leaf device.
A. In a spine-leaf design, people refer to this as a Top-of-Rack (ToR) design because the switches physically reside at the top of a rack.
2.1 What must happen if a DHCP IP conflict occurs?
A. Proxy ARP will fix the issue.
B. The client uses a gratuitous ARP to fix the issue.
C. The administrator must fix the conflict by hand at the DHCP server.
D. The DHCP server will reassign new IP addresses to both computers.
C. If a DHCP conflict is detected, either by the server sending a ping and getting a response or by a host using a gratuitous ARP (arp’ing for its own IP address and seeing if a host responds), then the server will hold that address and not use it again until it is fixed by an administrator.
2.2 Which of the following Application layer protocols sets up a secure session that’s similar to Telnet?
A. FTP
B. SSH
C. DNS
D. DHCP
B. The Secure Shell (SSH) protocol sets up a secure session that’s similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another.
2.3 Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process?
A. Ping
B. Traceroute
C. Gratuitous ARP
D. Pathping
- C. A host uses something called a gratuitous ARP to help avoid a possible duplicate address. The DHCP client sends an ARP broadcast out on the local LAN or VLAN with its newly assigned address to find out if another host replies, and this helps solve conflicts before they occur.
2.4 Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses ff:ff:ff:ff:ff:ff as a layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer 2 destination address.
A, B. The client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex, or ff:ff:ff:ff:ff:ff. The layer 3 broadcast is 255.255.255.255, which means any networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.
2.5 Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
B, D, E. SMTP, FTP, and HTTP use TCP.
2.6 Which of the following is an example of a multicast address?
A. 10.6.9.1
B. 192.168.10.6
C. 224.0.0.10
D. 172.16.9.5
C. The range of multicast addresses starts with 224.0.0.0 and goes through 239.255.255.255.
2.7 Which two of the following are private IP addresses?
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43
C, E. The Class A private address range is 10.0.0.0 through 10.255.255.255. The Class. B private address range is 172.16.0.0 through 172.31.255.255, and the Class C private address range is 192.168.0.0 through 192.168.255.255.
2.8 What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
B. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host (also called Transport on the objectives), Internet, and Network Access/Link. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
2.9 Which statements are true regarding ICMP packets? (Choose two.)
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.
B, C. ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostics, it will provide hosts with information about network problems.
2.10 What is the address range of a Class B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
C. The range of a Class B network address is 128–191. This makes our binary range 10xxxxxx.