Practice Exam 1 Flashcards
What transport layer protocol features the use of sequencing and synchronization methods?
A. ICMP
B. TCP
C. UDP
D. ARP
B. TCP
There are two transport layer protocols listed here. Therefore, you should be able to narrow this question down to two options immediately—B. TCP and C. UDP. Of these two, TCP provides reliability features like sequencing of packets and synchronization. UDP does not.
Examine the figure. If devices 1, 2, and 3 are all Cisco Layer 2 switches in their default configuration, how many collision domains exist in this
network?
A. 11
B. 2
C. 9
D. 8
A. 11
Every port on a Layer 2 switch creates a collision domain by default. Here we have 9 workstations connected for 9 collision domains, and we have a collision domain for each of the 2 interswitch links. This makes a total of 11 collision domains. This Layer 2 switch concept is often called microsegmentation.
You have configured your gi0/1 Cisco switch port as follows:
interface gi0/1
switchport mode access
switchport port-security
Which of the following statements is true?
A. The default violation mode is Restrict.
B. The mode must be trunk for port security to be used.
C. The default number of dynamic MAC addresses is 1.
D. This configuration prevents the logging of Port Security violations.
E. The violation mode in use here is Protect
C. The default number of dynamic MAC addresses is 1.
Notice this is a default configuration of Port Security. Every value is set to default. This means the default number of MAC addresses is 1 and the default violation mode is Shutdown. This violation mode will log violations.
What protocol is used with an Integrated Services approach to QoS?
_________
RSVP
RSVP sends signals to reserve resources in the path of traffic.
What is the default administrative distance for eBGP?
A. 20
B. 120
C. 110
D. 200
E. 90
A. 20
The default administrative distance for eBGP is excellent at 20. Contrast this to Internal BGP (iBGP) of 200.
What is the following IPv4 address range used for? 224.0.0.0 to 239.255.255.255
A. To send a packet to all systems
B. To send a packet to a group of systems
C. To send a packet to a single specific system
D. To send multiple packets to only a single specific system
B. To send a packet to a group of systems
224.0.0.0 to 239.255.255.255 is the IPv4 multicast address range. This range permits the sending of a single packet to a group of machines that “subscribe” to the traffic. This is unlike a broadcast where a single packet is sent to all systems. In IPv6, broadcast traffic is eliminated in favor of multicast.
What is the default range for TTL in Cisco’s implementation of extended Traceroute?
A. 1–20
B. 0–30
C. 1–30
D. 1–10
C. 1–30
Extended Traceroute uses a default range of 1 to 30 by default.
What is the privilege level for the user given the following command?
username johns secret cisco123
A. 0
B. 1
C. 15
D. 8
B. 1
The username command defaults to privilege level 1 for the user when a level is not specified.
How are IPv6 addresses typically allocated to computers at a company connected to the Internet?
A. By an ISP
B. Using an EUI-64 server
C. Using an NATv6 device
D. Using Unique Local Addressing (ULA)
A. By an ISP
In IPv6 environments, it is common to have ISPs assigning blocks of addresses to an enterprise. This is due to the massive address space that is possible and a lack of need for private use only addressing.
Examine the figure. What is the Layer 2 destination address?
________________
00:1b:77:12:34:56
The Layer 2 addressing information appears under the Ethernet II section. There is the Src for Source and Dst for Destination in the output of the packet capture shown.
Which of the following is an error-free valid hostname for a Cisco switch running version 12.x of Cisco IOS?
A. 12345
B. 1SW-2
C. SW1-4501
D. 1SW12
C. SW1-4501
Hostnames on most Layer 2 switches running IOS 12.x must start with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names must be 63 characters or fewer. C is the only option that conforms to the naming requirements.
What technology provides multiple default gateways in a redundant manner?
A. FHRP
B. SPAN
C. STP
D. IP SLA
A. FHRP
First Hop Reachability Protocols include HSRP and VRRP.
You are in privileged mode on R1. Provide all configuration commands in order to configure this device as a router on a stick (ROAS) using the following information:
Physical Interface: GigabitEthernet 0/1
Subinterfaces: GigabitEthernet 0/1.10 (VLAN 10); GigabitEthernet 0/1.20 (VLAN 20)
VLANs: 10; 20
Protocol: 802.1Q
IP addressing: 10.1.10.1/24 (VLAN 10); 10.1.20.1/24 (VLAN 20)
_________
configure terminal
!
interface gi0/1
no shutdown
!
interface gi0/1.10
encapsulation dot1q 10
ip address 10.1.10.1 2 55.255.255.0
!
interface gi0/1.20
encapsulation dot1q 20
ip address 10.1.20.1 2 55.255.255.0
Notice this configuration features no IP address on the physical interface, and uses subinterfaces set for 802.1Q encapsulation and appropriate IP addresses for the different VLANs.
What type of routing protocol uses split horizon and poison reverse type mechanisms?
A. Distance vector
B. Link state
C. Hybrid
D. Path vector
A. Distance vector
Distance vector routing protocols rely on many mechanisms to avoid errors in routing information. This includes poison reverse and split horizon.
Create an extended ACE that permits Telnet traffic from a Telnet server on the network 10.10.10.0/24, going to a host on network 192.168.1.0/24.
Use ACL 101.
_________
access-list 101 permit tcp 10.10.10.0 0.0.0.255 eq 23 192.168.1.0 0.0.0.255.
This ACE meets the criteria given.
What keyword enables the use of PAT in your NAT configuration?
A. Load
B. Ports
C. Overload
D. Pool
C. Overload
The overload keyword implies the use of Port Address Translation.
How many syslog levels are there with Cisco equipment?
A. 8
B. 6
C. 4
D. 16
A. 8
Syslog levels 0 through 7 are available on most Cisco devices.
What value do you change to have a router ignore its own startup-config on boot?
A. flash-boot
B. nvram.ini
C. configuration register
D. system-start
C. configuration register
The Configuration Register settings can permit a router to ignore its own startup-config during boot.
Examine the topology shown here. How many collision domains exist between the PC and Router 1?
A. 0
B. 1
C. 2
D. 3
C. 2
There are two collision domains. The hub does not create collision domains off its ports. The bridge does. So there are two collision domains created by the bridge.
Which of the following provides a secure method to transfer files in your Cisco network?
A. TFTP
B. FTP
C. Telnet
D. SCP
D. SCP
The Secure Copy Protocol (SCP) relies upon SSH technology for its operation. It is the only protocol listed here with security and encryption capabilities for file transfer.
Examine the topology shown in the figure. The PC has sent a Ping request to the Server. Which devices in the network operate only at the physical layer of the OSI reference model? (Choose two.)
A. Ethernet cabling
B. Bridge 1
C. Router 2
D. Hub A
E. Switch 3
F. PC Network Interface Card
A. Ethernet cabling
D. Hub A
The cabling and the hub are Layer 1 components. Bridges and Switches include Layer 2 components. The router includes a Layer 2 and Layer 3 component.
Which of the following are true on a typical Cisco access-layer switch? (Choose two.)
A. It can have IP routing enabled
B. It can have an IP address configured for management
C. It can be used for NAT or PAT
D. A default gateway allows the switch to access remote networks
E. Ports default to no switchport mode
B. It can have an IP address configured for management
D. A default gateway allows the switch to access remote networks
Layer 2 access switches will typically have IP addresses assigned for management purposes. A default gateway permits a managed switch to access remote networks, again for management purposes.
From the list, which of the following would be correct best practices for device hardening measures? (Choose two.)
A. Disable VTY login using the VTY line configuration command: no login
B. Disable Telnet on the VTY lines using the command: transport input ssh
C. Disable all banner messages
D. Disable the use of the plain text passwords in the configurations
E. Disable SSH on the VTY lines
B. Disable Telnet on the VTY lines using the command: transport input ssh
D. Disable the use of the plain text passwords in the configurations
You should disable the use of Telnet by using the transport input ssh command. Also, use the service password-encryption command to hide plain text passwords. Depending on the AAA configuration (or lack thereof), the command no login removes the requirement for a login password on the VTY lines.
Examine the switch configuration shown. What problem exists with this suggested configuration change?
SW1
configure terminal
interface fa0/10
switchport trunk encapsulation isl
switchport mode trunk
switchport port-security
switchport port-security max 2
no shutdown
A. Port security can only support a single secure MAC address.
B. Port security can be used on trunks (depending on the switch), but it is likely there will be many more than two learned MAC addresses on that port.
C. Port security can only be used with 802.1Q trunks.
D. A violation mode for port security must be selected.
B. Port security can be used on trunks (depending on the switch), but it is likely there will be many more than two learned MAC addresses on that port.
Port security can be used on configured access or trunk ports, but not on a dynamic port. When used on a trunk, it is likely there will be many devices’ MAC addresses crossing the trunk, so the limit of two MAC addresses would likely be too restrictive.