Q:1-20 Flashcards
- Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?
forward the packet out GigabitEthernet0/0
drop the packet
forward the packet out GigabitEthernet0/1
forward the packet out Serial0/0/0
forward the packet out Serial0/0/0
Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?
ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100
ip route 10.10.0.0 255.255.0.0 209.165.200.226 100
ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
ip route 10.10.0.0 255.255.0.0 209.165.200.225 50
ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?
Add an administrative distance of 254.
Change the destination network and mask to 0.0.0.0 0.0.0.0
Change the exit interface to S0/0/1.
Add the next-hop neighbor address of 209.165.200.226.
Change the destination network and mask to 0.0.0.0 0.0.0.0
- Which option shows a correctly configured IPv4 default static route?
ip route 0.0.0.0 255.255.255.0 S0/0/0
ip route 0.0.0.0 0.0.0.0 S0/0/0
ip route 0.0.0.0 255.255.255.255 S0/0/0
ip route 0.0.0.0 255.0.0.0 S0/0/0
ip route 0.0.0.0 0.0.0.0 S0/0/0
- Refer to the exhibit. Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?
ipv6 route 2001:db8:12:10::/64 S0/0/0
ipv6 route 2001:db8:12:10::/64 S0/0/1 fe80::2
ipv6 route 2001:db8:12:10::/64 S0/0/0 fe80::2
ipv6 route 2001:db8:12:10::/64 S0/0/1 2001:db8:12:10::1
ipv6 route 2001:db8:12:10::/64 S0/0/1 fe80::2
- What is a method to launch a VLAN hopping attack?
introducing a rogue switch and enabling trunking
sending spoofed native VLAN information
sending spoofed IP addresses from the attacking host
flooding the switch with MAC addresses
introducing a rogue switch and enabling trunking
- A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?
VLAN hopping
DHCP spoofing
MAC address table overflow
VLAN double-tagging
MAC address table overflow
- Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?
The default gateway address is not provided in the pool.
No clients have communicated with the DHCPv6 server yet.
The IPv6 DHCP pool configuration has no IPv6 address range specified.
The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation.
The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation
- Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?
the virtual IP address and the virtual MAC address for the HSRP group 1
the virtual IP address of the HSRP group 1 and the MAC address of R1
the virtual IP address of the HSRP group 1 and the MAC address of R2
the virtual IP address and the virtual MAC address for the HSRP group 1
- Match the forwarding characteristic to its type. (Not all options are used.)
See diagram
- Which statement is correct about how a Layer 2 switch determines how to forward frames?
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
Only frames with a broadcast destination address are forwarded out all active switch ports.
Cut-through frame forwarding ensures that invalid frames are always dropped.
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
- Which statement describes a result after multiple Cisco LAN switches are interconnected?
The broadcast domain expands to all switches.
One collision domain exists per switch.
There is one broadcast domain and one collision domain per switch.
Frame collisions increase on the segments connecting the switches.
Unicast frames are always forwarded regardless of the destination MAC address.
The broadcast domain expands to all switches.
- Match the link state to the interface and protocol status. (Not all options are used.)
14.Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.
SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.
SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.
SW1 drops the frame because it does not know the destination MAC address.
SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.
- An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?
Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.
These VLANs cannot be deleted unless the switch is in VTP client mode.
These VLANs are default VLANs that cannot be removed.
These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.
Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.