Quiz 4 Flashcards

1
Q

Consider the following statements:
A: Dynamic routing protocols decrease network security.
B: Static routing protocols conserve network bandwidth.

Question 1 options:

Statement A is true, and statement B is true.

Statement A is false, and statement B is true.

Statement A is false, and statement B is false.

Statement A is true, and statement B is false.

A

Statement A is true, and statement B is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A packet has a destination Data Link layer address of FF-FF-FF-FF-FF-FF.

Question 2 options:

Any non-routing device drops this packet.

Network hosts process this packet to see if it is of interest.

Any router that receives this packet forwards it to the default route interface.

Network hosts send this packet to their default gateway.

A

Network hosts process this packet to see if it is of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following addresses are valid IPv6 addresses? (Choose all that apply.)

Question 3 options:

A) fe80::bef2:6cbe::678:1879

B) fe80:c693:bef2:6cbe:678:1879

C) fe80:cd5c::f40f:9eea:7580

D) fe80::a02a:64b0:27a9:c73b

A

C) fe80:cd5c::f40f:9eea:7580

D) fe80::a02a:64b0:27a9:c73b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following features are typical of dynamic routing protocols? (Choose all that apply.)
Question 4 options:

A) Faster convergence

B) Decreased processor load

C) Increased network traffic

D) Increased administrative effort

A

A) Faster convergence

C) Increased network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Consider the following statements:
A: Supernetting reduces the number of routes in routing tables.
B: Variable length subnet masks allow routers to determine whether an address is
public or private.
Question 5 options:

Statement A is true, and statement B is false.

Statement A is true, and statement B is true.

Statement A is false, and statement B is true.

Statement A is false, and statement B is false.

A

Statement A is true, and statement B is false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All Cisco access control lists require .

Question 6 options:

a deny all statement as the last access control entry

either a source or destination IP address in each access control entry

at least one deny statement

at least one permit statement

A

at least one permit statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following parameters can you find in a standard access control list? (Choose all that apply.)
Question 7 options:

A) source port number

B) source IP address

C) destination IP address

D) destination MAC address

A

A) source port number

B) source IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following IP addresses would be filtered by an access control entry that contained the IP address and inverse mask specification of 12.96.115.77 0.15.255.255? (Choose all that apply.)
Question 8 options:

A) 12.113.84.3

B) 12.111.115.77

C) 12.104.146.190

D) 21.48.200.9

A

B) 12.111.115.77

C) 12.104.146.190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following packet elements can be filtered by a named ACL? (Choose all that apply.)
Question 9 options:

A) destination ports

B) noninitial fragments

C) source IP addresses

D) TCP flags

A

A) destination ports

B) noninitial fragments

C) source IP addresses

D) TCP flags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cisco encryption type 7 is the strongest encryption method available on the router.

Question 10 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To configure a router using a telephone connection, you would connect to the port.

Question 11 options:

VTY

CON

TTY

AUX

A

AUX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To enable SSH on a Cisco router, you should .

Question 12 options:

run the command crypto key zeroize rsa

run the command ssh enable rsa

create RSA keys

install SSHv3

A

create RSA keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are routing protocols? (Choose all that apply.)

Question 13 options:

A) RIP

B) MAC

C) EIGRP

D) ARP

A

A) RIP
C) EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protocols that guide a router’s decisions on packet forwarding based on the current
condition of the network are .
Question 14 options:

routed protocols

link-state protocols

static protocols

the most secure routing protocols

A

link-state protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consider the following statements:
A: An ACL can be applied only to one router interface.
B: An ACL can apply only to one routed protocol.
C: An ACL can filter packets traveling in only one direction.
Question 15 options:

Statements A and C are incorrect.

Statements A and C are correct.

Statement A is false, and statement B is correct.

Statement A is correct, and statement B is false.

A

Statement A is false, and statement B is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly