• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
The first octet range of a Class B IP address is
128 to 191
Overview: Class First Octet Valid networks #networks #hosts A 1 to 126 1.0.0.0 to 126.0.0.0 2^7 - 2 2^24 - 2 B 128 to 191 128.1.0.0 to 192.254.0.0 2^14 - 2 2^16 - 2 C 192 to 223 192.0.1.0 to 223.255.254.0 2^21 - 2 2^8 - 2 There are reserved addresses which are not mentioned in the valid networks list. 0.0.0.0 (originally defined as a broadcast address) and 127.0.0.0 (still available for loopback address use) are examples of reserved addresses.
Which of the following networks are private internetworks? (Select 3)
172.16.5.0/24
10.1.1.0/24
192.168.1.0/24
Class A 10.0.0.0 - 10.255.255.255 (10/8 prefix)
Class B 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
Class C 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
Which of the following statements are true? (Select 2)
PAP sends the username and password in clear text

CHAP used Message Digest 5 to send information over a link.
10Base5 or thicknet ethernet networks and 10Base2 or thinnet ethernet networks used coaxial cabling.
Coaxial cable was used for which types of ethernet networks? (Select 2)
10Base2
10Base5
IP standard access lists are numbered from 1 to 99 or from 1300 to 1999. Extended access lists are numbered from 100 to 199.
Which of the following statements are true about OSPF? (Select 3)
OSPF supports VLSM.
OSPF floods full routing information every 30 minutes.
OSPF uses cost as metric.
Which of the following access list are correct? (Select 3)
access-list 10 permit any
access-list 1450 deny host 10.2.2.1
access-list 145 permit tcp any host 10.1.1.1 eq 23
The network of 172.16.1.0/27 has 5 bits available for hosts. Using the formula to find the hosts 2^n - 2 = 2^5 - 2 = 30 available hosts on each subnet.
Which devices can we use to divide ethernet networks into multiple collision domains? (Select 3)
Switches
Bridge
Routers
PAP sends the username and password in clear text in the first message.
CHAP uses Message Digest 5 to perform a one-way hash on information send over the link.
What are the Default Administrative Distances for the following route types:
Connected,Static,BGP,EIGRP,IGRP,OSPF,IS-IS,RIP,IBGP
OSPF supports Variable Lenght Subnet Masking or is a classless protocol.
The metric that OSPF uses is cost, which is derived from the bandwidth.
Every 30 minutes LSAs are flooded in the area containing all routing information.
Which command do we use to find out the status of the ports in STP?
Show spanning-tree
How many hosts are available on each of the subnets of the following network 172.16.1.0/27
30
Click on the exhibit. The reference point between a NT2 and NT1 is called?
T
R: Between a TE2 and TA
S: Between a TE1 or TA and NT2
T: Between a NT2 and NT1
U: Between a NT1 and Telco
When we try to ping 10.1.1.1 we receive the following output:

R1#ping 10.1.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
....
Success rate is 0 percent (0/5)

What does a . mean?
There was nothing received before the ping command timed out.
Ping command codes:
! echo reply
. time out
U destination unreachable
N network unreachable
P port unreachable
Q source quench received
M can not fragment
? unknown packet
One of PPP Link Control Protocol features is loop detection. What does LCP use to do this?
Magic number
LCP uses different magic numbers when routers send messages to eachother, if the router receives its own magic number LCP knows the link is looped.
After amending a numbered access list the users complain they can not access the new resource. You checked the access list and confirm the permit statement is there, the users computer's are configured correctly. What could be the cause of this problem?
The new line was added to access list without removing the access list first so it is entered after the implicit deny statement.
When adding lines to a numbered access list the new line will be added in last position and placed after the implicit deny any any statement. It's best to copy the existing list to notepad, modify (add, delete) the list there, remove the existing list from the configuration and add the modified list to the configuration.
RIP uses _________ as metric.
hop count
RIP uses hop count as a metric. A network is unreachable when the hop count is 16.
What is the algorithm called used by ethernet to avoid and recover from collisions?
Carrier Sense Multiple Access with Collision Detection
Ethernet uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithm to avoid collisions and to recover from collisions when they occur.
In STP a port can be in the following states: (Select 5)
Disabled
Listening
Blocking
Learning
Forwarding
A switch port can be in blocking, listening, learning or forwarding state. Listening and learning states are transitory states while blocking and forwarding are stables states. If a port is administratively shutdown the port is in a disabled state for spanning-tree.
How can we influence the metrics of OSPF? (Select 2)
Assign a cost to an interface with the ip ospf cost command.
Changing the bandwidth on an interface with the bandwidth command.
OSPF uses cost as its metric. Cost is derived from the bandwidth of an interface using the 10^8 / bandwidth forumula. By changing the bandwidth on an interface we are influencing the metric of OSPF or we can assign a cost to an interface using the ip ospf cost interface configuration command.
Which are 2 key functions of LMI status messages? (Select 2)
To advice if a PVC is active or inactive.
They act as a keepalive mechanism between the DTE and DCE
LMI or Local Management Interface has several messages, one of the status messages is a keepalive mechanism between the DTE and DCE, the absence of these messages would indicate that the link is down. Another status message signals wheter a PVC is active or inactive.
If a route fails, RIP and IGRP will advertise this with an infinite-metric out of all the interfaces. This is called?
Split horizon with Poison Reverse
When a route fails the router advertises an infinite-metric route about that subnet out of all interfaces, including interfaces that were prevented by split horizon. This is called split horizon with poison reverse.
Which command do we use to display the NAT table?
Show ip nat translations
The show ip nat translations will display the current active translations.
DLCIs are used for indentifying virtual circuits in Frame Relay networks. How does ATM indentifies the virtual circuits? (Select 2)
Virtual channel identifier
Virtual path identifier
The ATM switches forward cells based on the virtual path indentifier (VPI) and virtual channel identifier (VCI) just like Frame Relay forwards frames based on the DLCI.
ICMP is the abbreviation of?
Internet Control Message Protocol
ICMP or Internet Control Message Protocol is used to help manage and control the operation of a TCP/IP network.
The IEEE 802.11 standard is used for?
Wireless LAN
The IEEE 802.11 is used in Wireless LAN technologies. The 802.11b standard transmits at 11Mbps using the 2.4GHz frequency band, 802.11a uses the 5Ghz frequency band and can transmit up to 54 Mbps.
What is the difference between the show access-list command and the show ip access-list command?
The show access-list command will display all configured access-lists (IP, IPX,...) and the show ip access-list command will only display access-lists for the IP protocol.
R1#show ip access-list
R1#show access-lists 101