• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back

A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch?



A. 4, 48
B. 48, 4
C. 48, 1
D. 1, 48
E. 4, 1

B. 48, 4



Each port on a switch is a collision domain while each VLAN is a broadcast domain because broadcast is only forwarded within that VLAN so we have 48 collision domains and 4 broadcast domains on this switch (if all ports are used).

A switch receives a frame on one of its ports. There is no entry in the MAC address table for the destination MAC address. What will the switch do with the frame?


A. drop the frame
B. forward it out of all ports except the one that received it
C. forward it out of all ports
D. store it until it learns the correct port

B. forward it out of all ports except the one that received it

Which address type does a switch use to make selective forwarding decisions?


A. source IP address
B. destination IP address
C. source and destination IP address
D. source MAC address
E. destination MAC address

E. destination MAC address


When a switch receives a frame, it first checks for the destination MAC address and tries to find a matching entry in its MAC address table. If found, the switch then forwards that frame on the corresponding port associated with that MAC address. If no entry is found, the switch will flood that frame out of all (active) ports except the port that sent it.

Which two characteristics apply to Layer 2 switches? (Choose two)


A. increases the number of collision domains
B. decreases the number of collision domains
C. implements VLAN
D decreases the number of broadcast domains
E. uses the IP address to make decisions for forwarding data packets

A. increases the number of collision domains


C. implements VLAN

What is the purpose of assigning an IP address to a switch?


A. provides local hosts with a default gateway address
B. allows remote management of the switch
C. allows the switch to respond to ARP requests between two hosts
D. ensures that hosts on the same LAN can communicate with each other

B. allows remote management of the switch

How does a switch differ from a hub?


A. A switch does not induce any latency into the frame transfer time.
B. A switch tracks MAC addresses of directly-connected devices.
C. A switch operates at a lower, more efficient layer of the OSI model.
D. A switch decreases the number of broadcast domains.
E. A switch decreases the number of collision domains.

B. A switch tracks MAC addresses of directly-connected devices.


A hub is not as “intelligent” as a switch because a hub does not try to remember anything passing to it. It just floods out all the ports (except the one that sent it) when it receives a frame.

Which two statements describe the operation of the CSMA/CD access method? (Choose two)


A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.


E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.



CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. In an Ethernet LAN, before transmitting, a computer first listens to the network media. If the media is idle, the computer sends its data. If the media is not idle (another station is talking), the computer must wait for some time.


When a station transmits, the signal is referred to as a carrier. Carrier Sense means that before a station can send data onto an Ethernet wire, it have to listen to see if another “carrier” (of another station) is present. If another station is talking, this station will wait until there is no carrier present.

On a live network, which commands will verify the operational status of router interfaces? (Choose two)


A. Router#show interfaces
B. Router#show ip protocols
C. Router#debug interface
D. Router#show ip interface brief
E. Router#show start

A. Router#show interfaces


D. Router#show ip interface brief

On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?


A. RTP
B. TCP
C. CDP
D. UDP

C. CDP


Cisco Discovery Protocol (CDP) is a proprietary protocol of Cisco so if you can see the VoIP phone via the “show cdp neighbors” command on a Cisco switch then that phone is from Cisco.

At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate?


A. application
B. transport
C. network
D. physical
E. data link

E. data link

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two)


A. Router#show version
B. Router#show ip interface
C. router#show protocols
D. router#show controllers
E. Router#show running-config

B. Router#show ip interface


D. router#show controllers

Which two characteristics describe the access layer of the hierarchical network design model? (Choose two)


A. layer 3 support
B. port security
C. redundant components
D. VLANs
E. PoE

B. port security


D. VLANs



The primary function of an access-layer is to provide network access to the end user.


The hardware and software attributes of the access layer that support high availability include security services for additional security against unauthorized access to the network through the use of tools such as 802.1x, port security, DHCP snooping, Dynamic ARP Inspection, and IP Source Guard.

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three)


A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.
C. Ethernet hub ports are preconfigured for full-duplex mode.
D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.
E. The host network card and the switch port must be capable of operating in full-duplex mode.

A. There are no collisions in full-duplex mode.
B. A dedicated switch port is required for each full-duplex node.


E. The host network card and the switch port must be capable of operating in full-duplex mode.

What is the subnet address for the IP address 172.19.20.23/28?


A. 172.19.20.0
B. 172.19.20.15
C. 172.19.20.16
D. 172.19.20.20
E. 172.19.20.32

A. 172.19.20.0

What is the best practice when assigning IP addresses in a small office of six hosts?


A. Use a DHCP server that is located at the headquarters.
B. Use a DHCP server that is located at the branch office.
C. Assign the addresses by using the local CDP protocol.
D. Assign the addresses statically on each node.

D. Assign the addresses statically on each node.

Which two statements describe the IP address 10.16.3.65/23? (Choose two)


A. The subnet address is 10.16.3.0 255.255.254.0.
B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.

B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.


D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.

Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets?



A. 1


B. 2


C. 4


D. 8


E. 252


F. 254

B. 2

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?


A. Router# show startup-config
B. Router# show current-config
C. Router# show running-config
D. Router# show memory
E. Router# show flash
F. Router# show processes

C. Router# show running-config

Which statements accurately describe CDP? (Choose three)


A. CDP is an IEEE standard protocol.
B. CDP is a Cisco proprietary protocol.
C. CDP is a datalink layer protocol.
D. CDP is a network layer protocol.
E.CDP can discover directly connected neighboring Cisco devices


F. CDP can discover Cisco devices that are not directly connected.

B. CDP is a Cisco proprietary protocol.


C. CDP is a datalink layer protocol


E.CDP can discover directly connected neighboring Cisco devices

Which router command will configure an interface with the IP address 10.10.80.1/19?


A. router(config-if)# ip address 10.10.80.1/19
B. router(config-if)# ip address 10.10.80.1 255.255.0.0
C. router(config-if)# ip address 10.10.80.1 255.255.255.0
D. router(config-if)# ip address 10.10.80.1 255.255.224.0
E. router(config-if)# ip address 10.10.80.1 255.255.240.0
F. router(config-if)# ip address 10.10.80.1 255.255.255.240

D. router(config-if)# ip address 10.10.80.1 255.255.224.0

What two things does a router do when it forwards a packet? (Choose two)


A. switches the packet to the appropriate outgoing interfaces
B. computes the destination host address
C. determines the next hop on the path
D. updates the destination IP address
E. forwards ARP requests

A. switches the packet to the appropriate outgoing interfaces


C. determines the next hop on the path

Which two of these functions do routers perform on packets? (Choose two)


A. examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets
B. update the Layer 2 headers of outbound packets with the MAC addresses of the next hops
C. examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets
D. examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations
E. update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops
F. update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations

C. examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets


E. update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops

Which statements are true regarding ICMP packets? (Choose two)


A. They acknowledge receipt of TCP segments.
B. They guarantee datagram delivery
C. TRACERT uses ICMP packets.
D. They are encapsulated within IP datagrams.
E. They are encapsulated within UDP datagrams

C. TRACERT uses ICMP packets.
D. They are encapsulated within IP datagrams.

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router.
No routing protocols or other static routes are configured on the router. Which statement is true
about this command?
A. The interface with IP address 192.168.10.2 is on this router.
B. The command sets a gateway of last resort for the router.
C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.
D. The command creates a static route for all IP traffic with the source address 192.168.100.160

C. Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.

Which IOS command is used to initiate a login into a VTY port on a remote router?
A. router# login
B. router# telnet
C. router# trace
D. router# ping


E. router(config)# line vty 0 5
F. router(config-line)# login

B. router# telnet

The following commands are entered on the router:
Burbank(config)# enable secret fortress
Burbank(config)# line con 0
Burbank(config-line)# login
Burbank(config-line)# password n0way1n
Burbank(config-line)# exit
Burbank(config)# service password-encryption
What is the purpose of the last command entered?
A. to require the user to enter an encrypted password during the login process
B. to prevent the vty, console, and enable passwords from being displayed in plain text in the
configuration files
C. to encrypt the enable secret password
D. to provide login encryption services between hosts attached to the router

B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files

What is the effect of using the service password-encryption command?
A. Only the enable password will be encrypted.
B. Only the enable secret password will be encrypted.
C. Only passwords configured after the command has been entered will be encrypted.
D. It will encrypt the secret password and remove the enable secret password from the
configuration.
E. It will encrypt all current and future passwords.

E. It will encrypt all current and future passwords.

If a host experiences intermittent issues that relate to congestion within a network while
remaining connected, what could cause congestion on this LAN?
A. half-duplex operation
B. broadcast storms
C. network segmentation
D. multicasting

B. broadcast storms

Which OSI layer header contains the address of a destination host that is on another network?
A. application
B. session
C. transport
D. network
E. data link
F. physical

D. network

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?
A. Internet layer
B. transport layer
C. application layer
D. network access layer

D. network access layer

Which protocol uses a connection-oriented service to deliver files between end systems?
A. TFTP
B. DNS
C. FTP
D. SNM


E. RIP

C. FTP

Which transport layer protocol provides best-effort delivery service with no acknowledgment
receipt required?
A. HTTP
B. IP
C. TCP
D. Telnet
E. UDP

E. UDP

Which layer of the OSI model controls the reliability of communications between network devices
using flow control, sequencing and acknowledgments?
A. Physical
B. Data-link
C. Transport
D. Network

C. Transport

What must occur before a workstation can exchange HTTP packets with a web server?
A. A UDP connection must be established between the workstation and its default gateway.
B. A UDP connection must be established between the workstation and the web server.
C. A TCP connection must be established between the workstation and its default gateway.
D. A TCP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. An ICMP connection must be established between the workstation and the web server

D. A TCP connection must be established between the workstation and the web server.

How does TCP differ from UDP? (Choose two.)
A. TCP provides best effort delivery.
B. TCP provides synchronized communication.
C. TCP segments are essentially datagrams.
D. TCP provides sequence numbering of packets.
E. TCP uses broadcast delivery.

B. TCP provides synchronized communication.


D. TCP provides sequence numbering of packets.

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the
workstation now use to determine the destination MAC address to be placed into frames directed
toward the server?
A. HTTP
B. DNS
C. DHCP
D. RARP
E. ARP

E. ARP

What are two common TCP applications? (Choose two.)
A. TFTP
B. SMTP
C. SNMP
D. FTP
E. DNS

B. SMTP


D. FTP


Which two options will help to solve the problem of a network that is suffering a broadcast storm?
(Choose two.)
A. a bridge
B. a router
C. a hub
D. a Layer 3 switch
E. an access point

B. a router


D. a Layer 3 switch

What does a host on an Ethernet network do when it is creating a frame and it does not have the
destination address?
A. drops the frame
B. sends out a Layer 3 broadcast message
C. sends a message to the router requesting the address
D. sends out an ARP request with the destination IP address

D. sends out an ARP request with the destination IP address

What type of port would a cable with a DB-60 connector attach?

Serial port

How many siimultaneous Telnet sessions does a Cisco router support by default?

5 sessions by default