• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/207

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

207 Cards in this Set

  • Front
  • Back
06.01
The OSI has seven layers, which layer does SMTP work at?
A. Network
B. Transport
C. Session
D. Application


The OSI has seven layers, which layer does SMTP work at?
A. Network
B. Transport
C. Session
D. Application



06.02
You need to have secure communications using HTTPS. What port number is used by default?
A. 69
B. 23
C. 21
D. 443


You need to have secure communications using HTTPS. What port number is used by default?
A. 69
B. 23
C. 21
D. 443



06.03
You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP


You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP



06.04
What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP


What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP



06.05
You need to login to a Unix server across a network that is not secure. Which of the
following protocols will allow you to remotely administrator this server securely?
A. Telnet
B. SSH
C. SFTP
D. HTTP


You need to login to a Unix server across a network that is not secure. Which of the
following protocols will allow you to remotely administrator this server securely?
A. Telnet
B. SSH
C. SFTP
D. HTTP



06.06
If you can ping by IP address but not by hostname, or FQDN, which of the following port
numbers is related to the server process that is involved?
A. 21
B. 23
C. 53
D. 69
E. 80


If you can ping by IP address but not by hostname, or FQDN, which of the following port
numbers is related to the server process that is involved?
A. 21
B. 23
C. 53
D. 69
E. 80



06.07
Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a Layer 2 destination address.


Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.

C. It uses TCP as the Transport layer protocol.
D. It does not use a Layer 2 destination address.



06.08
What layer 4 protocol is used for a Telnet connection, and what is the default port number?
A. IP, 6
B. TCP, 21
C. UDP, 23
D. ICMP, 21
E. TCP, 23


What layer 4 protocol is used for a Telnet connection, and what is the default port number?
A. IP, 6
B. TCP, 21
C. UDP, 23
D. ICMP, 21
E. TCP, 23



06.09
Which statements are true regarding ICMP packets? (Choose two.)
A. They acknowledge receipt of a TCP segment.
B. They guarantee datagram delivery.
C. They can provide hosts with information about network problems.
D. They are encapsulated within IP datagrams.
E. They are encapsulated within UDP datagrams.


Which statements are true regarding ICMP packets? (Choose two.)
A. They acknowledge receipt of a TCP segment.
B. They guarantee datagram delivery.
C. They can provide hosts with information about network problems.
D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.



06.10
Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP


Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP



06.11
Which of the following services use UDP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP


Which of the following services use UDP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP



06.12
Which of the following are TCP/IP protocols used at the Application layer of the OSI
model? (Choose three.)
A. IP
B. TCP
C. Telnet
D. FTP
E. TFTP


Which of the following are TCP/IP protocols used at the Application layer of the OSI
model? (Choose three.)
A. IP
B. TCP
C. Telnet
D. FTP
E. TFTP




06.13
Which of the following protocols is used by e‑mail servers to exchange messages with one
another?
A. POP3
B. IMAP
C. SMTP
D. HTTP


Which of the following protocols is used by e‑mail servers to exchange messages with one
another?
A. POP3
B. IMAP
C. SMTP
D. HTTP



06.14
If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
A. Application
B. Presentation
C. Session
D. Transport


If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
A. Application
B. Presentation
C. Session
D. Transport



06.15
Which of the following protocols can use TCP and UDP, permits authentication and secure
polling of network devices, and allows for automated alerts and reports on network devices?
A. DNS
B. SNMP
C. SMTP
D. TCP


Which of the following protocols can use TCP and UDP, permits authentication and secure
polling of network devices, and allows for automated alerts and reports on network devices?
A. DNS
B. SNMP
C. SMTP
D. TCP



06.16
You need to transfer files between two hosts. Which two protocol can you use?
A. SNMP
B. SCP
C. RIP
D. NTP
E. FTP


You need to transfer files between two hosts. Which two protocol can you use?
A. SNMP
B. SCP
C. RIP
D. NTP
E. FTP



06.17
What layer in the IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access


What layer in the IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host (The IP Stack is also referred to as the DOD model).
C. Internet
D. Network Access



06.18
You need to make sure that your network devices have a consistent time across all devices.
What protocol do you need to run on your network?
A. FTP
B. SCP
C. NTP
E. RTP


You need to make sure that your network devices have a consistent time across all devices.
What protocol do you need to run on your network?
A. FTP
B. SCP
C. NTP
E. RTP



06.19
Which of the following allows a server to distinguish among different simultaneous
requests from the same host?
A. They have different port numbers.
B. A NAT server changes the IP address for subsequent requests.
C. A server is unable to accept multiple simultaneous sessions from the same host. One
session must end before another can begin.
D. The MAC address for each one is unique.


Which of the following allows a server to distinguish among different simultaneous
requests from the same host?
A. They have different port numbers.
B. A NAT server changes the IP address for subsequent requests.
C. A server is unable to accept multiple simultaneous sessions from the same host. One
session must end before another can begin.
D. The MAC address for each one is unique.



06.20
Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS


Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS



06.21
What might be the problem if a DHCP client suddenly finds itself in a different IP subnet
from the one it should be in?


The most likely problem is that a rogue DHCP server has been introduced into the network
and is handing this device an incorrect lease.



06.22
Name the protocol that uses both TCP ports 20 and 21.

FTP uses both TCP ports 20 and 21 for the data channel and the control channel, respectively.


06.23
What two well-known port numbers does a DNS server use?

A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions.


06.24
Which protocol dynamically reports errors to source hosts by using IP directly to build
packets?


ICMP uses IP directly to build error-reporting packets that are transmitted back to the
originating source host when issues arise during the delivery of data packets. ICMP is also
used during ping and some Traceroute operations.



06.25
What could cause a server that you can ping not to provide the particular TCP/IP service,
such as FTP, HTTP, and so on, that you expect it to offer?


Quite simply, the service might not be running currently on that server. Another possibility
might be that a firewall between the client and the server has blocked the protocol in question
from passing.



06.26
What might cause your email to stop functioning properly when you change Internet
service providers?


Most ISPs have their own mail servers. When you switch service, you might need to point
your mail application to the servers provided by the new service provider.



06.27
Which UNIX command is used for terminal emulation in the same way Telnet is used?

The UNIX command rlogin functions similarly to Telnet.


06.28
What protocol is at the heart of the ping and tracert commands in a Windows operating
system?


ICMP is the protocol that the ping and tracert commands rely on. If you’re having trouble
getting pings and Traceroutes through a router, you might need to check if ICMP is being
allowed thorough.



06.29
Which destination Transport-layer protocol and port number does a TFTP client use to
transfer files over the network?


TFTP servers respond to UDP messages sent to port 69.


06.30
What well-known port numbers do SMTP, POP3, and IMAP4 servers use?

SMTP uses TCP port 25. POP3 uses TCP port 110. IMAP4 uses TCP port 143.


06.31.1
* Provide the missing.
Protocol: ?
Port: 20 (data) and 21 (control)
Transfer Protocol: TCP

Protocol: FTP
Port: 20 (data) and 21 (control)
Transfer Protocol: TCP



06.31.2
* Provide the missing.
Protocol: FTP
Port: ?
Transfer Protocol: TCP


Protocol: FTP
Port: 20 (data) and 21 (control)
Transfer Protocol: TCP



06.31.3
* Provide the missing.
Protocol: FTP
Port: 20 (data) and 21 (control)
Transfer Protocol: ?


Protocol: FTP
Port: 20 (data) and 21 (control)
Transfer Protocol: TCP



06.32.1
* Provide the missing.
Protocol: ?
Port: 161
Transfer Protocol: UDP

Protocol: SNMP
Port: 161
Transfer Protocol: UDP



06.32.2
* Provide the missing.
Protocol: SNMP
Port: ?
Transfer Protocol: UDP


Protocol: SNMP
Port: 161
Transfer Protocol: UDP



06.32.3
* Provide the missing.
Protocol: SNMP
Port: 161
Transfer Protocol: ?


Protocol: SNMP
Port: 161
Transfer Protocol: UDP



06.33.1
* Provide the missing.
Protocol: ?
Port: 22
Transfer Protocol: TCP

Protocol: SSH
Port: 22
Transfer Protocol: TCP



06.33.2
* Provide the missing.
Protocol: SSH
Port: ?
Transfer Protocol: TCP


Protocol: SSH
Port: 22
Transfer Protocol: TCP



06.33.3
* Provide the missing.
Protocol: SSH
Port: 22
Transfer Protocol: ?


Protocol: SSH
Port: 22
Transfer Protocol: TCP



06.34.1
* Provide the missing.
Protocol: ?
Port: 23
Transfer Protocol: TCP

Protocol: Telnet
Port:23
Transfer Protocol: TCP



06.34.2
* Provide the missing.
Protocol: Telnet
Port: ?
Transfer Protocol: TCP


Protocol: Telnet
Port: 23
Transfer Protocol: TCP



06.34.3
* Provide the missing.
Protocol: Telnet
Port:23
Transfer Protocol: ?


Protocol: Telnet
Port:23
Transfer Protocol: TCP




06.35.1
* Provide the missing.
Protocol: ?
Port: 53
Transfer Protocol: Both UDP and TCP
.
Protocol: DNS
Port: 53
Transfer Protocol: Both UDP and TCP



06.35.2
* Provide the missing.
Protocol: DNS
Port: ?
Transfer Protocol: Both UDP and TCP


Protocol: DNS
Port: 53
Transfer Protocol: Both UDP and TCP



06.35.3
* Provide the missing.
Protocol: DNS
Port: 53
Transfer Protocol: ?


Protocol: DNS
Port: 53
Transfer Protocol: Both UDP and TCP



06.36.1
* Provide the missing.
Protocol: ?
Port: 67 (server) and 68 (client)
Transfer Protocol: UDP

Protocol: DHCP
Port: 67 (server) and 68 (client)
Transfer Protocol: UDP



06.36.2
* Provide the missing.
Protocol: DHCP
Port: ?
Transfer Protocol: UDP


Protocol: DHCP
Port: 67 (server) and 68 (client)
Transfer Protocol: UDP



06.36.3
* Provide the missing.
Protocol: DHCP
Port: 67 (server) and 68 (client)
Transfer Protocol: ?


Protocol: DHCP
Port: 67 (server) and 68 (client)
Transfer Protocol: UDP



06.37.1
* Provide the missing.
Protocol: ?
Port: 69
Transfer Protocol: UDP

Protocol: TFTP
Port: 69
Transfer Protocol: UDP



06.37.2
* Provide the missing.
Protocol: TFTP
Port: ?
Transfer Protocol: UDP


Protocol: TFTP
Port: 69
Transfer Protocol: UDP



06.37.3
* Provide the missing.
Protocol: TFTP
Port: 69
Transfer Protocol: ?


Protocol: TFTP
Port: 69
Transfer Protocol: UDP



06.38.1
* Provide the missing.
Protocol: ?
Port: 445
Transfer Protocol: UDP

Protocol: SMB
Port: 445
Transfer Protocol: UDP



06.38.2
* Provide the missing.
Protocol: SMB
Port: ?
Transfer Protocol: UDP

Protocol: SMB
Port: 445
Transfer Protocol: UDP


06.38.3
* Provide the missing.
Protocol: SMB
Port: 445
Transfer Protocol: ?

Protocol: SMB
Port: 445
Transfer Protocol: UDP



06.39.1
* Provide the missing.
Protocol: ?
Port: 3389
Transfer Protocol: : TCP

Protocol: RDP
Port: 3389
Transfer Protocol: : TCP



06.39.2
* Provide the missing.
Protocol: RDP
Port: ?
Transfer Protocol: : TCP

Protocol: RDP
Port: 3389
Transfer Protocol: : TCP



06.39.3
* Provide the missing.
Protocol: RDP
Port: 3389
Transfer Protocol: ?


Protocol: RDP
Port: 3389
Transfer Protocol: : TCP



06.40.1
* Provide the missing.
Protocol: ?
Port: 80
Transfer Protocol: TCP

Protocol: HTTP
Port: 80
Transfer Protocol: TCP



06.40.2
* Provide the missing.
Protocol: HTTP
Port: ?
Transfer Protocol: TCP

Protocol: HTTP
Port: 80
Transfer Protocol: TCP



06.40.3
* Provide the missing.
Protocol: HTTP
Port: 80
Transfer Protocol: ?

Protocol: HTTP
Port: 80
Transfer Protocol: TCP



06.41.1
* Provide the missing.
Protocol: ?
Port: 443
Transfer Protocol: TCP

Protocol: HTTPS
Port: 443
Transfer Protocol: TCP



06.41.2
* Provide the missing.
Protocol: HTTPS
Port: ?
Transfer Protocol: TCP


Protocol: HTTPS
Port: 443
Transfer Protocol: TCP



06.41.3
* Provide the missing.
Protocol: HTTPS
Port: 443
Transfer Protocol: ?


Protocol: HTTPS
Port: 443
Transfer Protocol: TCP



06.42.1
* Provide the missing.
Protocol: ?
Port: 137 (name services), 138 (datagram services), 139 (session services)
Transfer Protocol: TCP (139) and UDP (137 and 138)

Protocol: NetBIOS
Port: 137 (name services), 138 (datagram services), 139 (session services)
Transfer Protocol: TCP (139) and UDP (137 and 138)



06.42.2
* Provide the missing.
Protocol: NetBIOS
Port: ?
Transfer Protocol: TCP (139) and UDP (137 and 138)

Protocol: NetBIOS
Port: 137 (name services), 138 (datagram services), 139 (session services)
Transfer Protocol: TCP (139) and UDP (137 and 138)



06.42.3
* Provide the missing.
Protocol: NetBIOS
Port: 137 (name services), 138 (datagram services), 139 (session services)
Transfer Protocol: ?

Protocol: NetBIOS
Port: 137 (name services), 138 (datagram services), 139 (session services)
Transfer Protocol: TCP (139) and UDP (137 and 138)



06.43.1
* Provide the missing.
Protocol: ?
Port: 110
Transfer Protocol: TCP

Protocol: POP3
Port: 110
Transfer Protocol: TCP


06.43.2
* Provide the missing.
Protocol: POP3
Port: ?
Transfer Protocol: TCP

Protocol: POP3
Port: 110
Transfer Protocol: TCP


06.43.3
* Provide the missing.
Protocol: POP3
Port: 110
Transfer Protocol: ?

Protocol: POP3
Port: 110
Transfer Protocol: TCP


06.44.1
* Provide the missing.
Protocol: ?
Port: 143
Transfer Protocol: TCP

Protocol: IMAP
Port: 143
Transfer Protocol: TCP


06.44.2
* Provide the missing.
Protocol: IMAP
Port: ?
Transfer Protocol: TCP

Protocol: IMAP
Port: 143
Transfer Protocol: TCP


06.44.3
* Provide the missing.
Protocol: IMAP
Port: 143
Transfer Protocol: ?

Protocol: IMAP
Port: 143
Transfer Protocol: TCP


06.45.1
* Provide the missing.
Protocol: ?
Port: 25
Transfer Protocol: TCP

Protocol: SMTP
Port: 25
Transfer Protocol: TCP


06.45.2
* Provide the missing.
Protocol: SMTP
Port: ?
Transfer Protocol: TCP

Protocol: SMTP
Port: 25
Transfer Protocol: TCP


06.45.3
* Provide the missing.
Protocol: SMTP
Port: 25
Transfer Protocol: ?

Protocol: SMTP
Port: 25
Transfer Protocol: TCP


06.46.1
* Provide the missing.
Protocol: ?
Port: 5060/5061
Transfer Protocol: : UDP

Protocol: SIP
Port: 5060/5061
Transfer Protocol: : UDP


06.46.2
* Provide the missing.
Protocol: SIP
Port: ?
Transfer Protocol: : UDP

Protocol: SIP
Port: 5060/5061
Transfer Protocol: : UDP


06.46.3
* Provide the missing.
Protocol: SIP
Port: 5060/5061
Transfer Protocol: : ?

Protocol: SIP
Port: 5060/5061
Transfer Protocol: : UDP


06.47.1
* Provide the missing.
Protocol: ?
Port: 2427/2727
Transfer Protocol: Both UDP and TPC

Protocol: MGCP (Media Gateway Control Protocol)
Port: 2427/2727
Transfer Protocol: Both UDP and TPC


06.47.2
* Provide the missing.
Protocol: MGCP (Media Gateway Control Protocol)
Port: ?
Transfer Protocol: Both UDP and TPC

Protocol: MGCP (Media Gateway Control Protocol)
Port: 2427/2727
Transfer Protocol: Both UDP and TPC


06.47.3
* Provide the missing.
Protocol: MGCP (Media Gateway Control Protocol)
Port: 2427/2727
Transfer Protocol: ?

Protocol: MGCP (Media Gateway Control Protocol)
Port: 2427/2727
Transfer Protocol: Both UDP and TPC



06.48.1
* Provide the missing.
Protocol: ?
Port: 5004/5005
Transfer Protocol: UDP

Protocol: RTP
Port: 5004/5005
Transfer Protocol: UDP


06.48.2
* Provide the missing.
Protocol: RTP
Port: ?
Transfer Protocol: UDP

Protocol: RTP
Port: 5004/5005
Transfer Protocol: UDP


06.48.3
* Provide the missing.
Protocol: RTP
Port: 5004/5005
Transfer Protocol: ?

Protocol: RTP
Port: 5004/5005
Transfer Protocol: UDP


06.49.1
* Provide the missing.
Protocol: ?
Port: 1720
Transfer Protocol: TCP

Protocol: H.323
Port: 1720
Transfer Protocol: TCP


06.49.2
* Provide the missing.
Protocol: H.323
Port: ?
Transfer Protocol: TCP

Protocol: H.323
Port: 1720
Transfer Protocol: TCP


06.49.3
* Provide the missing.
Protocol: H.323
Port: 1720
Transfer Protocol: ?

Protocol: H.323
Port: 1720
Transfer Protocol: TCP



07.01
Which of the following addresses is not allowed on the Internet?
A. 191.192.168.1
B. 191.168.169.254
C. 172.32.255.0
D. 172.31.12.251


Which of the following addresses is not allowed on the Internet?
A. 191.192.168.1
B. 191.168.169.254
C. 172.32.255.0
D. 172.31.12.251 (The Class B private address range is 172.16.0.0 through 172.31.255.255. The given address is in the private range, and thus not publically accessible.)



07.02
A host automatically configured with an address from which of the following ranges indicates
an inability to contact a DHCP server?
A. 169.254.0.X with a mask of 255.255.255.0
B. 169.254.X.X with a mask of 255.255.0.0
C. 169.254.X.X with a mask of 255.255.255.0
D. 169.255.X.X with a mask of 255.255.0.0


A host automatically configured with an address from which of the following ranges indicates
an inability to contact a DHCP server?
A. 169.254.0.X with a mask of 255.255.255.0
B. 169.254.X.X with a mask of 255.255.0.0 (Given address in the APIPA range: 169.254.0.0 through 169.254.255.255.)
C. 169.254.X.X with a mask of 255.255.255.0
D. 169.255.X.X with a mask of 255.255.0.0



07.03

Which statement regarding private IP addresses is most accurate?
A. Private addresses cannot be used in intranets that require routing.
B. Private addresses must be assigned by a registrar or ISP.
C. A remote host across the Internet cannot ping your host if it has a private address.
D. Private addresses can only be used by a single administrative domain.



Which statement regarding private IP addresses is most accurate?
A. Private addresses cannot be used in intranets that require routing.
B. Private addresses must be assigned by a registrar or ISP.
C. A remote host across the Internet cannot ping your host if it has a private address.
D. Private addresses can only be used by a single administrative domain.



07.04
Which of the following is a valid Class A address?
A. 191.10.0.1 255.0.0.0
B. 127.10.0.1 255.0.0.0
C. 128.10.0.1 255.0.0.0
D. 126.10.0.1 255.0.0.0


Which of the following is a valid Class A address?
A. 191.10.0.1 255.0.0.0
B. 127.10.0.1 255.0.0.0
C. 128.10.0.1 255.0.0.0
D. 126.10.0.1 255.0.0.0



07.05
Which of the following is a valid Class B address?
A. 10.1.1.1 255.255.0.0
B. 126.1.1.1 255.255.0.0
C. 129.1.1.1 255.255.0.0
D. 192.168.1.1 255.255.0.0


Which of the following is a valid Class B address?
A. 10.1.1.1 255.255.0.0
B. 126.1.1.1 255.255.0.0
C. 129.1.1.1 255.255.0.0
D. 192.168.1.1 255.255.0.0



07.06
Which of the following describes a broadcast address?
A. All network bits are on (1s).
B. All host bits are on (1s).
C. All network bits are off (0s).
D. All host bits are off (0s).


Which of the following describes a broadcast address?
A. All network bits are on (1s).
B. All host bits are on (1s).
C. All network bits are off (0s).
D. All host bits are off (0s).



07.07
Which of the following is a Layer 2 broadcast?
A. FF:FF:FF:EE:EE:EE
B. FF:FF:FF:FF:FF:FF
C. 255.255.255.255
D. 255.0.0.0


Which of the following is a Layer 2 broadcast?
A. FF:FF:FF:EE:EE:EE
B. FF:FF:FF:FF:FF:FF
C. 255.255.255.255
D. 255.0.0.0



07.08
In a class C IP address, how long is the network address?
A. 8 bits
B. 16 bits
C. 24 bits
D. 32 bits


In a class C IP address, how long is the network address?
A. 8 bits
B. 16 bits
C. 24 bits
D. 32 bits



07.09
Which of the following is true when describing a unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like regular publicly routable
addresses in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.


Which of the following is true when describing a unicast address?
A. Packets addressed to a unicast address are delivered to a single interface.
B. These are your typical publicly routable addresses, just like regular publicly routable
addresses in IPv4.
C. These are like private addresses in IPv4 in that they are not meant to be routed.
D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.



07.10
A host is rebooted and you view the IP address that it was assigned. The address is
169.123.13.34. Which of the following happened?
A. The host received an APIPA address
B. The host received a multicast address
C. The host received a public address
D. The host received a private address


A host is rebooted and you view the IP address that it was assigned. The address is
169.123.13.34. Which of the following happened?
A. The host received an APIPA address
B. The host received a multicast address
C. The host received a public address (Remember that APIPA, the other possibility, is 169.254.X.X.)
D. The host received a private address



07.11
An IPv4 addresses uses 32 bits. How many bits is an IPv6 address?
A. 64
B. 128
C. 192
D. 255


An IPv4 addresses uses 32 bits. How many bits is an IPv6 address?
A. 64
B. 128
C. 192
D. 255




07.12
12. Which of the following is true when describing a multicast address?
A. Packets addressed to a unicast address from a multicast address are delivered to a
single interface.
B. Packets are delivered to all interfaces identified by the address. This is also called a
one-to-many address.
C. It identifies multiple interfaces and is delivered to only one address. This address can
also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.


12. Which of the following is true when describing a multicast address?
A. Packets addressed to a unicast address from a multicast address are delivered to a
single interface.
B. Packets are delivered to all interfaces identified by the address. This is also called a
one-to-many address.

C. It identifies multiple interfaces and is delivered to only one address. This address can
also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.




07.13
Which of the following is true when describing an anycast address?
A. Packets addressed to a unicast address from an anycast address are delivered to a single
interface.
B. Packets are delivered to all interfaces identified by the address. This is also called a
one-to-many address.
C. This address identifies multiple interfaces, and the anycast packet is delivered to only
one address. This address can also be called one-to-one-of-many.
D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.


Which of the following is true when describing an anycast address?
A. Packets addressed to a unicast address from an anycast address are delivered to a single
interface.
B. Packets are delivered to all interfaces identified by the address. This is also called a
one-to-many address.
C. This address identifies multiple interfaces, and the anycast packet is delivered to only
one address. This address can also be called one-to-one-of-many.

D. These addresses are meant for nonrouting purposes, but they are almost globally
unique so it is unlikely they will have an address overlap.




07.14
You want to ping the loopback address of your local host. Which two addresses could
you type?
A. ping 127.0.0.1
B. ping 0.0.0.0
C. ping ::1
D. trace 0.0.::1


You want to ping the loopback address of your local host. Which two addresses could
you type?
A. ping 127.0.0.1
B. ping 0.0.0.0
C. ping ::1
D. trace 0.0.::1




07.15
What two statements about IPv6 addresses are true?
A. Leading zeros are required.
B. Two colons (::) are used to represent successive hexadecimal fields of zeros.
C. Two colons (::) are used to separate fields.
D. A single interface will have multiple IPv6 addresses of different types.


What two statements about IPv6 addresses are true?
A. Leading zeros are required.
B. Two colons (::) are used to represent successive hexadecimal fields of zeros.
C. Two colons (::) are used to separate fields.
D. A single interface will have multiple IPv6 addresses of different types.




07.16
What two statements about IPv4 and IPv6 addresses are true?
A. An IPv6 address is 32 bits long, represented in hexadecimal.
B. An IPv6 address is 128 bits long, represented in decimal.
C. An IPv4 address is 32 bits long, represented in decimal.
D. An IPv6 address is 128 bits long, represented in hexadecimal.


What two statements about IPv4 and IPv6 addresses are true?
A. An IPv6 address is 32 bits long, represented in hexadecimal.
B. An IPv6 address is 128 bits long, represented in decimal.
C. An IPv4 address is 32 bits long, represented in decimal.
D. An IPv6 address is 128 bits long, represented in hexadecimal.




07.17
Which of the following is a Class C network address?
A. 10.10.10.0 255.255.255.0
B. 127.0.0.1 255.255.255.0
C. 128.0.0.0 255.255.0.0
D. 192.255.254.0 255.255.255.0


Which of the following is a Class C network address?
A. 10.10.10.0 255.255.255.0
B. 127.0.0.1 255.255.255.0
C. 128.0.0.0 255.255.0.0
D. 192.255.254.0 255.255.255.0




07.18
Which two of the following are private IP addresses? (Choose two.)
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43


Which two of the following are private IP addresses? (Choose two.)
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43




07.19
Which of the following is a valid IP address that can be used on the Internet (meaning the
public addressing scheme)?
A. 10.10.1.1
B. 168.16.1.1
C. 234.1.1.1
D. 172.30.1.1


Which of the following is a valid IP address that can be used on the Internet (meaning the
public addressing scheme)?
A. 10.10.1.1
B. 168.16.1.1
C. 234.1.1.1
D. 172.30.1.1




07.20
Which of the following is an invalid IP address for a host?
A. 10.0.0.1
B. 128.0.0.1
C. 224.0.0.1
D. 172.0.0.1


Which of the following is an invalid IP address for a host?
A. 10.0.0.1
B. 128.0.0.1
C. 224.0.0.1 (This is a Class D multicast address, and thus not a vaild host address.)
D. 172.0.0.1





07.21
Class A valid address range?

First Valid Host Address: 1.0.0.1
Last Valid Host Address: 126.255.255.254




07.22
Class A private address range?

First Valid Address: 10.0.0.1
Last Valid Address: 10.255.255.254



07.23
Loopback address?

127.0.0.1 (or IPv6 ::1)




07.24
Class B valid address range?

First Valid Host Address: 128.0.0.1
Last Valid Host Address: 191.255.255.254




07.25
Class B private address range?

First Valid Address: 172.16.0.1
Last Valid Address: 172.31.255.254




07.26
Class C valid address range?

First Valid Host Address: 192.0.0.1
Last Valid Host Address: 223.255.255.254





07.27
Class C private address range?

First Valid Address: 192.168.0.1
Last Valid Address: 192.168.255.254




07.28
APIPA address range?

First Valid Address: 169.254.0.0
Last Valid Address: 169.254.255.255
(or. 169.254.X.Y)



07.29
Class D (multicast) address range?

First Valid Network: 224.0.0.1
Last Valid Network: 239.255.255.254




07.30
Class E (reserved) address?

First Valid Network: 240.0.0.1
Last Valid Network: 255.255.255.254






08.01
2^0 = ?

2^0 = 1


08.02
2^1 = ?

2^1 = 2


08.03
2^2 = ?

2^2 = 4


08.04
2^3 = ?

2^3 = 8


08.05
2^4 = ?

2^4 = 16


08.06
2^5 = ?

2^5 = 32


08.07
2^6 = ?

2^6 = 64


08.08
2^7 = ?

2^7 = 128



08.09
2^8 = ?


2^8 = 256



08.10
2^9 = ?


2^9 = 512


08.11
2^10 = ?

2^10 = 1,024


08.16
What is decimal for the binary 10000000?

128


08.17
What is decimal for the binary 11000000?


192


08.18
What is decimal for the binary 11100000?

224


08.19
What is decimal for the binary 11110000?

240


08.20
What is decimal for the binary 11111000?

248


08.21
What is decimal for the binary 11111100?

252


08.22
What is decimal for the binary 11111110?

254


08.23
What is decimal for the binary 11111111?

255


08.24
Formula for the number of subnets given a CIDR notation?

Two steps:

1) n = number borrowed bits
(ie. a class C subnet 255.255.255.224 /27 burrows 3 bits since 11100000 (base2) = 224 (base 10))

2) s = number of subnets = 2^n


08.25
Formula for number of hosts in a subnet?

Two steps:

1) n = number of hostbits

2) h = 2^n - 2


08.26
Formula for subnet block-size?

Two steps:

1) x = decimal value of “borrowed bits”

2) b = block-size = 256-x


08.27
How do you determine the first available subnet given a 255.W.X.Y /n subnet?

Set all “burrowed binary bits” and 'host bits" to 0


08.101
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet
that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 62


What is the maximum number of IP addresses that can be assigned to hosts on a local subnet
that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 62



08.107
On a network, which mask should you use on point-to-point WAN links in order to reduce
the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
E. /31


On a network, which mask should you use on point-to-point WAN links in order to reduce
the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30 (Note that a /30 has 2 host bits, allowing 2^2-2 = 4-2 = 2 hosts. The /31 would have no hosts since 2^1-2 = 2-2 - 0.)
E. /31



08.108
On which of the following devices are you most likely to be able to implement NAT?
A. Hub
B. Ethernet switch
C. Router
D. Bridge


On which of the following devices are you most likely to be able to implement NAT?
A. Hub
B. Ethernet switch
C. Router
D. Bridge



08.109
You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to router
interface?
A. 6
B. 8
C. 30
D. 62
E. 126


You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to router
interface?
A. 6
B. 8
C. 30
D. 62
E. 126



08.110
When configuring the IP settings on a computer on one subnet to ensure it can communicate
with a computer on another subnet, which of the following is desirable?
A. Configure the computer with the same default gateway as the other computer.
B. Configure the computer with the same subnet mask as the other computer.
C. Configure the computer with a default gateway that matches the IP address of the
router’s interface that is attached to the same subnet as the computer.
D. Configure the computer with a subnet mask that matches the IP address of the router’s
interface that is attached to the same subnet as the computer.


When configuring the IP settings on a computer on one subnet to ensure it can communicate
with a computer on another subnet, which of the following is desirable?
A. Configure the computer with the same default gateway as the other computer.
B. Configure the computer with the same subnet mask as the other computer.
C. Configure the computer with a default gateway that matches the IP address of the
router’s interface that is attached to the same subnet as the computer.

D. Configure the computer with a subnet mask that matches the IP address of the router’s
interface that is attached to the same subnet as the computer.



08.112
What is the highest usable address on the 172.16.1.0/24 network?
A. 172.16.1.255
B. 172.16.1.254
C. 172.16.1.253
D. 172.16.1.23


What is the highest usable address on the 172.16.1.0/24 network?
A. 172.16.1.255
B. 172.16.1.254
C. 172.16.1.253
D. 172.16.1.23



08.117
If you are forced to replace a router that has failed to the point that you are unable to access
its current configuration to aid in setting up interface addresses on the new router, which of
the following can you reference for assistance?
A. The default-gateway settings on computers from each subnet that the old router interconnected.
B. The router’s configuration that was periodically cached on the DHCP server.
C. The router’s configuration that was periodically cached on the DNS server.
D. The new router will auto-configure itself with the correct settings.


If you are forced to replace a router that has failed to the point that you are unable to access
its current configuration to aid in setting up interface addresses on the new router, which of
the following can you reference for assistance?
A. The default-gateway settings on computers from each subnet that the old router interconnected.
B. The router’s configuration that was periodically cached on the DHCP server.
C. The router’s configuration that was periodically cached on the DNS server.
D. The new router will auto-configure itself with the correct settings.



08.120
You have one IP address provided from your ISP with a /30 mask. However, you have 300
users that need to access the Internet. What technology will you use to implement a solution?
A. PAT
B. VPN
C. DNS
D. LANs


You have one IP address provided from your ISP with a /30 mask. However, you have 300
users that need to access the Internet. What technology will you use to implement a solution?
A. PAT (PAT will give you approximately 65,000 hosts)
B. VPN
C. DNS
D. LANs




09.01
Which is not a routing protocol?
A. RIP
B. RIPv2
C. RIPv3
D. EIGRP


Which is not a routing protocol?
A. RIP
B. RIPv2
C. RIPv3 (Version 3 it is actually called RIPng… for “next generation)
D. EIGRP



09.02
Which of these best describes dynamic routing?
A. All network addresses must be hand-typed into the routing table.
B. Only a portion of the network address must be hand-typed into the routing table.
C. Routing tables are updated automatically when changes occur in the network.
D. A and B


Which of these best describes dynamic routing?
A. All network addresses must be hand-typed into the routing table.
B. Only a portion of the network address must be hand-typed into the routing table.
C. Routing tables are updated automatically when changes occur in the network.
D. A and B



09.03
Which is true regarding dynamic routing?
A. Static routes are best in large networks thus better to use then dynamic routing protocols.
B. Static routes are automatically added to the routing table, dynamic routes must be
added by hand
C. You must use a DNS and WINS server when configuring dynamic routing
D. Dynamic routes are automatically added to the routing table


Which is true regarding dynamic routing?
A. Static routes are best in large networks thus better to use than dynamic routing protocols.
B. Static routes are automatically added to the routing table, dynamic routes must be
added by hand
C. You must use a DNS and WINS server when configuring dynamic routing
D. Dynamic routes are automatically added to the routing table



09.04
Which of the following is true for MAC addresses?
A. MAC addresses are never local on the LAN and always pass through a router.
B. MAC addresses are always local on the LAN and never go through or past a router.
C. MAC addresses will always be the IP address of Fa0/0 interface.
D. None of the above


Which of the following is true for MAC addresses?
A. MAC addresses are never local on the LAN and always pass through a router.
B. MAC addresses are always local on the LAN and never go through or past a router.
C. MAC addresses will always be the IP address of Fa0/0 interface.
D. None of the above



09.05
The time required by protocols to update their forwarding tables after changes have
occurred are called what?
A. Name resolution
B. Routing
C. Convergence
D. ARP resolution


The time required by protocols to update their forwarding tables after changes have
occurred are called what?
A. Name resolution
B. Routing
C. Convergence
D. ARP resolution



09.06
What command would be used to view the ARP cache on your host?
A. C:\ >show ip route
B. C:\ >show ip arp
C. C:\ >show protocols
D. C:\ >arp -a


What command would be used to view the ARP cache on your host?
A. C:\ >show ip route
B. C:\ >show ip arp
C. C:\ >show protocols
D. C:\ >arp -a



09.07
What happens when a router receives a packet for a network that isn’t listed in the
routing table?
A. It forwards the packet to the next available router.
B. It holds the packet until the address is updated in the routing table.
C. The router will use RIP to inform the host that it can’t send the packet.
D. None of the above


What happens when a router receives a packet for a network that isn’t listed in the
routing table?
A. It forwards the packet to the next available router.
B. It holds the packet until the address is updated in the routing table.
C. The router will use RIP to inform the host that it can’t send the packet.
D. None of the above (This traffic is discarded since based on what the router knows based on the routing table, the destination is unreachable.)



09.08
Which of the following is not a Distance Vector protocol?
A. RIPv1
B. RIPv2
C. OSPF
D. IGRP


Which of the following is not a Distance Vector protocol?
A. RIPv1
B. RIPv2
C. OSPF (OSPF is a link state protocol.)
D. IGRP



09.09
Which two of the following are Link State protocols?
A. RIPv1
B. RIPv2
C. OSPF
D. IS-IS
E. IGRP


Which two of the following are Link State protocols?
A. RIPv1
B. RIPv2
C. OSPF
D. IS-IS

E. IGRP



09.10
Which of the following is a hybrid routing protocol?
A. RIPv2
B. EIGRP
C. IS-IS
D. IGRP


Which of the following is a hybrid routing protocol?
A. RIPv2
B. EIGRP
C. IS-IS
D. IGRP



09.11
What does the acronym IGRP stand for?
A. Interior Gateway Routing Protocol
B. Inside Gateway Redundancy Protocol
C. Interior Group Reliability Protocol
D. Interior Gateway Redundancy Protocol


What does the acronym IGRP stand for?
A. Interior Gateway Routing Protocol
B. Inside Gateway Redundancy Protocol
C. Interior Group Reliability Protocol
D. Interior Gateway Redundancy Protocol



09.12
What EGP protocol is used on the Internet?
A. GGP
B. EGP
C. BGP
D. IGP


What EGP protocol is used on the Internet?
A. GGP
B. EGP
C. BGP
D. IGP



09.13
What are the two categories of IGP protocols?
A. Link State
B. Static
C. Distance Vector
D. EGP


What are the two categories of IGP protocols?
A. Link State
B. Static
C. Distance Vector
D. EGP



09.14
What two pieces of information does a router require to make a routing decision?
A. Destination network (address)
B. Destination MAC address
C. Application layer protocol
D. Neighbor router


What two pieces of information does a router require to make a routing decision?
A. Destination network (address)
B. Destination MAC address
C. Application layer protocol
D. Neighbor router (If the MAC is not on a local LAN, the router forwards the packet to its neighbor).



09.15
Where does a frame have to carry a packet if it is destined for a remote network?
A. Default gateway
B. Neighbor host
C. Switch
D. Hub


Where does a frame have to carry a packet if it is destined for a remote network?
A. Default gateway
B. Neighbor host
C. Switch
D. Hub



09.16
Where along the IP routing process does a packet get changed?
A. Router
B. Host A
C. Destination device
D. Host B


Where along the IP routing process does a packet get changed?
A. Router
B. Host A
C. Destination device (The frame gets changed along the way -- for example, a router changes the sender information to its own -- but the packet remains unchanged, destined only for the selected recipient.)
D. Host B



09.17
When all routers in a network agree about the path from one point to another, the network
is said to be what?
A. Dynamic
B. Static
C. Secure
D. Converged


When all routers in a network agree about the path from one point to another, the network
is said to be what?
A. Dynamic
B. Static
C. Secure
D. Converged



09.18
What type of request must a client send if it does not know the destination MAC address?
A. ARP broadcast
B. Multicast
C. ICMP redirect
D. Reverse ARP


What type of request must a client send if it does not know the destination MAC address?
A. ARP broadcast
B. Multicast
C. ICMP redirect
D. Reverse ARP



09.19
You need to perform maintenance on a router in your corporate office. It is important that
the network does not go down. What can you do to accomplish your goal?
A. Configure BGP on the router
B. Implement NAT on the router
C. Configure a static route on the router that temporarily re-routes traffic through
another office
D. Implement convergence on the router


You need to perform maintenance on a router in your corporate office. It is important that
the network does not go down. What can you do to accomplish your goal?
A. Configure BGP on the router
B. Implement NAT on the router
C. Configure a static route on the router that temporarily re-routes traffic through
another office

D. Implement convergence on the router



09.20
When are you most likely to see a request-timed-out message?
A. When an unknown error has occurred
B. When you have used the arp -a command incorrectly
C. When a known error has occurred
D. When you are using a hybrid routing protocol


When are you most likely to see a request-timed-out message?
A. When an unknown error has occurred (If the error is a known error, the code would be “destination unreachable.”
B. When you have used the arp -a command incorrectly
C. When a known error has occurred
D. When you are using a hybrid routing protocol



09.21
True/False: RIPv2 is a hybrid routing protocol.

False. RIP and RIPv2 are both Distance Vector protocols.



09.22
True/False: RIPv1 is a Link State routing protocol.

False. RIP and RIPv2 are both Distance Vector protocols.



09.23
True/False: EIGRP is a non-proprietary routing protocol.

True. EIGRP was proprietary, but Cisco opened up EIGRP for other vendors to use in 2013.



09.24
True/False: EIGRP is harder to configure than RIP.

False. EIGRP has basically the same configuration as RIP.



09.25
You need a routing protocol that can be run in a very large network with routers from
multiple vendors. What routing protocol would be your best choice?


RIP does not work well in large networks, so OSPF would be the best answer. EIGRP is not
the answer because it only runs on routers manufactured to use it -- mostly Cisco and a handful of other adopters).




09.26
Which type of routing would you configure on a router if you needed to use as little router
overhead and CPU processing as possible?


Static routing



09.27
You are trying to reach a server on another subnet. What will be the destination hardware
address of a frame sent from your host?


The MAC address of your default gateway (router)



09.28
You are trying to reach a server on another subnet. What will be the destination IP address
of a packet sent from your host?


The IP address of the server



09.29
A server has received a frame from your remote host. What will be the destination hardware
address of the frame?


The MAC address of the router sending the frame to the server



09.30
A server has received a packet from your remote host. What will be the destination
IP address of the packet?


The IP address of the server




10.01
Which of the following protocols support VLSM, summarization, and discontiguous networking?
(Choose three.)
A. RIPv1
B. IGRP
C. EIGRP
D. OSPF
E. BGP
F. RIPv2



Which of the following protocols support VLSM, summarization, and discontiguous networking?
(Choose three.)
A. RIPv1
B. IGRP
C. EIGRP
D. OSPF

E. BGP
F. RIPv2



10.02
Which of the following are considered distance-vector routing protocols? (Choose two.)
A. OSPF
B. RIP
C. RIPv2
D. IS-IS


Which of the following are considered distance-vector routing protocols? (Choose two.)
A. OSPF
B. RIP
C. RIPv2

D. IS-IS



10.03
Which of the following are considered link-state routing protocols? (Choose two.)
A. OSPF
B. RIP
C. RIPv2
D. IS-IS


Which of the following are considered link-state routing protocols? (Choose two.)
A. OSPF
B. RIP
C. RIPv2
D. IS-IS



10.04
Which of the following is considered a hybrid routing protocol?
A. OSPF
B. BGP
C. RIPv2
D. IS-IS
E. EIGRP


Which of the following is considered a hybrid routing protocol?
A. OSPF
B. BGP
C. RIPv2
D. IS-IS
E. EIGRP



10.05
Why would you want to use a dynamic routing protocol instead of using static routes?
A. Less overhead on the router
B. Dynamic routing is more secure
C. Dynamic routing scales to larger networks
D. The network runs faster


Why would you want to use a dynamic routing protocol instead of using static routes?
A. Less overhead on the router
B. Dynamic routing is more secure
C. Dynamic routing scales to larger networks
D. The network runs faster (FYI -- Networks may actually run slower using dynamic routing since the processor devotes some processor time and interface bandwidth to converge routing tables.)



10.06
Which of the following is a vendor-specific routing protocol?
A. IGRP
B. OSPF
C. RIPv1
D. EIGRP
E. IS-IS
F. None of the above

Which of the following is a vendor-specific routing protocol?
A. IGRP
B. OSPF
C. RIPv1
D. EIGRP
E. IS-IS
F. None of the above (Cisco made EIGRP available in early 2013.)


10.07
RIP has a long convergence time and users have been complaining of response time when a
router goes down and RIP has to reconverge. Which can you implement to improve convergence
time on the network?
A. Replace RIP with static routes
B. Update RIP to RIPv2
C. Update RIP to OSPF using Link State
D. Replace RIP with BGP as an exterior gateway protocol


RIP has a long convergence time and users have been complaining of response time when a
router goes down and RIP has to reconverge. Which can you implement to improve convergence
time on the network?
A. Replace RIP with static routes
B. Update RIP to RIPv2
C. Update RIP to OSPF using Link State
D. Replace RIP with BGP as an exterior gateway protocol



10.08
What is the administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120


What is the administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120



10.09
Which of the following protocols will advertise routed IPv6 networks?
A. RIP
B. RIPng
C. OSPFv2
D. EIGRPv3


Which of the following protocols will advertise routed IPv6 networks?
A. RIP
B. RIPng
C. OSPFv2
D. EIGRPv3



10.10
What is the difference between static and dynamic routing?
A. You use static routing in large, scalable networks
B. Dynamic routing is used by a DNS server
C. Dynamic routes are added automatically
D. Static routes are added automatically



What is the difference between static and dynamic routing?
A. You use static routing in large, scalable networks
B. Dynamic routing is used by a DNS server
C. Dynamic routes are added automatically
D. Static routes are added automatically



10.11
Which routing protocol has a maximum hop count of 15?
A. RIPv1
B. IGRP
C. EIGRP
D. OSPF



Which routing protocol has a maximum hop count of 15?
A. RIPv1
B. IGRP
C. EIGRP
D. OSPF



10.12
Which of the following describes routing convergence?
A. The time it takes for your VPN to connect
B. The time required by protocols to update their forwarding tables after changes
have occurred
C. The time required for IDS to detect an attack
D. The time required by switches to update their link status and go into forwarding state



Which of the following describes routing convergence?
A. The time it takes for your VPN to connect
B. The time required by protocols to update their forwarding tables after changes
have occurred

C. The time required for IDS to detect an attack
D. The time required by switches to update their link status and go into forwarding state



10.13

What routing protocol is typically used to connect AS’s on the Internet?
A. IGRP
B. RIPv2
C. BGP
D. OSPF


What routing protocol is typically used to connect AS’s on the Internet?
A. IGRP
B. RIPv2
C. BGP
D. OSPF



10.14
RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more
efficiently. What type of transmission does RIPv2 use to accomplish this task?
A. Broadcasts
B. Multicasts
C. Telecast
D. None of the above



RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more
efficiently. What type of transmission does RIPv2 use to accomplish this task?
A. Broadcasts
B. Multicasts
C. Telecast
D. None of the above



10.15
Which routing protocols have an administrative distance of 120? (Choose two.)
A. RIPv1
B. RIPv2
C. EIGRP
D. OSPF



Which routing protocols have an administrative distance of 120? (Choose two.)
A. RIPv1
B. RIPv2

C. EIGRP (AD of 90)
D. OSPF (AD of 110)



10.16
Which of the following routing protocols uses AS-Path as one of the methods to build the
routing tables?
A. OSPF
B. IS-IS
C. BGP
D. RIP
E. EIGRP



Which of the following routing protocols uses AS-Path as one of the methods to build the
routing tables?
A. OSPF
B. IS-IS
C. BGP
D. RIP
E. EIGRP



10.17
Which IPv6 routing protocol uses UDP port 521?
A. RIPng
B. EIGRPv6
C. OSPFv3
D. IS-IS



Which IPv6 routing protocol uses UDP port 521?
A. RIPng
B. EIGRPv6
C. OSPFv3
D. IS-IS



10.18
What EIGRP information is held in RAM and maintained through the usage of hello and
update packets? (Select all that apply.)
A. DUAL table
B. Neighbor table
C. Topology table
D. Successor route



What EIGRP information is held in RAM and maintained through the usage of hello and
update packets? (Select all that apply.)
A. DUAL table
B. Neighbor table
C. Topology table (EIGRP holds 3 tables in memory: Routing, Topology and Neighbor. Routing is share, but each router builds their Neighbor and Topology tables using hello packets.)
D. Successor route (This is “sort of” -- the successor route is stored in the Routing Table. But it is not listed as correct in the book.)



10.19
Which is true regarding EIGRP successor routes?
A. Successor routes are saved in the neighbor table.
B. Successor routes are stored in the DUAL table.
C. Successor routes are used only if the primary route fails.
D. A successor route is used by EIGRP to forward traffic to a destination.



Which is true regarding EIGRP successor routes?
A. Successor routes are saved in the neighbor table.
B. Successor routes are stored in the DUAL table.
C. Successor routes are used only if the primary route fails.
D. A successor route is used by EIGRP to forward traffic to a destination. (Successor routes are preferred routes in EIGRP. Think "successful." They are stored in the routing table.)



10.20
Which of the following uses only hop count as a metric to find the best path to a remote
network?
A. RIP
B. EIGRP
C. OSPF
D. BGP



Which of the following uses only hop count as a metric to find the best path to a remote
network?
A. RIP
B. EIGRP
C. OSPF
D. BGP



10.21
The default administrative distance of RIP is___________________?


120


10.22
The default administrative distance of EIGRP is___________________?


90


10.23
The default administrative distance of RIPv2 is___________________?

120


10.24
The default administrative distance of a static route is___________________?


1


10.25
What is the version or name of RIP that is used with IPv6?


RIPng (Next Generation).


10.26
What is the version or name of OSPF that is used with IPv6?


OSPFv3


10.27
What is the version or name of EIGRP that is used with IPv6?


EIGRPv6


10.28
When would you use BGP?


To connect two autonomous systems (ASs) together


10.30
Is BGP considered link state or distance vector?


Neither. BGP is a path vector protocol.