A set of rules that governs data communication:
Three or more devices share a link in ________ connection.
Which of the following is true when describing a unique local address?
What does the command o/r 0x2142 provide?
What is the subnetwork address for a host with the IP address 200.10.5.68/28?
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
Which two statements describe the IP address 10.16.3.65/23?
1.The subnet address is 10.16.3.0 255.255.254.0.
2.The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
3.The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
4.The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
Segmentation of a data stream happens at which layer of the OSI model?
How does a host on an Ethernet LAN know when to transmit after a collision has occurred?
1.In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
2.In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
3.You can improve the CSMA/CD network by adding more hubs.
4.After a collision, the station that detected the collision has first priority to resend the lost data.
5.After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?
Which of the following command options are displayed when you use the Router# show frame-relay ? command?
1.dlci
2.neighbors
3.lmi
4.pvc
5.map
In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
What is the maximum data rate for the 802.11g standard?
You have a Cisco mesh network. What protocol allows multiple APs to connect with many redundant connections between nodes?
If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?
1.Switch(config-if)# ip access-group 10
2.Switch(config-if)# switchport port-security maximum 1
3.Switch(config)# access-list 10 permit ip host 1
4.Switch(config-if)# switchport port-security violation shutdown
5.Switch(config)# mac-address-table secure
IGRP uses which of the following as default parameters for finding the best path to a remote network?
1.Hop count
2.MTU
3.Cumulative interface delay
4.STP
5.Path bandwidth value
What command do you type to save the configuration stored in RAM to NVRAM?
What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down."
Which of the following services use UDP?
1.DHCP
2.SMTP
3.SNMP
4.FTP
5.HTTP
6.TFTP
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
A set of rules that governs data communication:
Your Answer : (Not Answered)
Correct Answer : A
None.
Three or more devices share a link in ________ connection.
Your Answer : (Not Answered)
Correct Answer : B
Explanation: A multipoint communication is established when three or many network nodes are connected to each other. Frame relay, Ethernet and ATM are some examples of multipoint connections.
Which of the following is true when describing a unique local address?
Your Answer : (Not Answered)
Correct Answer : D
These addresses are meant for nonrouting purposes like link-local, but they are almost globally unique so it is unlikely they will have an address overlap. Unique local addresses were designed as a replacement for site-local addresses.
What does the command o/r 0x2142 provide?
Your Answer : (Not Answered)
Correct Answer : B
The default configuration setting is 0x2102, which tells the router to load the IOS from flash and the configuration from NVRAM. 0x2142 tells the router to bypass the configuration in NVRAM so that you can perform password recovery.
What is the subnetwork address for a host with the IP address 200.10.5.68/28?
Your Answer : (Not Answered)
Correct Answer : C
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
Your Answer : (Not Answered)
Correct Answer : A
A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet.
Which two statements describe the IP address 10.16.3.65/23?
1.The subnet address is 10.16.3.0 255.255.254.0.
2.The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
3.The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
4.The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
Your Answer : (Not Answered)
Correct Answer : B
The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 - 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
Segmentation of a data stream happens at which layer of the OSI model?
Your Answer : (Not Answered)
Correct Answer : D
The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments.
How does a host on an Ethernet LAN know when to transmit after a collision has occurred?
1.In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
2.In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
3.You can improve the CSMA/CD network by adding more hubs.
4.After a collision, the station that detected the collision has first priority to resend the lost data.
5.After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Your Answer : (Not Answered)
Correct Answer : D
Once transmitting stations on an Ethernet segment hear a collision, they send an extended jam signal to ensure that all stations recognize the collision. After the jamming is complete, each sender waits a predetermined amount of time, plus a random time. After both timers expire, they are free to transmit, but they must make sure the media is clear before transmitting and that they all have equal priority.
Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?
Your Answer : (Not Answered)
Correct Answer : C
A allows the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. A VPN can be set up across any type of link.
Which of the following command options are displayed when you use the Router# show frame-relay ? command?
1.dlci
2.neighbors
3.lmi
4.pvc
5.map
Your Answer : (Not Answered)
Correct Answer : C
The show frame-relay ? command provides many options, but the options available in this question are lmi, pvc, and map.
In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
Your Answer : (Not Answered)
Correct Answer : B
The split-MAC architecture allows the splitting of 802.11 protocol packets between the Cisco LWAPP-based AP, which handles real-time portions of the protocol, and the WLAN controller, which handles those items that are not time sensitive.
What is the maximum data rate for the 802.11g standard?
Your Answer : (Not Answered)
Correct Answer : D
The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps.
You have a Cisco mesh network. What protocol allows multiple APs to connect with many redundant connections between nodes?
Your Answer : (Not Answered)
Correct Answer : B
Each AP in a mesh network runs the Adaptive Wireless Path Protocol (AWPP). This protocol allows RAPs to communicate with each other to determine the best path back to the wired network via the RAP.
If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
Your Answer : (Not Answered)
Correct Answer : C
Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?
1.Switch(config-if)# ip access-group 10
2.Switch(config-if)# switchport port-security maximum 1
3.Switch(config)# access-list 10 permit ip host 1
4.Switch(config-if)# switchport port-security violation shutdown
5.Switch(config)# mac-address-table secure
Your Answer : (Not Answered)
Correct Answer : B
The switchport port-security is an important command, and it's super easy with the CNA; however, from the CLI, you can set the maximum number of MAC addresses allowed into the port, and then set the penalty if this maximum has been passed.
IGRP uses which of the following as default parameters for finding the best path to a remote network?
1.Hop count
2.MTU
3.Cumulative interface delay
4.STP
5.Path bandwidth value
Your Answer : (Not Answered)
Correct Answer : B
IGRP uses bandwidth and delay of the line, by default, to determine the best path to a remote network. Delay of the line can sometimes be called the cumulative interface delay.
What command do you type to save the configuration stored in RAM to NVRAM?
Your Answer : (Not Answered)
Correct Answer : D
To copy the running-config to NVRAM so that it will be used if the router is restarted, use the copy running-config startup-config command (copy run start for short).
What layer of the OSI model would you assume the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down."
Your Answer : (Not Answered)
Correct Answer : A
If you see that a serial interface and the protocol are both down, then you have a Physical layer problem. If you see serial1 is up, line protocol is down, then you are not receiving (Data Link) keepalives from the remote end.
Which of the following services use UDP?
1.DHCP
2.SMTP
3.SNMP
4.FTP
5.HTTP
6.TFTP
Your Answer : (Not Answered)
Correct Answer : A
DHCP, SNMP, and TFTP use UDP.
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
Copyright © 2023 AllExamHub. All Rights Reserved.