The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? Same-layer interaction Adjacent-layer interaction OSI model All of these answers are correct. Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) Ethernet HTTP IP UDP SMTP TCP. Which of the following protocols are examples of TCP/IP data-link layer protocols? (Choose two answers.) Ethernet HTTP UDP SMTP TCP PPP IP. The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data-link header and trailer, is an example of what? Data encapsulation Same-layer interaction OSI model All of these answers are correct. Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers? Data Chunk Segment Frame Packet. Which OSI encapsulation term can be used instead of the term frame? Layer 1 PDU Layer 2 PDU Layer 3 PDU Layer 5 PDU Layer 7 PDU Layer 4 PDU. Which of the following terms represents L3PDU in the OSI model, which includes the network layer header and its encapsulated data? Packet Data Segment Frame. IP functions at what layer of the OSI Reference Model? Network Physical Session Transport. A user has sent a request to the server. What process does the server go through to determine what service is being requested by the user? De-encapsulation Fragmentation Segmentation Encapsulation. The term segment refers to which layer PDU? Internetwork layer PDU Network Access PDU Application layer PDU Transport layer PDU. Which of the following are advantages of using multimode fiber for an Ethernet link instead of UTP or single-mode fiber? To achieve the longest distance possible for that single link. To extend the link beyond 100 meters while keeping initial costs as low as possible. To make use of an existing stock of laser-based SFP/SFP+ modules. To make use of an existing stock of LED-based SFP/SFP+ modules. Which of the following is true about the CSMA/CD algorithm? The algorithm never allows collisions to occur. Collisions can happen, but the algorithm defines how the computers should notice collision and how to recover. The algorithm works with only two devices on the same Ethernet. None of the other answers is correct. Which of the following are true about the format of Ethernet addresses? (Choose three answers.) Each manufacturer puts a unique OUI code into the first 2 bytes of the address. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. Each manufacturer puts a unique OUI code into the first half of the address. The part of the address that holds this manufacturer’s code is called the MAC. The part of the address that holds this manufacturer’s code is called the OUI. The part of the address that holds this manufacturer’s code has no specific name. Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.) Burned-in address Unicast address Broadcast address Multicast address. In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? Only the devices that use cables are using Ethernet. Only the devices that use wireless are using Ethernet.
Both the devices using cables and those using wireless are using Ethernet. None of the devices are using Ethernet. A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information about hostname? ARP ping DNS None of these answers is correct. Which of the following are true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? The host always sends packets to its default gateway. The host never sends packets to its default gateway. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host. The host sends packets to its default gateway if the destination IP address is in the same subnet as the host. Which of the following does a router normally use when making a decision about routing TCP/IP packets? Destination MAC address Source MAC address Destination IP address Source IP address Destination MAC and IP addresses. Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC2. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2. Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? (Choose two answers.) R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence. R1 will forward data-link frames to R2 using an HDLC header/trailer. R1 will forward data-link frames to R2 using an Ethernet header/trailer. When the Cisco IOS CLI is initially accessed via console, Telnet, or SSH, with no extra privileges, which mode is the user placed into? Enable mode Boot mode Configuration mode User mode. Which answers encrypt the password that will be required of a user after they type the enable EXEC command? enable password password-value enable password-value password password-value enable secret password-value. What will a switch compare in its MAC table to be able to forward a frame? Destination MAC address Source MAC address Destination IP address Source IP address. Which type of memory does a switch use to build the MAC address table ? DRAM NVRAM CAM Flash
. What are common LAN Layer 1 problem indicators? (Choose two) Late collisions Incorrect IP addressing
Incorrect VLAN assignments Collisions High-bandwidth utilization. How does a switch build its MAC address table By listening to incoming frames and examining the source MAC address By listening to outgoing frames and examining the destination MAC address By listening to incoming frames and examining the destination MAC address By listening to outgoing frames and examining the source MAC address. What is the default aging time for MAC table entries that have not been used? 300 seconds 3 minutes 30 seconds 300 milliseconds. After power on, a frame arrives at a switch. The switch had not yet learned the source MAC address of that frame. Which actions must the switch take in this case? The switch adds the destination MAC address to the MAC address table. The switch checks the frame for loops. The switch adds the source MAC address to its MAC table. The switch adds the source and destination MAC address to the MAC address table. If an engineer issued the copy running-config startup-config command, which Cisco memory type would the configuration be copied to? ROM Flash NVRAM RAM. Which command will generate the SSH encryption keys? crypto key generate rsa crypto key modulus ssh crypto key modulus rsa crypto key generate ssh. Bob has an IP address on his computer, and can ping the interface of the switch. SSH is enabled on the vty lines, but the user Bob cannot log in to the switch via SSH?
What needs to be added to the configuration? Generate the RSA key pair for SSH Make Bob’s password at least eight characters long Require local authentication Configure a domain name for the switch. On a VLAN in which all RSTP priorities tie, the current root switch just failed. Which switch will take over as the root? Switch 0010.3245.0001 Switch 0010.3245.0122 Switch 0004.3265.0125 Switch 00A0.3245.0131. Which of the following are LACP modes that you can use with EtherChannel configuration? Select 2 answers Passive Desirable On Auto Active. Which of the listed configuration options for Etherchannel load distribution is valid? Select 3 answers src-ip-dst-port src-mac-dst-ip src-mac dst-ip src-dst-mac. When configuring interfaces to be part of the same EtherChannel, which of the following should you configure identically? Select 4 answers Access VLAN on an access port Duplex MAC addresses on a trunk or access port Speed Allowed VLANs on a trunk. Which spanning-tree modes are Cisco proprietary? Select 2 answers PVST+ RPVST+ STP MSTP RSTP MST. Which of the following would be in a forwarding state in RSTP? (Choose two) Designated ports The root port on a nonroot switch Alternate ports All the root ports on the root switch
. What is the default bridge priority on Cisco switches? 4096 65535 32768 32765. On which switch would you always find a root port? Nonroot switch Switch that has a designated port Switch that does not have any blocking ports Switch that has forwarding ports Root switch. If spanning tree is disabled, what are the potential issues with a redundant Layer 2 network design? Select 3 answers Duplicate IP addresses MAC database instability TTL expiring Broadcast storms Multiple (duplicate) frames being seen. What is the correct order for the following steps in the spanning-tree algorithm?
A: Elect a designated port for each segment.
B: Elect a root port for each nonroot switch.
C: Root ports and designated ports transition to the forwarding state.
D: Elect a root bridge. Steps D, B, A, C Steps A, C, D, B Steps D, C, B, A Steps A, C, B, D. An STP topology with three switches has one link between each pair of switches. Which answer best describes the primary decision point as to which non-root switch has a designated port on the link between switches, and which does not? The switch with the lowest priority setting would become designated, and the other switch would block.
The switch with the lowest root cost would become designated, and the other switch would block.
The switch with the highest root cost would become designated, and the other switch would block.
The device with the lowest BID would always become designated, and the other switch would block.
The device with the highest BID would become designated, and the other switch would block.
. Which of the following are functions provided by Spanning Tree Protocol? Select 3 answers
Prevents broadcast storms
Prevents multiple copies of a single frame from being forwarded
Places a Layer 3 port into blocking state if it is a parallel (redundant) path that would cause a loop
Prevents MAC table instability
Uses TTL to control loops in the network
. In a layer 2 switched LAN, all links are running at 100 Mbps. STP uses all default port cost configuration. Non-root switch SW2 receives a Hello on its root port, with that Hello listing a root cost of 38. If SW2 then forwards a Hello out some other port, what root cost will SW2 list in that Hello? 38
57 19 None of these are correct
42. Which of the following are characteristics of 802.1Q? Select 4 answers Uses the concept of a native VLAN
Does not encapsulate a normal Ethernet frame before forwarding, but instead inserts a header after the destination and source MAC addresses
Supported by 2960 switches
Supported by IP Phones
Encapsulates a normal Ethernet frame before forwarding it over a trunk
Cisco proprietary
. Which Cisco IOS command can be used to display which VLANs are supported over a specific configured switch trunk?
show trunk
show interfaces trunk
show switchport trunk
show interfaces switchport trunk
. Two switches are connected using a crossover cable. Using the combinations of configurations for the switchport mode mode interface subcommand (one on each end of the crossover cable on each switch), which of the following are accurate? Select 2 answers
dynamic desirable and dynamic auto will end up in a trunk being formed.
access and trunk would end up in a negotiated trunk.
trunk and dynamic auto will end up in a trunk being formed.
dynamic auto and dynamic auto will end up in a dynamic trunk being negotiated.
. What is true about the command switchport nonegotiate?
If connected to a switch that uses dynamic desirable, the neighboring switch will not trunk.
Using this command prevents a switchport from being a trunk port.
This will cause DTP packets to be sent, preventing a trunk from being negotiated.
This is on by default.
It is used on a router to prevent VLAN hopping.
. Which command administratively disables trunking on a 2960XR switch interface, such that the switch cannot use a trunking protocol on the interface? Assume that all commands shown in the answers are used in interface configuration mode. The no switchport trunk command
The no switchport mode trunk command
The switchport trunk disable command
The switchport mode off command
The switchport mode access command
The switchport access vlan x command
. One of the key differences between ISL and 802.1q is the concept of a native VLAN. Which of the following is true about the native VLAN and its use in ISL and 802.1Q?
802.1Q tags frames for the native VLAN as if they were in reserved VLAN 999
ISL does not encapsulate frames if they are a part of the native VLAN
ISL encapsulates frames for the native VLAN as if they were in reserved VLAN 999
802.1Q does not tag (add) a trunking header to frames if they are a part of the native VLAN
. Which options correctly list the addresses covered by the indicated address class? Select 2 answers Class B—addresses beginning with 128–191, inclusive
Class C—addresses beginning with 192–223, inclusive
Class B—addresses beginning with 127–191, inclusive
Class C—addresses beginning with 172–212, inclusive
. All IP addresses that begin with 186.72 would be considered part of which address class?
Class C
Class A
Class B
Class D
. Which two options are true about IP addressing rules? Select 2 answers
Addresses in the same subnet do not need to be separated by a router.
Addresses in different subnets do not need to be separated by a router.
Addresses in different subnets need to be separated by a router.
Addresses in the same subnet need to be separated by a router.
. What is the prefix notation mask for DDN mask 255.255.252.0?
/22
/23
/25
/24
. There is a reserved address range between Class A and Class B address ranges. What is this reserved range used for?
Loopback
Anycast
Multicast
Broadcast
. Which version of IP was developed with the intention of solving the address exhaustion problem that exists with IPv4?
IP Next Generation
IP Version 6
IP Version 5
IP Version 8
. What is the formula to calculate the possible number of subnets in an IP network, assuming that the same mask is used in all subnets?
2 ^ network bits – host bits
2 ^ borrowed bits
2 ^ borrowed bits – 2
2 ^ host bits – 2
. To which subnet does host 192.168.148.76/29 belong?
192.165.148.56
192.168.148.64
192.168.148.72
192.168.148.80
. You have been assigned a class B IP network to use in your Enterprise. Which one answer offers the closest estimate to the number of IPv4 addresses in that class B network?
Over 1200
254
Over 16 million
Over 65,000
. What are the default masks for each network class?
class A – 255.0.0.0, class B – 255.0.255.0, class C – 255.255.255.0
class A – 255.0.0.0, class B – 255.255.0.0, class C – 255.255.255.255
class A – 255.0.0.0, class B – 255.255.0.0, class C – 255.255.255.0
class A – 255.255.0.0, class B – 255.255.255.0, class C – 255.255.255.255
. How many usable hosts are there per subnet if you have the address 192.168.8.0 with a subnet mask of 255.255.255.240?
14 8
16 4. An engineer at Acme Corporation was tasked with the subnetting design for a new headquarters location. The only information she was given is shown here: Select 2 answers
Use the 172.20.0.0/16 address space.
Plan for at least 400 different subnets of the same size.
Plan for each subnet to have at least 50 hosts per subnet.
How many subnet and host bits would be required? Subnet: 10, Host: 6
Subnet: 9, Host: 7
Subnet: 11, Host: 5
Subnet: 8, Host: 8
. For the IP address 172.30.197.0/23, which statements are correct? Select 2 answers
It utilizes 15 network bits.
It utilizes 11 host bits.
It utilizes 7 subnet bits.
It utilizes 9 host bits.
. Which of the following IP address/mask combinations, if configured on a working router interface, would create a connected route for an entire classful network, instead of a route for a subnet of a classful network? Select 2 answers
10.1.1.1/16
172.16.1.1/16
172.16.4.3/24
172.16.8.1/22
192.168.1.1/24
10.2.2.2/28
. The size of a subnet is calculated with the formula 2 raised to the H minus 2. Why are two hosts subtracted from this possible size?
One host address is reserved for the subnet number, and the other is reserved for the subnet broadcast address.
One host address is reserved for the default gateway address, and another is reserved for the local broadcast address.
One host address is reserved for the DHCP server, and the other is reserved for the DNS server.
One host address is reserved for the local broadcast address, and the other is reserved for the subnet broadcast address.
. Which of the following addresses could be used as private IP addresses? Select 2 answers
172.15.9.3
172.31.0.3
10.13.0.11
192.186.0.3
127.0.0.1
. How many bits are used for subnetting in a subnet, based on this sample address: 125.168.32.99 255.255.128.0?
9 bits
12 bits
11 bits
10 bits
. Given a prefix length of /29, what is the correct mask in DDN?
255.255.255.128
255.255.255.248
255.255.255.240
255.255.255.192
255.255.255.252
255.255.255.224
. Which of the following is true about the classful address 128.44.2.2?.
The network broadcast address is 128.255.255.255.
The network ID is 128.44.0.0.
It is Class A.
The first valid host on the network would be 128.44.1.0.
. Which options correctly list the addresses covered by the indicated address class? Select 2 answers
Class C—addresses beginning with 172–212, inclusive
Class B—addresses beginning with 128-191, inclusive
Class C—addresses beginning with 192–223, inclusive
Class B—addresses beginning with 128-192, inclusive
. A customer support rep at the help desk is working a problem. The problem record mentions address 172.16.1.1 and mask 255.255.254.0. At a lunch-and-learn session yesterday, the rep heard the network engineering team say that they avoided VLSM, and used only a single subnet mask in network 172.16.0.0. Which of the following answers is accurate regarding this implementation of network 172.16.0.0 and its subnetting plan? Select 2 answers
Each subnet supports 126 hosts
The network supports up to 512 subnets
Each subnet supports 510 hosts
The network supports up to 256 subnets
Each subnet supports 254 hosts
The network supports up to 128 subnets
. If subnetting class B network 172.18.0.0 using subnet mask 255.255.240.0 for all subnets, which answers list an address in the second subnet? Select 2 answers
172.18.33.5
172.18.16.10
172.18.8.11
172.18.31.200
. What questions should be asked when planning subnetting? Select 2 answers
How many hosts will be on each subnet?
How many subnets will be needed?
How many routers will be connected to each subnet?
What is the speed of the hosts’ interfaces?
What type of operating system is running?
. When using static routes, you type in ip route 10.1.1.0 255.255.255.0, and two options are available to specify the next hop as the next parameters in the command. Select the two valid choices.
via 10.2.2.2
via serial1/0/1
serial1/0/1
10.2.2.2
pass-to 10.2.2.2
. What are the two ICMP messages used by the ping command?
Time exceeded and destination unreachable
Echo request and echo reply
Timestamp and timestamp reply
Router advertisement and router solicitation
. Which Cisco IOS command would be used on a switched interface to enable it to become a routed interface?
routing enable
routing port
switchport disable
no switchport
. Which of the answers list a configuration step on a Cisco access switch to support IP routing using only SVIs? Select 3 answers
Each routed physical interface must be configured with an IP address.
The switch is enabled for IP routing.
The VLAN associated with the VLAN interface must be configured and active.
Each VLAN interface must be configured with an IP address.
. Which command will identify routers along the path to the destination host?
ping
traceroute
ipconfig ifconfig. Which switch Cisco IOS command moves the user from global config mode to the correct mode to configure a management IP address that exists in VLAN 300?
vlan 300
interface dot1q 300
interface vlan 300
encapsulation dot1q 300
. Which two steps must you perform to enable router-on-a-stick on a router subinterface?
Configure the subinterface with an IP address.
Configure full-duplex and speed.
Configure IEEE 802.1q encapsulation for the VLAN.
Configure an IP route to the VLAN.
. When you are configuring routed ports on a Layer 3 switch, what do the physical interfaces act as?
An SVI interface
A switchport interface
A Layer 2 interface
A Layer 3 interface
. How would you log in to router R1, which has IP address 10.10.10.1, from Router R2 using SSH with a username of bozo?
ssh –l 10.10.10.1 bozo
ssh 10.10.10.1 –l bozo
ssh –l bozo 10.10.10.1
ssh username bozo 10.10.10.1
. Which answer shows the correct configuration for 802.1Q encapsulation on a router subinterface for VLAN 2?
interface FastEthernet 0/1.2 encapsulation dot1q 2 ip address 192.168.2.2 255.255.255.0
interface FastEthernet 0/1.2 ip address 192.168.2.2 255.255.255.0
interface FastEthernet 0/1.2 subinterface vlan 2 ip address 192.168.2.2 255.255.255.0
interface FastEthernet 0/1 encapsulation dot1q 2 ip address 192.168.2.2 255.255.255.0
. You are troubleshooting connectivity issues with a router. You type in the command show ip interface brief. You notice that the status is “administratively down” and the protocol is “down.” What is the meaning of this information?
Layer 1 and Layer 2 of this interface are functioning.
The interface is not shut down, but the physical layer has a problem.
Layer 2 has a problem.
The interface has a shutdown command configured on it.
. Which type of error is purposefully triggered when using the traceroute command?
ICMP TTL Exceeded
ICMP Redirect
ICMP Destination Unreachable
ICMP Information Reply
. Which Cisco IOS command can be used on a router to view the different VLANs that have been configured into a ROAS configuration?
show vlan configuration
show roas status
show roas configuration
show vlans
. Which Cisco IOS command can be used on a switch to ensure that the interface connecting to a router configured as a ROAS is trunking?
show trunking
show switchport trunk
show interfaces trunk
show trunks
. Of the Cisco IOS commands that are typically used to view interface IP addressing information, which one shows only the address but not the mask information configured for an interface?
show ip interface
show protocols
show ip interface brief
show interfaces
. Which of the following can be used to place a valid route into the routing table of a Cisco IOS router? Select 3 answers
Use OSPF with more than one router
Configure static routes
Implement name-to-IP resolution
Add an IP address to an up/up interface
Apply the use of wildcard masks
. What are the ICMP error messages that traceroute triggers from the routers when it is generating packets?
Echo Reply
Destination Unreachable
Time-to-Live Exceeded
Bad Parameter
. Which protocol is used by Cisco IOS’s version of the traceroute command for outbound messages?
TCP
CDP
ICMP
UDP
. Which Cisco IOS command is used on a router’s Ethernet subinterface to associate it with VLAN 200 and make it the interface that handles untagged frames?
switchport access default vlan 200
tagging enable 200 untag
vlan 200 native
encapsulation dot1q 200 native
. Which Cisco IOS command is used on a switch L3 route packets?
asic control routing enable
sdm prefer ip-routing
ip routing
sdm prefer lanbase-routing
. Which Cisco IOS command is used on a router’s Ethernet subinterface to associate it with VLAN 100?
encapsulation dot1q 100
switchport access vlan 100
vlan 100
tagging enable 100
. Which Cisco IOS command can be used to display the cable type connected to a serial interface and the speed that it is configured?
show hardware interface
show interfaces
show controllers
show ip interface
. Which types of LSAs will the ABR create?
Type 3 LSA
Type 0 LSA
Type 1 LSA
Type 2 LSA
. What are two configurable settings that can influence the DR/BDR election? Select 2 answers
OSPF reference bandwidth
OSPF process ID
OSPF interface priority
OSPF Router ID
. What can you configure on an OSPF router interface to influence the DR election?
Cost
Network type
Priority
Timers
. A command reveals a router interface with a bandwidth of 1 Mbps. If not set using additional configuration, what cost will OSPF assign to the interface?
19
64
10 100. What is the default Dead interval timer for an OSPF router?
Three times the “Hello” timer
Two times the “Hello” timer
Four times the “Wait” timer
Four times the “Hello” timer
. Which state have two OSPF routers reached when they have established a neighbor relationship and have completed the exchange of all available link-state advertisements?
Down
Exstart
Full
Loading
. OSPF routers can hear Hellos from another router, but not form neighbor relationships. Which of the following definitely prevent neighbor relationships from being formed? Select 2 answers
When both routers have the same configured dead interval, but with the dead interval not being four times the Hello interval
Mismatched networks listed in the configured network commands
Mismatched subnet numbers
An ip ospf access-group 101 in command on the interface, with ACL 101 filtering the RID of the other router
Mismatched Hello intervals
. What will happen if two OSPF routers have different MTU sizes?
The hello/dead timers will change.
They will fail to exchange their LSDBs.
They can exchange routes.
They will have duplicate RIDs.
. Which type of routes will a router add to its IP routing table if the router does not use a routing protocol? Select 3 answers
Connected routes
Dynamic route
Static routes
Floating static
. OSPF-enabled routers send “Hello” packets using which multicast IP address?
224.0.0.5
224.0.0.12
224.0.0.10
224.0.0.9
. OSPF utilizes _________ to organize topology information.
LSAs TLAs
SPFs DBUs. If not configured with the router-id command, what is the next option a Cisco router uses to choose its OSPF router-ID?
Use the IP address of the active non-loopback interface with the highest interface ID number
Use the IP address of the active non-loopback interface with the highest IP address
Use the IP address of the active loopback interface with the highest interface ID number
Use the IP address of the active loopback interface with the highest IP address
. What is the default reference bandwidth for the OSPF algorithm for most Cisco IOS routers?
1 Mbps
100 Mbps
1000 Mbps
10 Mbps
. Which answers list a requirement for an OSPF neighbor relationship? Select 2 answers
Hello/dead timers must match.
Interfaces must be in the same subnet.
The process IDs must match.
The router IDs must be identical.
. Which LSA types describe the topology inside an OSPF area?
LSA type 1 and LSA type 3
LSA type 2 and LSA type 3
LSA type 1 only
LSA type 1 and LSA type 2
. Four OSPF routers connect to the same LAN. In a new election after all routers have been rebooted, which router wins the DR election?
R2, router-id 2.2.2.2, priority 3
R1, router-id 1.1.1.1, priority 4
R3, router-id 3.3.3.3, priority 2
R4, router-id 4.4.4.4, priority 1
. Which OSPF message type is used to actually send the LSAs between neighbors?
Link-State Update
Link-State Request
Link-State Shuttle
Link-State Description
. Two internal OSPF routers connect to the same LAN-based subnet, with router R1 acting as DR and router R2 as BDR. What LSA(s) will R1 create and flood that R2 does not?
There is no difference in the type of LSAs each router creates and floods. Type 1 LSA
Type 3 LSA
Type 2 LSA
. Which Cisco IOS command is used to advertise a default route into an OSPFv2 domain regardless of whether a default static route is configured? default-information originate
default-information originate permanent
default-information originate always
default-information originate no-check
. Which options do not prevent a directly connected OSPF speaker from becoming a neighbor?
Area mismatch
Hello Timer mismatch
Subnet Mask mismatch
OSPF Process ID mismatch
. What commands will configure an OSFP point-to-point network type?
R1(config)# interface fa0/1 R1(config-if)# ip ospf network point-to-point
R1(config)# interface fa0/1 R1(config-if)# ospf network point-to-point
R1(config)# interface fa0/1 R1(config-if)# ip network point-to-point
R1(config)# interface fa0/1 R1(config-if)# no ip ospf network broadcast
. What command can you use to verify the neighbor adjacencies of an OSPF router?
show ip ospf database
show running-config
show ospf interface brief
show ip ospf neighbor
. Which options are stable OSPF neighbor states?
Loading
Full
Exstart
Established
2-way
. In the absence of a direct cost being configured for an OSPF interface, and using the default reference OSPF bandwidth, what is the OSPF cost for a Fast Ethernet interface operating at 100 Mbps?
1 64 19 4 10. Examine the output of the show ipv6 interface brief command shown in the exhibit. What two address types are shown? Select 2 answers
R1# show ipv6 interface brief
FastEthernet0/0 [administratively down/down]
unassigned
GigabitEthernet1/0 [administratively down/down]
FE80::C800:1FF:FE7E:1C
FD00:1:1:2:C800:1FF:FE7E:1C Unique local
Link-local
Multicast
Anycast
. Host A, in one Ethernet VLAN, needs to communicate using IPv6 to host B, which is in another Ethernet VLAN. Which answer best describes the protocol used by host A to learn the layer 2 address of Host B?
NDP No protocol is used; A does not learn B's MAC address.
ARP
OSPFv3
. What are these steps used for in an IPv6 network?
1. Split the 6-byte (12-hex-digit) MAC address in two halves (6 hex digits each).
2. Insert FFFE in between the two, making the interface ID now have a total of 16 hex
digits (64 bits).
3. Invert the seventh bit of the interface ID. Determining the IPv6 address of a default gateway
NetFlow flow tracking
Automatic assignment of host part of an IPv6 address
Configuration of SNMP for IPv6
. IPv6 represents a binary IPv6 address using hex characters. Which of the following binary strings represent C E?
C E
1100 1110
None of the provided choices are correct.
1011 1101
. On R1, IPv6 unicast routing is not enabled. After entering the preceding commands, what do you expect to see in the show ipv6 interface brief output?
R1(config-if)# mac-address 0000.1111.1111
R1(config-if)# ipv6 enable
None, because IPv6 routing is not enabled
FF80::200:11FF:FE11:1111
FE80::200:11FF:FE11:1111
FE80:0000:0000:0000:0000:11FF:FE11:1111
FE80:0000:0000:0000:0200:11FF:FE11:1111
. When a device sends a Router Solicitation (RS) NDP packet, looking for a new local IPv6 router, which destination address would be involved in this request?
FF02::1
The broadcast address
The unicast address of a router
FF02::2
The solicited node multicast address of a router
. Examine the output shown in the exhibit. What is true about the number 1 shown in brackets?
R1# show ipv6 route static
! Legend omitted for brevity
S 2001:DB8:1111:2::/64 [1/0]
via Serial0/0/0, directly connected It is the hop count.
It is the order of analysis for a routing decision.
It is the metric.
It is the administrative distance.
. Your company is going to be using Ethernet for the connection to the Internet service provider (ISP). The service provider (on its network) will be using Ethernet over MPLS (EoMPLS). The ISP is using an address of 2001:db8:1111:4::1/64 for this connection. Which of the following addresses would be appropriate for your end of this connection?
2001:db8:1111::2/64
None of the addresses listed as choices would be compatible with the ISP’s address.
2001:db8:1111:4::2/64
2001:db8::1111:4:2/64
. The answers show four values the engineer could configure in an ipv6 address command on the interface. Which commands would result in the interface using the equivalent of IPv6 address 2500:6400:0087:BE00:0000:ACB0:00EB:04A0? Select 2 answers
2500:6400:87:be:0:acb:00eb:04a0
2500:6400:0087:be::acb0:eb:04a0
2500:6400:87:be00:0:acb0:00eb:4a0
2500:6400:87:be00:0:acb0:00eb:04a0
. Examine the configuration shown in the exhibit. What type of IPv6 address configuration is being completed here?
ipv6 unicast-routing
!
interface GigabitEthernet0/0
ipv6 address 2001:DB8:1111:1::1/64 Dynamic unicast
Static unicast
IPv6 multicast addressing
Modified EUI-64
. Identify the first hex digits for a link-local address in an IPv6 network.
FE80 FF 3 2. How many subnets can be created from one hex character in an IPv6 address?
8 12 32 4 64 16. Which Cisco IOS command would correctly route traffic destined for the 2300:1451:2463:242d:e3ab:35e4:1563:0001/64 network out the GigabitEthernet0/1 interface?
ipv6 route 2300:1451:2463:242d::/64 interface Gi0/1
ipv6 route 2300:1451:2463:242d::/64 Gi0/1
ip route v6 2300:1451:2463:242d::/64 Gi0/1
ip route 2300:1451:2463:242d::/64 Gi0/1
. If your ISP assigns you prefix 2003:1234:abcd:6600:: /56, how many bits do you have to create your subnets?
4 bits
12 bits
16 bits
8 bits
. You have decided to use an IPv6 addressing system for a small part of your network. You don’t need connectivity to the rest of the Internet, but you may add links from your company directly to partner companies, so that you want to make sure and use unique IPv6 addresses across all these partnering companies. Which of the following networks would you use for your pilot program? FE80::/64
None of the network addresses provided as choices could be used for this pilot.
FD00:1:cc1e:6783::/64
FF05::/64
2001:db8:cc1e:6783::/64
. Which of these is a correct representation of an IPv6 address?
2002:1234:A1AD:61:81AF:ABCD
2001:1:257:836F::1
3450:ABCD:WAYZ:0067::2A4
2001:1000:130F::076a::123a
. Which Cisco IOS command would correctly route traffic destined for the 2300:0:2463:114:2573:bc12:aec2:1/64 network using a next-hop address of 3000:2636:2f42:ea36::5425:1?
ip route v6 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1
ip route 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1
ipv6 route 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1
ipv6 route 2300:0:2463:114::/64 address 3000:2636:2f42:ea36::5425:1
. What statement is true about the command ipv6 unicast-routing?
This command is required for the assignment of IPv6 addresses to interfaces.
This command is required for the dynamic assignment of IPv6 addresses to interfaces.
This command is required for the operation of IPv6 routing on the device.
This command has been deprecated and is no longer recommended.
. PC1 and PC2 reside on the same VLAN. Both hosts use IPv6. When PC1 pings PC2’s IPv6 address, PC1 does not know PC2’s MAC address. How does PC1 learn PC2’s MAC address?
DHCP
Stateless autoconfiguration
NDP
ARP
. Based on the IPv6 solicited multicast address of FF02::1:FFE0:8, which of the global unicast addresses could be configured?
2000:83B7:28A2:8134:AB83:EFCA:9384:23BA
2002:0001:BA81:8531:AB81:9384:AB7D:0008
2500:AB83:EBAC:9134:C801:1AFF:FEE0:0008
2500:AB83:EBAC:9134:C801:1AFF:FEE0:0008
. Which Cisco IOS command would correctly route traffic destined for the 8163:bc23:4632:ac23::/64 network using the fe80::1234:7484:26b4:2362 next hop address out the GigabitEthernet0/1 interface?
ipv6 route 8163:bc23:4632:ac23::/64 Gi0/1 fe80::1234:7484:26b4:2362
ipv6 route 8163:bc23:4632:ac23:/64 Gi0/1 link-local fe80::1234:7484:26b4:2362
ipv6 route 8163:bc23:4632:ac23::/64 fe80::1234:7484:26b4:2362
ip route v6 8163:bc23:4632:ac23::/64 Gi0/1 fe80::1234:7484:26b4:2362
. Given the global unicast address of 2000:B71A:8560:AB73:816A:BE81:AB71:FF01, what would the solicited-node multicast address be?
FF02::1:FF71:FF01
FF02::1:FE71:FF01
FF02::1:AB71:FF02
FF02::1:AB71:FF01
. Which IPv6 addresses represent a global IPv6 address? (select two)
fe80::3af:fe24:4567:890a
2a10::abd:3eb2:1234
ff02::a
2001:db8:85a3::8a2e:370:7334
. Based on the configuration provided below, what would be the assigned link local address?
interface FastEthernet0/0
mac-address 0000.5B2D.003A
ipv6 address 2000:AB83:00FB:1DAE::/64 eui-64 FF02::0:5BFF:FE2D:3A
FE80::0:5BFF:FE2D:3A
FF02::200:5BFF:FE2D:3A
FE80::200:5BFF:FE2D:3A
. The R1 interface has a MAC address of 00:21:2F:B5:C3:80. What will be the IPv6 address generated by the router if you configure the interface to use the EUI-64 format?
00:21:2F:FF:FE:B5:C3:80
FE80::0221:2FFE:FFB5:C380
2001::0021:2FFF:FEB5:C380
FE80::0221:2FFF:FEB5:C380
. Which IPv6 unicast addresses would now be included in the output of the command show ipv6 interface fa0/0 on R1? Select 2 answers FF02::1:FF00:1
2001:1234::211:22FF:FE33:4455
FE80::211:22FF:FE33:4455
2001:1234::1
FE80::11:22FF:FE33:4455
. Which of the following succinctly describes the specific address range typically used by IANA for global IPv6 addresses?
fe80::/10
2000::/2
2000::/3
fe80::/16
2000:db8::/16
. Which of the following fields cannot be compared based on an extended IP ACL? (Choose two answers.)
Protocol Source IP address
Destination IP address
URL
Filename for FTP transfers
TOS byte
. An engineer configures an ACL but forgets to save the configuration. At that point, which of the following commands display the configuration of an IPv4 ACL, including line numbers? (Choose two answers.)
show running-config
show startup-config
show ip access-lists
show access-lists
. Which of the following access-list commands permit packets going from host 10.1.1.1 to all web servers whose IP addresses begin with 172.16.5? (Choose two answers.)
access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
access-list 2523 permit ip host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
access-list 2523 permit tcp host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
access-list 2523 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
. Assume a TCP connection already exists between PC1 and PC2. Which TCP message packet would be the final one to be sent between devices if both approve the connection termination?
TCP-SYN, FIN
TCP-FIN,ACK
TCP-FIN
TCP-ACK
. What is the correct sequence for TCP connection establishment?
There is no sequence because TCP is a connectionless protocol.
(1) SYN (2) SYN ACK (3) ACK
(1) ACK (2) SYN ACK (3) SYN
(1) SYN (2) ACK (3) SYN
. Which extended ACL port number parameter indicates a match for a specific application/application number greater than 20?
> 20
gt 20
ge 20
greater 20
. Which Cisco IOS statement could be used to match only the IP address 1.2.3.4 using ACL number 10?
access-list 10 permit 1.2.3.4
access-list permit 10 1.2.3.4
access-list permit 10 ip 1.2.3.4
access-list 10 permit ip 1.2.3.4
. Which applications use the primary Layer 4 protocol UDP (select 3 awnsers)
RTP-Based Voice over IP (VoIP)
DHCP
Telnet
TFTP
HTTP (www)
FTP
. Which ports are ephemeral ports? Select 2 answers
53 2286 80 80800 51974 619943. A user sits at her PC at her desk inside an Enterprise network. She opens a web browser and connects to a website that sits on the Internet. Which of the following answers is most true about the applications and functions used as a result of this user’s actions?
The user's PC sends at least two messages to the server before requesting the specific web page.
The transfer of files uses the FTP protocol.
UDP is used as part of the process of resolving the website's name into the default gateway's MAC address.
UDP is used as part of the process of transferring files from the web server to the user's web browser.
. A junior-level engineer has been given the task of configuring an ACL on a router; he was told that the port that should be blocked is TCP 20. Which access-list command keyword could be used in place of this port number when configured?
ftp
smtp tftp tftp-data. Which option would be the correct wildcard mask to match a subnet with the 255.255.248.0 subnet mask?
0.0.31.255
0.0.15.255
0.0.3.255
0.0.7.255. A junior-level engineer has been given the task of configuring an ACL on a router; she was told that the port that should be blocked is UDP 69. Which access-list command keyword could be used in place of this port number when configured?
ftp-data
smtp
tftp
ftp
. If a numbered ACL utilized the number 1600, which type of ACL would it be?
Named
Extended Broad
Standard
. Which options are true about implementing standard ACLs? Select 2 answers
All standard ACLs have a default permit action.
Place them as close to the source as possible.
Place them as close to the destination as possible.
All standard ACLs have a default deny action.
. Which statement would correctly match traffic coming from the 192.168.31.0/24 network to the 10.10.10.1 host?
access-list 100 permit ip 10.10.10.1 192.168.31.0 0.0.0.255
access-list 100 permit ip host 10.10.10.1 192.168.31.0 0.0.0.255
access-list 100 permit ip 192.168.31.0 0.0.0.255 host 10.10.10.1
access-list 100 permit ip 192.168.31.0 0.0.0.255 10.10.10.1
. Which of the following answers lists the correct layer 4 protocol(s) and well-known port used by each application?
DNS: UDP and TCP, port 53
HTTP: TCP, port 110
SSH: TCP, port 22
POP3: UDP, 110
. Which of the following are true about TCP? Select 2 answers
This protocol is suited for important traffic such as Voice over IP (VoIP).
This protocol supports multiplexing.
This protocol is used by Telnet.
This protocol provides a limited variety of services.
. Which option would be the correct subnet specified with the ACL access-list 1 permit 192.30.32.0 0.0.31.255?
192.30.32.0 255.255.240.0
192.30.32.0 255.255.224.0
192.30.32.0 255.255.192.0
192.30.32.0 255.255.128.0
. Which extended ACL port number parameter indicates a direct match for a specific application/application number?
= eq
equal ==. In a reflection attack, the source IP address in the attack packets is spoofed so that it contains which one of the following entities?
The address of the attacker
The address of the reflector
The address of the victim
The address of the router
. An actual potential to exploit a vulnerability is known as which one of the following terms?
Vulnerability
Attack
Exploit
Threat
. During a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?
Eavesdrop on traffic passing between hosts
Induce a buffer overflow on multiple hosts
Modify data passing between hosts
Use ping sweeps and port scans to discover the network
. Suppose an attacker sends a series of packets toward a destination IP address with the TCP SYN flag set but sends no other packet types. Which of the following attacks is likely taking place?
Spoofing attack
Reflection attack
Reconnaissance attack
Denial-of-service attack
. In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers.)
MAC address
Source IP address
Destination IP address
ARP address
. A next-generation firewall sits at the edge of a company’s connection to the Internet. It has been configured to prevent Telnet clients residing in the Internet from accessing Telnet servers inside the company. Which of the following might a next-generation firewall use that a traditional firewall would not?
Match message destination well-known port 23
Match message application data
Match message IP protocol 23
Match message source TCP ports greater than 49152
. Which actions show a behavior typically supported by a Cisco next-generation IPS (NGIPS) beyond the capabilities of a traditional IPS? (Choose two answers)
Gather and use host-based information for context
Comparisons between messages and a database of exploit signatures
Logging events for later review by the security team
Filter URIs using reputation scores
. A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows:
interface range gigabitethernet 0/1 - 24
switchport mode access
switchport port-security
switchport port-security mac-address sticky
Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.)
Prevents unknown devices with unknown MAC addresses from sending data through the switch ports.
If a user connects a switch to the cable, prevents multiple devices from sending data through the port.
Will allow any one device to connect to each port and will save that device’s MAC address into the startup-config.
Will allow any one device to connect to each port but will not save that device’s MAC address into the startup-config.
. A switch’s port Gi0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.)
The switch puts the interface into an err-disabled state when the first frame arrives.
The switch generates syslog messages about the violating traffic for the first frame.
The switch increments the violation counter for Gi0/1 by 1.
The switch discards both the first and second frame.
. Which of the following is required when configuring port security with sticky learning?
Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand.
Enabling port security with the switchport port-security interface subcommand.
Defining the specific allowed MAC addresses using the switchport port-security mac-address interface subcommand.
All the other answers list required commands.
. Which of the following commands list the MAC address table entries for MAC addresses configured by port security? (Choose two answers.)
show mac address-table dynamic
show mac address-table
show mac address-table static
show mac address-table port-security
. A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC and the DHCP server, which ones do the client send? (Choose two answers.)
Acknowledgment
Discover
Offer
Request
. A router connects to an Internet Service Provider (ISP) using its G0/0/0 interface, with the ip address dhcp command configured. What does the router do with the DHCPlearned default gateway information?
The router ignores the default gateway value learned from the DHCP server.
The router uses the default gateway just like a host, ignoring its routing table.
The router forwards received packets based on its routing table but uses its default gateway setting to forward packets it generates itself.
The router adds a default route based on the default gateway to its IP routing table.
. Which answers list a criterion for choosing which router interfaces need to be configured as a DHCP relay agent? (Choose two answers.)
If the subnet off the interface does not include a DHCP server
If the subnet off the interface does include a DHCP server
If the subnet off the interface contains DHCP clients
If the router interface already has an ip address dhcp command
. On a multilayer switch, a switch needs to be configured to perform DHCP Snooping on some Layer 2 ports in VLAN 3. Which command may or may not be needed depending on whether the switch also acts as a DHCP relay agent?
no ip dhcp snooping information option
ip dhcp snooping limit rate 5
errdisable recovery cause dhcp-rate-limit
ip dhcp snooping vlan 3
. Switch SW1 needs to be configured to use DHCP Snooping in VLAN 5 and only VLAN 5. Which commands must be included, assuming at least one switch port in VLAN 5 must be an untrusted port? (Choose two answers.)
no ip dhcp snooping trust
ip dhcp snooping untrust
ip dhcp snooping
ip dhcp snooping vlan 5
. Switch SW1 has been configured to use Dynamic ARP Inspection with DHCP Snooping in VLAN 5. An ARP request arrives on port G0/1. Which answer describes two items DAI always compares regardless of the configuration?
The message’s ARP origin hardware address and the message’s Ethernet header source MAC address
The message’s ARP origin hardware address and the DHCP Snooping binding table
The message’s ARP target IP address and the DHCP Snooping binding table
The message’s ARP target IP address and the switch’s ARP table
. Layer 2 switch SW2 connects a Layer 2 switch (SW1), a router (R1), a DHCP server (S1), and three PCs (PC1, PC2, and PC3). All PCs are DHCP clients. Which of the following are the most likely DHCP Snooping trust state configurations on SW2 for the ports connected to the listed devices? (Choose two answers.)
The port connected to the router is untrusted.
The port connected to switch SW1 is trusted.
The port connected to PC1 is untrusted.
The port connected to PC3 is trusted.
. Switch SW1 needs to be configured to use Dynamic ARP Inspection along with DHCP Snooping in VLAN 6 and only VLAN 6. Which commands must be included, assuming at least one switch port in VLAN 6 must be a trusted port? (Choose two answers.)
no ip arp inspection untrust
ip arp inspection trust
ip arp inspection
ip arp inspection vlan 6
. A Layer 2 switch needs to be configured to use Dynamic ARP Inspection along with DHCP Snooping. Which command would make DAI monitor ARP message rates on an interface at an average rate of 4 received ARP messages per second? (Choose two answers.)
ip arp inspection limit rate 4 burst interval 2
ip arp inspection limit rate 10 burst interval 2
ip arp inspection limit rate 16 burst interval 4
ip arp inspection limit rate 4
. An engineer hears about DHCP Snooping and decides to implement it. Which of the following are the devices on which DHCP Snooping could be implemented? (Choose two answers.)
Layer 2 switches
Routers Multilayer switches
End-user hosts
. What happens when a router’s WAN interface receives a DHCP address with a default gateway configured?
The IP address and mask are configured on the router’s WAN interface, and a default route out the router’s LAN interface is dynamically configured.
The IP address and mask are configured on the router’s LAN interface, and a default route out the router’s LAN interface is dynamically configured.
The IP address, mask, and gateway are configured on the router’s LAN interface.
The IP address, mask, and gateway are configured on the router’s WAN interface.
The IP address and mask are configured on the router’s LAN interface, and a default route out the router’s WAN interface is dynamically configured.
The IP address and mask are configured on the router’s WAN interface, and a default route out the router’s WAN interface is dynamically configured.
. From the spoofing attacks listed, which option(s) attempts to exhaust a system service or resource with the intent to crash the target system?
Man-in-the-middle
DoS/DDoS
Reflection
Amplification
. When comparing next-generation IPS to traditional IPS, what additional capability(ies) can be leveraged to more efficiently block traffic? (choose three)
Signature-based filtering
Contextual awareness
Event impact level
AVC
. Which security function would be the best option to mitigate a DoS attack?
Stateful firewall
Router ACL
Security zone
Stateless firewall
. After enabling port security in restrict mode on an interface, which Cisco IOS command could be used to show the number of discarded frames (if any) as well as the last source MAC address?
show port-security
show port-security interface interface
show switchport security
show interface interface switchport
. You would like to limit telnet connection into your router to a range of IP address. You have created the access list numbered 99, how do you apply this ACL to limit telnet connections?
access-group 99 in under the ethernet interface
access-group 99 in under the VTY interface
access-class 99 in under the VTY interface
access-class 99 in under the ethernet interface
. Which hash method is used by default when using the enable secret Cisco IOS command?
HMAC
SHA-0
MD5
3DES
. In what security zone are the public web servers located?
Outside
DMZ
Inside
Campus
. What command should you configure globally to enable automatic recovery of port security errdisable states?
errdisable recovery cause port-security restrict
errdisable recovery cause psecure-restrict
errdisable recovery cause port-security violation
errdisable recovery cause psecure-violation
. What command would need to be utilized to allow DAI to check for source MAC addresses?
ip arp validate src-mac
ip arp validate inspection src-mac
ip arp inspection validate src-mac
ip arp inspection src-mac
. Which Cisco IOS command would be used to display the current violation mode for all configured Port Security interfaces?
show port-security interface interface
show switchport security
show interface interface switchport
show port-security
. What does DAI look for to help validate correct ARP entries? (choose two)
ARP ACLs
Infrastructure ACLs
DHCP Snooping binding data
ARP table
. From the following spoofing attacks, which option(s) leverages an application, device, or service to increase the amount of traffic being sent toward a target?
Amplification
Reflection
Man-in-the-middle
DoS/DDoS
. From the malware types listed, which option(s) is packaged inside other software?
Worm
Trojan horse
Virus
. From the password authentication and alternatives listed below, which option(s) includes something you are?
Passwords
Two-factor
Digital certificates
Biometric scanners
. Which of the following spoofing attacks eavesdrops on traffic?
Reflection
Man-in-the-middle
Amplification
DoS/DDoS
. From the password authentication and alternatives listed below, which option(s) includes something you have? (choose two)
Two-factor
Passwords
Biometric scanners
Digital certificates
. Which of the four messages used by DHCP is sent by the client to ask for the server to lease the IPv4 address listed from the server?
Request
Offer
Acknowledgement
Respond
. What command limits the messages sent to a syslog server to levels 4 through 0?
logging trap 0-4
logging trap 0,1,2,3,4
logging trap 4
logging trap through 4
. The only NTP configuration on router R1 is the ntp server 10.1.1.1 command. Which answers describe how NTP works on the router?
As an NTP server only
As an NTP client only
As an NTP server only after the NTP client synchronizes with NTP server 10.1.1.1
As an NTP server regardless of whether the NTP client synchronizes with NTP server 10.1.1.1
. A switch is cabled to a router whose host name is Hannah. Which of the following LLDP commands could identify Hannah’s model of hardware? (Choose two answers.)
show neighbors
show neighbors Hannah
show lldp
show lldp interface
show lldp neighbors
show lldp entry Hannah
. What level of logging to the console is the default for a Cisco device?
Informational
Errors
Warnings
Debugging
. Which of the following is accurate about the NTP client function on a Cisco router?
The client synchronizes its time-of-day clock based on the NTP server.
It counts CPU cycles of the local router CPU to more accurately keep time.
The client synchronizes its serial line clock rate based on the NTP server.
The client must be connected to the same subnet as an NTP server.
. Imagine that a switch connects through an Ethernet cable to a router, and the router’s host name is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah? (Choose two answers.)
show neighbors Hannah
show cdp
show cdp neighbors
show cdp neighbors Hannah
show cdp entry Hannah
show cdp neighbors detail
.
|