Soal Ch9 S.D 17
Soal Ch9 S.D 17
Flash
ROM
NVRAM
RAM
A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network
administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement
describes this entry?
This entry maps to the default gateway.
A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-
in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the
default gateway?
netstat -r
route print
ipconfig /all
arp -a
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It forwards the frame out of all ports except for the port at which the frame was received.
Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)
router advertisement
router solicitation
neighbor solicitation
echo request
neighbor advertisement
to determine the network number based on the number of bits in the IPv4 address
to determine the amount of time a packet takes when traveling from source to destination
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?
It sends the frame to all ports.
It sends the frame to all ports except the port on which it received the frame.
It sends the frame to all ports that are registered to forward broadcasts.
When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP?
the IPv4 address of the destination host
the MAC address of the router interface closest to the sending host
the MAC address of the switch port that connects to the sending host
The ARP table in a switch maps which two types of address together?
Layer 2 address to a Layer 4 address
to build the MAC address table in a switch from the information that is gathered
FFFF.FFFF.FFFF
0.0.0.0
127.0.0.1
255.255.255.255
A router boots and enters setup mode. What is the reason for this?
Cisco IOS is missing from flash memory.
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration
mode on the routers. The privileged exec password is trustknow1. Which of the following router commands
achieves the goal of providing the highest level of security?
enable secret trustknow1
service password-encryption
What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?
? command not recognized
router(config)#
router(config-host)#
hostname = portsmouth
portsmouth#
portsmouth(config)#
portsmouth#
An administrator is configuring a new router to permit out-of-band management access. Which set of commands
will allow the required login using a password of cisco?
Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# login
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current
status?
ping
show ip route
Which CLI mode allows users to access all device commands, such as those used for configuration, management,
and troubleshooting?
global configuration mode
to contain the commands that are used to initially configure a router on startup
to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
to contain the configuration commands that the router IOS is currently using
the physical address of the router interface on the same network as the host computer
the logical address of the router interface on the same network as the host computer
the physical address of the switch interface connected to the host computer
It is a way that routers communicate the status of their links with one another.
A technician is configuring a router to allow for all forms of management access. As part of each different type of
access, the technician is trying to type the command login. Which configuration mode should be entered to do this
task?
any line configuration mode
As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in
plain text are encrypted.
To see the passwords encrypted by the service password-encryption command in plain text, issue the no service
password-encryption command.
/26
/27
/28
How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
192
64
254
190
62
255.255.255.0
255.255.255.240
255.255.255.224
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized
subnets are created?
2
64
16
255.255.224.0
255.255.255.192
255.255.255.248
255.255.255.0
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?
to identify faulty frames
32
62
254
16
256
Which subnet mask would be used if exactly 4 host bits are available?
255.255.255.248
255.255.255.128
255.255.255.224
255.255.255.240
subnet portion
network portion
physical portion
host portion
logical portion
If a network device has a mask of /26, how many IP addresses are available for hosts on this network?
62
30
64
14
16
32
host address
network address
broadcast address
If a network device has a mask of /28, how many IP addresses are available for hosts on this network?
14
254
62
16
256
32
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How
many usable host addresses will this subnet provide?
14
30
What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8:0:AB::1234
2001:DB8:0:AB00::1234
2001:DB8::AB00::1234
2001:DB8:0:AB:0:1234
2001:DB8:D15:EA::/64
2001:DB8::/64
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?
loopback
link-local
unique local
global unicast
Which IPv6 network prefix is only intended for local links and can not be routed?
FF00::/12
2001::/3
FE80::/10
FC00::/7
A9CD:47FF:FE57:FE94
1000:A9CD:47FF:FE57:FE94
FE94
47FF:FE57:FE94
2001:DB8::/64
2001:DB8:AA04:B5::/64
2001:DB8:AA04::/64
multicast
broadcast
2001:db8:0:abcd::1
2001:0db8:abcd::1
2001:db8::abcd:0:1
2001:0db8:0000:abcd::1
What is the minimum configuration for a router interface that is enabled for IPv6?
to have both an IPv4 and an IPv6 address
site local
global unicast
link-local
What are three parts of an IPv6 global unicast address? (Choose three.)
an interface ID that is used to identify the local host on the network
a global routing prefix that is used to identify the portion of the network address provided by a local administrator
a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP
a subnet ID that is used to identify networks inside of the local enterprise site
an interface ID that is used to identify the local network for a particular host
Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how
many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed?
16
128
80
Which type of IPv6 address is not routable and used only for communication on a single subnet?
global unicast address
link-local address
unspecified address
loopback address
A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing
packets to be dropped. The technician only has the IP address of the end point device and does not have any details
of the intermediate devices. What command can the technician use to identify the faulty node?
tracert
ipconfig /flushdns
ipconfig /displaydns
ping
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to
ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping
command?
to resolve the domain name of the file server to its IP address
to request that gateway forward the connection request to the file server
to test that the host has the capability to reach hosts on other networks
What is a function of the tracert command that differs from the ping command when they are used on a workstation?
The tracert command is used to test the connectivity between two devices.
The tracert command sends one ICMP message to each hop in the path.
Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
ping
destination unreachable
redirect
time exceeded
RIP
DNS
ping
NDP
ARP
DHCP
A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol
will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?
U
Which two things can be determined by using the ping command? (Choose two.)
the IP address of the router nearest the destination device
the average time it takes each router in the path between source and destination to respond
the average time it takes a packet to reach the destination and for the response to return to the source
A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the
command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies.
What conclusion can be drawn based on this connectivity test?
The PC can access the Internet. However, the web browser may not work.
The PC can access the network. The problem exists beyond the local network.
ping
netstat
ICMP
What field content is used by ICMPv6 to determine that a packet has expired?
CRC field
TTL field
Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
DNS
ARP
ICMP
BOOTP
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web
server located at an ISP in another city. Which tool or command would help identify the specific router where the
packet was lost or delayed?
traceroute
ipconfig
netstat
telnet
What message is sent by a host to check the uniqueness of an IPv6 address before using that address?
echo request
ARP request
router solicitation
neighbor solicitation
1024 - 49151
0 to 255
0 to 1023
What is a socket?
the combination of a source IP address and port number or a destination IP address and port number
the combination of the source and destination sequence numbers and port numbers
the combination of the source and destination IP address and source and destination Ethernet address
the combination of the source and destination sequence and acknowledgment numbers
How does a networked server manage requests from multiple clients for different services?
The server sends all requests through a default gateway.
Each request has a combination of source and destination port numbers, coming from a unique IP address.
The message is lost because FTP does not use a reliable delivery method.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination.
What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it receives an acknowledgement from the
destination.
The source decreases the window size to decrease the rate of transmission from the destination.
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two
network devices? (Choose two.)
FIN
SYN
URG
RST
ACK
PSH
What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of
segments as long as the device is also receiving necessary acknowledgements?
sliding window
three-way handshake
two-way handshake
socket pair
Which action is performed by a client when establishing communication with a server via the use of UDP at the
transport layer?
The client sets the window size for the session.
The client sends an ISN to the server to start the 3-way handshake.
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose
two)
HTTP
FTP
DNS
POP3
VoIP
10.1.1.15
21
192.168.1.1:80
On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home
network?
a DNS server
a home router
What part of the URL, ht​tp://ww​w.cisco.com/index.html, represents the top-level DNS domain?
index
.com
http
www
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
responsibility for physical addressing
the creation and maintenance of dialogue between source and destination applications
What message type is used by an HTTP client to request data from a web server?
ACK
POST
GET
PUT
Which protocol can be used to transfer messages from an email server to an email client?
SMTP
POP3
SNMP
HTTP
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
DHCP
HTTP
SMB
SMTP
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
TCP
HTTP
IP
UDP
MPEG
GIF
Large networks send more requests for domain to IP address resolution than do smaller networks.
Hosts on large networks require more IPv4 addressing configuration settings than do hosts on small networks.
transient
server
master
client
The client can download data from or upload data to the server.
A wireless host needs to request an IPv4 address. What protocol would be used to process the request?
SNMP
DHCP
FTP
ICMP
HTTP
transport
internet
network access
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that
would be desirable for a small- to medium-sized business?
SMTP
POP
IMAP
HTTPS
DNS
HTTPS
DHCP
Which two tasks can be performed by a local DNS server? (Choose two.)
allowing data transfer between two network devices
Which component is designed to protect against unauthorized communications to and from a computer?
firewall
antimalware
antivirus
port scanner
security center
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts
within 10 seconds?
RouterA(config)# login block-for 30 attempts 10 within 2
What type of attack may involve the use of tools such as nslookup and fping?
denial of service attack
access attack
reconnaissance attack
worm attack
Which benefit does SSH offer over Telnet for remotely managing a router?
connections via multiple VTY lines
authorization
encryption
TCP usage
What is one of the most effective security tools available for protecting users from external threats?
firewalls
patch servers
Which type of network threat is intended to prevent authorized users from accessing resources?
access attacks
reconnaissance attacks
DoS attacks
trust exploitation
Which three services are provided by the AAA framework? (Choose three.)
authentication
autobalancing
autoconfiguration
automation
authorization
accounting
Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
social engineering
virus
Trojan horse
worm
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat
does this situation describe?
electrical
environmental
configuration
maintenance
What does the term vulnerability mean?
a weakness that makes a target susceptible to an attack
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
a password on the console line
an IP domain name
a unique hostname
an encrypted password
a user account
For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which
settings can accomplish this task?
firewall settings
smartcard settings
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the
SSH connection?
remote access to the switch through the use of a telephone dialup connection
out-of-band access to a switch through the use of a virtual terminal with password authentication
direct access to the switch through the use of a terminal emulation program
on-site access to a switch through the use of a directly connected PC and a console cable
Which network design consideration would be more important to a large corporation than to a small business?
low port density switch
redundancy
Internet router
firewall
A newly hired network technician is given the task of ordering new hardware for a small business with a large
growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
devices that have support for network monitoring
redundant devices
What type of traffic would most likely have the highest priority through the network?
instant messaging
SNMP
FTP
voice
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5.
Which command, when issued on a Windows PC, will display the path to the remote host?
trace 10.1.1.5
ping 10.1.1.5
traceroute 10.1.1.5
tracert 10.1.1.5
A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same
site by typing http://72.163.4.161. What is the issue?
TCP/IP protocol stack
default gateway
DNS
DHCP
vty lines
memory buffers
console line
Which element of scaling a network involves identifying the physical and logical topologies?
traffic analysis
device inventory
cost analysis
network documentation
What mechanism can be implemented in a small network to help minimize network latency for real-time streaming
applications?
AAA
QoS
ICMP
PoE
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DNS
DHCP
HTTP
IP
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain
connectivity if the router itself, or its connection to the ISP, fails?
Add more interfaces to the router that is connected to the internal network.
Purchase a second least-cost link from another ISP to connect to this router.
Activate another router interface that is connected to the ISP, so the traffic can flow through it.
Which two traffic types require delay sensitive delivery? (Choose two.)
voice
FTP
email
video
web
A network technician suspects that a particular network connection between two Cisco switches is having a duplex
mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
show interfaces
show running-config
show mac-address-table
Because it runs at the data link layer, the CDP protocol can only be implemented in switches.
To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
What factor should be considered in the design of a small network when devices are being chosen?
cost of devices
ISP
redundancy
traffic analysis