How does a switch differ from a hub?
How does a switch differ from a hub? A. A switch does not induce any latency into the frame transfer time. B. A switch tracks MAC addresses of directly-connected devices.
What must occur before a workstation can exchange HTTP packets with a web server? D. A TCP connection must be established between the workstation and the web server. C. A
A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be
The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision
Which two statements describe the operation of the CSMA/CD access method? (Choose two.) A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. B. In a CSMA/CD
Which two options will help to solve the problem of a network that is suffering a broadcast storm? (Choose two.) A. a bridge B. a router C. a hub D.
What does a host on an Ethernet network do when it is creating a frame and it does not have the destination address? A. drops the frame B. sends out
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)? A. 4, 48 B. 48, 4 C. 48, 1 D.
Which address type does a switch use to make selective forwarding decisions? A. source IP address B. destination IP address C. source and destination IP address D. source MAC address
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor? A. RTP B. TCP C. CDP D. UDP Answer: C Explanation:
At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate? A. application B. transport C. network
Which two characteristics apply to Layer 2 switches? (Choose two.) A. increases the number of collision domains B. decreases the number of collision domains C. implements VLAN D. decreases the
Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two.) A. router#show version B. router#show ip interface C. router#show
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.) A. layer 3 support B. port security C. redundant components D. VLANs E. PoE Answer:
What is the purpose of assigning an IP address to a switch? A. provides local hosts with a default gateway address B. allows remote management of the switch C. allows
Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.) A. There are no collisions in full-duplex mode. B. A dedicated switch port is required
Which router command can be used to determine the status of Serial 0/0? A. show ip route B. show interfaces C. show s0/0 status D. debug s0/0 E. show run
What is the subnet address of 172.16.159.159/22? A. 172.16.0.0 B. 172.16.128.0 C. 172.16.156.0 D. 172.16.159.0 E. 172.16.159.128 F. 172.16.192.0 Answer: C Explanation: Converting to binary format it comes to 11111111.11111111.11111100.00000000
An administrator is working with the 192.168.4.0 network, which has been subnetted with a /26 mask. Which two addresses can be assigned to hosts within the same subnet? (Choose two.)
What is the network address for the host with IP address 192.168.23.61/28? A. 192.168.23.0 B. 192.168.23.32 C. 192.168.23.48 D. 192.168.23.56 E. 192.168.23.60 Answer: C Explanation: convert bit-length prefix to quad-dotted
What is the best practice when assigning IP addresses in a small office of six hosts? A. Use a DHCP server that is located at the headquarters. B. Use a
A. The subnet address is 10.16.3.0 255.255.254.0. B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0
Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets? A. 1 B. 2 C.
Which one of the following IP addresses is the last valid host in the subnet using mask 255.255.255.224? A. 192.168.2.63 B. 192.168.2.62 C. 192.168.2.61 D. 192.168.2.60 E. 192.168.2.32 Answer: B
An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving
On a live network, which commands will verify the operational status of router interfaces? (Choose two.) A. Router# show interfaces B. Router# show ip protocols C. Router# debug interface D.
Which router command will configure an interface with the IP address 10.10.80.1/19? A. router(config-if)# ip address 10.10.80.1/19 B. router(config-if)# ip address 10.10.80.1 255.255.0.0 C. router(config-if)# ip address 10.10.80.1 255.255.255.0 D.
What two things does a router do when it forwards a packet? (Choose two.) A. switches the packet to the appropriate outgoing interfaces B. computes the destination host address C.
Which two of these functions do routers perform on packets? (Choose two.) A. examine the Layer 2 headers of inbound packets and use that information to determine the next hops
Which IOS command is used to initiate a login into a VTY port on a remote router? A. router# login B. router# telnet C. router# trace D. router# ping E.
What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT? A. The router uses the same IP address but a
When configuring NAT, the Internet interface is considered to be what? A. local B. inside C. global D. outside Answer: D Explanation: Network address translation or NAT requires the Internet
The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose
What is the effect of using the service password-encryption command? A. Only the enable password will be encrypted. B. Only the enable secret password will be encrypted. C. Only passwords
A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC
Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port B. to prevent unauthorized hosts from accessing the LAN
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1? A. Configure port Fa0/1 to accept connections only from the static IP
Which IP addresses are valid for hosts belonging to the 10.1.160.0/20 subnet? (Choose three.) A. 10.1.168.0 B. 10.1.176.1 C. 10.1.174.255 D. 10.1.160.255 E. 10.1.160.0 F. 10.1.175.255 Answer: ACD