Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEPractica

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Practica

Descripción:
Estudiar

Autor:
AVATAR

Fecha de Creación:
26/11/2021

Categoría:
Fans

Número preguntas: 52
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Which set of conditions comprises a successful ping attempt between two connected routers configured with IP addresses on the same subnet? The destination host receives an echo request from the source host within one second. The destination host receives an echo reply the source host within one second and the source host receives an echo reply from the destination host within two seconds. The destination host receives an echo reply from the source host within one second and the source host receives an echo request from the destination host. The destination host receives an echo request from the source host and the source host receives an echo reply from the destination host within two seconds. The destination host receives an echo request from the source host and the source host receives an echo request from the destination host within one second.
Drag and drop the components of a standard ipv4 access list entry from the left into the correct sequence on the right. 0.0.0.255 10 192.168.1.0 Access-list Log Permit .
Drag and drop the chow cdp command from the top onto the output the generate below Command 1 Command 2 Command 3 Command 4.
Refer to the exhibit. If Host A ping Host B, which statement about the ping is true? The router looks up the destination IP network of the ping in its MAC address table. Host A encapsulates the packet within a frame before sending it Host A sends the packet one byte at a time. The ping packet includes bot the destination MAC address and the source address.
Which statement abut port security is true? the defaut port security configuration allows for a maimum of 10 MAC addresses It can be configured on SPAN destination ports. It is not supported on private VLANs. In sticky mode, the port retains dynamically-learned addresses during a link failure.
Refer to the exhibit. Which action describes how SwitchA will handle the frame just received? will forward the frame out of port Fa0/3 only. will drop the frame. will flood the frame out of all the ports except fa0/3. will forward the frame out of port Fa0/6 only. will flood the frame out all ports.
You ping a remote-device by name from a router, and the router you are using immediately a new prompt. What are two possible reason for the problem? (Choose two). DNS server is unreachable An ACL on the router blocked the ping The no ip domain-lookup command is configured on the router The DNS server configuration on the router is missing The IP address of the remote device is listed in multiple ip host statements in the router configuration.
Which option can be used in case a backup route is required in the routing table? floating static route route redistribution No extra configuration is required next hop.
10: Which two features are supported with SLAAC? (Choose two) Duplicate ipv6 addresses are detected. the first 64 bits of a device ipv6 address can be calculated automatically from its MAC address Router advertisements can track lifetime timers. Globally-routed paths are preferred over equal-cost link-local paths IPV6 addresses have an infinite lifetime by default.
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could be the cause of congestion on this LAN? half-duplex operation multicasting network segmentation broadcast storms.
Drag and drop the descriptions of static routing or dynamic routing from the left onto the correct categories on the right. Able to use different routes depending on the current network topology Allows for highly secure routing updates Efficient as the network grows Always uses the same route to the same destination Less secure than other options for routing updates Inefficient as the network grows.
Which NAT command can be applied to an interface? ip nat inside source static 10.10.10.0 10.10.10.50 ip nat inside ip nat pool test 10.10.10.0 10.10.10.50 255.255.255.0 ip nat inside test access-list-number pool pool-name.
Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At a minimum, which action must the administrator take to enable CDP to exchange information between R1 and R2? Configure Ip addressing and no shutdown commands on both the R1 and R2 fa0/1 interfaces. Configure the router with the cdp enable command Configure IP addressing and no shutdown commands on either of the R1 or R2 fa0/1 interfaces. Enter no shutdown commands on the R1 and R2 fa0/1 interfaces.
Refer to the exhibit. Router R1 produced this partial output running on a current IOS. Which two statements about R1 and its network environment are true? (Choose two) R1 has a combination of local and connected routes totaling two subnets R1 has a network environment that supports a maximum of 16 hosts. R1 has learned a maximum of four networks via routing protocols. R1 has learned at least one network via routing protocols. R1 has a maximum of two connected subnets including local route.
Refer to the exhibit. Router R4 I reachable from router R3. Which two scenarios would prevent the subnet 172.16.2.0/24 from routing table on router R3? (Chose two) Network updates are looping around routers R1, R2 and R3 The subnet uses a loopback interface. Routers R3 and R4 are running different version of RIP Router R4 is running RIPv1 instead of RIPv2 The subnet uses a classless network Poison reverse is in effect.
What is the default number of secure MAC addresses for an interface configured with port security? 1 255 1042 3072.
Which difference between TCP and UDP is true? Only TCP has eliminated error checking Only UDP retransmits packet to ensure delivery Only UDP requires recipients to acknowledge packet receipt Only TCP order the packets that are transmitted.
Refer to the exhibit Host A can communicate with Host B but no with Hosts C or D. How can the network administrator solve this problem? Configure Hosts C and D with IP addresses in the 192.168.2.0 network Enable the VLAN trunking protocol on the switch Install a second switch and put hosts C and D on that switch while Hos A and B remain on the original switch Install a router and configure it to route between VLANs 2 and 3 .
Which three values must you specify to resequence an IP access list? (Choose three) Interface Ending sequence number Dynamic access list number Increment Starting sequence number Access list name.
Two hosts are attached to a switch the default configuration. Which statement about the configuration is true? IP routing must be enabled to allow the two hosts to communicate The two host are in the same broadcast domain. Port security prevents the hosts from connecting to the switch The switch must be configured with a VLAN to allow the two hosts to communicate .
Refer to the exhibit. Which statement describes the effect of this configuration? The VLAN 10 VTP configured is displayed the VLAN 10 spanning-three output is displayed VLAN 10 is added to the VLAN database The VLAN 10 configuration is saved when the router exists VLAN configuration mode.
On a live network, which two commands will verify the operational status of router interfaces (Choose two) Router# show start Router# show Ip interface brief Router# show interfaces Router# debug interface Router# show ip protocols.
Which command or command sequence do you enter to install a default route into a router that is configured with the no ip routing command? Ip default-gateway Ip route 0.0.0.0 0.0.0.0 Ip default-network Router rip IP default-gateway.
Which routing protocol has the smallest default administrative distance? EIGRP OSPF IS-IS RIP IBGP.
Which command do you enter to configure a device as an authoritative time server? ntp server 127.0.0.1 ntp authenticate ntp master 1 ntp source 127.0.0.1.
Which condition is most important to support the use of syslog messages for troubleshooting? Messages are ogged to a Cisco UCS Server NTP is in use to ensure accurate timestamps The route has a large internal buffer space Messages are logged to a UNIX-based server .
Witch two scenarios do you implement private IPV4 IP addresses? (Choose two) For the VPN solution that end users use to connect to the local network On the connection that a mobile device uses for application updates To connect network equipment between different IDFs On an application server that connects to a local database server On the webmail portal of an organization.
Which adverse situation can occur if an Ethernet cable is too long? Interface resets Runts Late collisions giants.
Drag and drop the address blocks from the left onto the correct address types on the right 2000::/3 FE80::/10 FF00::/8 FC00::/8.
Which two DNS record types are currently supported? (Choose two) A MX ACK NIL B.
which address scheme is used to route traffic to the public internet? 172.30.1.0/24 2000::/3 FC00::/7 192.168.10.0/24.
Drag and drop the descriptions of routing protocols from the left onto the correct routing types on the right Supports automatic rerouting Operates normally regardless of the network size Supported on all topologies Provides highly secure routing Requires minimal resources Provides predictable routing.
which two statements about 802.1Q are true ? (Choose two) It is a Cisco-propietary trunking protocol It inserts a 4-byte identifying tag in the Ethernet frame after the source MAC address field It is an open-standard trunking protocol It encapsulates the original data frame inside a trunking header It uses a 20-bit label to identify packets within a trunk.
Which statement about device security is true? It an encrypted password is lost, the NVRAM configuration must be ignored on boot. The password you configure is encrypted in the running configuration by default. A router can have a maximum of two passwords configured The enable password must be used before the enable secret password.
Drag and drop the Ethernet types from the left onto the correct service descriptions on the right 100Base-FX 100Base-TX 1000Base-LX 1000Base-SX 1000Base-T 10GBase-T.
Which IP address is the broadcast address for subnet 172.16.0.0/19? 17.16.0.255 172.16.31.255 172.16.32.255 172.31.255.255.
Which configuration register value do you enter on a device to bypass the startup configuration? 0x2102 0x2120 0x2124 0x2142.
Which Ethernet interface command is present when you boot a new Cisco router for the first time? speed 100 shutdown duplex half ip address 192.168.1.1 255.255.255.0 .
Which two fields are included in an Ethernet header? (Choose two) Destination IP address Payload EtherType Source MAC address Source IP address.
Drag and drop the steps in the frame-rewrite process from the left into the correct sequence on the right The router receives the packet The router recalculates the IPV4 header checksum The frame is created The frame encapsulates the packet The packet is forwarded to the next hop.
You are configuring a default route on a Cisco router. Drag and drop the commands from the left into the correct sequence on the right. Not all commands are used. Enable Configure terminal Ip route 0.0.0.0 0.0.0.0 10.20.20.1 exit Ip routing.
Which value in a routing table entry represents the subnet mask? prefix length administrative distance next-hop route source code.
Which forwarding technology stores destination addresses I the cache? MPLS fast switching process switching Cisco Express Forwarding .
If a router receives a route 192.168.1.0/24 from peers running OSPF and EIGRP, how does the router forward traffic destine to that network? It always uses the path learned from EIGRP because EIGRP has lower administrative distance It load-balances traffic across both paths It uses the path with the lowest metric It always uses the path learned from OSPF because OSPF is a vendor-natural protocol.
Which two network device types perform the translation of internal IP addresses to external IP addresses? (Choose two) Firewalls Bridges ACS Routers WLCs.
Drag and drop the DHCP messages from the left into the correct sequences for a DHCP IP address request on the right. DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK.
which command can you enter to forward DHCP request to a server on behalf of a client on a different network service dhcp ip dhcp pool pool_name ip-helper address address network 192.168.100.0 255.255.255.0 .
Refer to the exhibit. If host A is sending packets to host B, where does the Layer 2 frame rewrite occur? On the router when it receives the packet from host A on host B when it receives the packet from router on host A before it sends the packet toward the router on the router before it forwards the packet to host B.
Refer to the exhibit. You ping a remote device by name from a router, and the ping operation returns this response. What are two reason for this problem? (Choose two) The DNS server database does not include a record for the name The router is blacklisted by the DNS server Only one DNS server is configured on the router A firewall blocked the ping An ACL on the router blocked the ping.
Which two syslog configuration commands do you use to log warnings to the syslog server? (Choose two) Logging trap level alerts Logging trap level critical Logging trap level error Logging trap level informational Logging trap level notice.
Which equipment is needed to connect host between Vlan 10 and Vlan 20 ? router firewall hub switch.
The commando ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command? Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2 the command sets a gateway of last resort for the router. the interface with IP address 192.168.10.2 is on this router 0.
Denunciar test Consentimiento Condiciones de uso