Este test está cronometrado.
Tienes 59 minutos 59 segundos para completar 60 preguntas de este test.
How should you power up a Cisco router?
Press the Reset button.
Turn the power switch to “on.”
Connect the fiber cable to another router.
Attach the power cable plug to the router power supply socket.
How do you instruct a Cisco device to parse and execute an entered command?
Press the Send key
Press the Enter key
Add a space at end of the command
Wait 5 seconds after you enter the command
Which Cisco router component is used primarily to store the startup-config file?
RAM
ROM
NVRAM
Flash memory
Configuration register
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Ignores the update
Increments the holddown timer
Marks the network as “accessible” and removes the holddown timer
Marks the network as “accessible” but keeps the holddown timer on
How could you obtain CDP information about a remote device that is not directly connected?
Use the command show cdp neighbors’ address.
Use the command show cdp neighbors’ hostname.
Use SSH or Telnet to access a Cisco device connected to the target device.
It is not possible to obtain CDP information about a remote device.
Which address type from IPv4 was eliminated in IPv6?
Unicast
Multicast
Broadcast
Everycast
Set of networks subject to translation using NAT.
Static NAT
Dynamic NAT
Inside network
Outside global IP address
If a router does not match the appropriate address portions to a number on its routing table, it ❌
How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets?
16
32
256
1024
Which of the following describes the DHCP server provided by Cisco IOS?
It is a full DHCP server
Its support is limited to assigning IP addresses to clients.
It has to get is DHCP information for a master DHCP server.
It has limited DHCP support and can only assign IP addresses and default gateways to clients.
How can you most effectively summarize the IP range of addresses from 172.168.12.0/24 through 172.168.13.0/24?
172.168.12.0/23
172.168.12.0/22
172.168.12.0/21
172.168.12.0/20
A subnet mask tells the router to look at which portions of an IP address?
Mask and host bits
Host and network bits
Host and subnet bits
Network and subnet bits
What is the decimal equivalent of the binary number 11000111?
218
199
179
208
What does split horizon specify?
That information about a route should not be sent in any direction
That information about a route should not be sent back in the direction that the original information came from
That information about a route should always be sent back in the direction that the original information came from
That information about a route should be sent back only in the direction that the original information came from
The binary number 11101000111 converted into a decimal number, using powers of 2, is ❌
In which situation is an administrative distance required?
whenever static routes are defined
whenever dynamic routing is enabled
when the same route is learned via multiple routing sources
when multiple paths are available to the same destination and they are all learned via the same routing protocol
What is the RSTP equivalent to the STP listening state?
Blocking
Listening
Discarding
Forwarding
Which statement is true of a port in the listening state?
The port is able to check for BPDUs and populate the MAC table.
The port is able to check for BPDUs, but not yet populate its MAC table.
The port is able to populate its MAC table, but not yet forward user frames.
The port is able to forward user frames, but not yet populate its MAC table.
Which of the following is a customized text that is displayed before the username and password login prompts?
Message Of the Day
Login banner
User banner
Warning message
With RSTP, which two port roles are included in the active topology?
Root and alternate
Root and designated
Alternate and backup
Designated and backup
Which term commonly describes the endless flooding or looping of frames?
Flood storm
Loop overload
Broadcast storm
Broadcast overload
Regarding STP, what is the state of a nondesignated port?
Learning
Which of the following is the most secure method of remotely accessing a network device?
http
telnet
ssh
rmon
snmp
When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
MTU 1500 bytes
Hardware is … 10BaseT
Address is 0050.BD73.E2C1
802.1d STP State: Forwarding
Which term describes multiple copies of a frame arriving on different ports of a switch?
Multiple frame transmission
MAC database instability
Which show command requires that you have privileged EXEC mode access?
show ip
show version
show running
show interfaces
What are TWO major benefits of adding a bridge to a network?
Isolating potential network problems to specific segments
Increasing the speed of a network
Extending a LAN to cover greater distances by joining multiple segments
Creating fewer collision domains
Forwarding data frames between LAN segments
When a single computer with one IP address has several websites open at once, this is called ❌
If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
The > prompt
The privileged EXEC prompt
The Management Console logon screen
A list of commands available on the switch
Which information does the show vlan command display?
VTP domain parameters
VMPS server configuration parameters
Which ports are configured as trunks
Names of the VLANs and the ports assigned to the VLANs
What are TWO reasons for using 802.1Q?
To allow switches to share a trunk link with non-trunking clients
To allow clients to see the 802.1Q header
To provide inter-VLAN communications over a bridge
To load-balance traffic between parallel links using the Spanning Tree Protocol
To provide trunking between Cisco switches and other vendor switches
Which CLI prompt indicates that you are working in privileged EXEC mode?
hostname#
hostname>
hostname-exec>
hostname-config
What are the TWO most common IPv4-to-IPv6 transition techniques?
IPv6 NAT
dual stack
6to4 tunnels
IPv6 mobile
Which TWO pieces of information are included in a CDP update packet?
platform
routing updates
device identifiers
MAC Address list
link speed
Which TWO statements are true regarding dual stack?
A new API replaces gethostbyname and gethostbyaddr calls.
Tunneling is automatic.
Dual stack prefers IPv4 over IPv6.
You cannot use IPv4 while converting to IPv6.
The stack to use is chosen based on destination address.
How can you most effectively summarize the IP range of addresses from 10.1.32.0 through 10.1.35.255?
10.1.32.0/23
10.1.32.0/22
10.1.32.0/21
10.1.32.0/20
How do you start a Catalyst 2950 series switch?
Press the on/off switch.
Power up the redundant power supply.
Connect a network cable to another switch on the network.
Attach the power cable plug to the switch power supply socket.
Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
clock rate 64
clock speed 64
clock rate 64000
clock speed 64000
OSPF routes packets within a single ❌
Which Cisco IOS command creates a message to be displayed upon router login?
hostname hostname
banner motd message
hostname interface description
description interface description
Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
exit>
quit
disable
userexec
Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
user EXEC level
setup EXEC level
enable EXEC level
privileged EXEC level
Which component of security ensures the data has not been tampered with?
Authentication
Integrity
Confidentiality
Anti-Playback
Which organization offers certification for interoperability between vendors of 802.11 products?
Wi-Fi
IEEE
EMA
WISC
Which THREE are the steps to secure a WLAN?
Encryption for providing privacy and confidentiality
Authentication to ensure that legitimate clients and users access the network via trusted access points
Controls transmit power to limit the AP access range to the property boundaries of the parent organization
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
What are THREE characteristics of Ethernet 802.3?
based on the CSMA/CD process
a standard that has been replaced by Ethernet II
specifies the physical layer (Layer 1)
developed in the mid-1970s
specifies the MAC portion of the data link layer (Layer 2)
also referred to as thick Ethernet
Which TWO of these addresses are private IP addresses?
10.215.34.124
127.16.71.43
172.17.10.10
225.200.15
How many bits are in an IPv4 address?
48
64
128
Encapsulates the network layer packet in a frame.
Network layer
Datalink layer
Physical layer
Occurs when RF waves are soaked up by walls.
Absorption
Reflection
Scattering
How many bits are in an IPv6 address?
Provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network
Internet layer
Transport layer
Application layer
Encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire).
Which of the following four attacks are classified as access attacks? (choose one or more)
Password attacks
DDoS
Trojan horse
Love Bug
Which THREE statements about TCP are accurate?
TCP operates at Layer 3 of the TCP/IP stack.
TCP is a connection-oriented protocol.
TCP provides no error checking.
TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
TCP provides no recovery service.
Upon receipt of one or more TCP packets, the receiver returns an acknowledgement to the sender indicating that it received the packets.
isolating potential network problems to specific segments
increasing the speed of a network
extending a LAN to cover greater distances by joining multiple segments
creating fewer collision domains.
forwarding data frames between LAN segments.
Indicates how well the network can accommodate more users or data transmission requirements.
Speed
Cost
Security
Availability
Scalability
Reliability
Topology
Which two statements about wireless networks are accurate?
Instead of cables, wireless communication uses RFs or infrared waves to transmit data.
To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
For wireless LANs, a key component is a router, which propagates signal distribution.
Wireless networks are not very common, and generally only large corporations use them.
What are TWO characteristics of OSPF?
hierarchical
proprietary
open standard
similar to RIP