Misc Flashcards

(20 cards)

1
Q

What is the network ID of the IPv6 address 2001:db8:deca:abce:45eb:27ff:feba:fa38/48?

2001::

2001:db8::

2001:db8:deca::

2001:db8:deca:abce::

A

Answer
The correct answer is 2001:db8:deca::. Each hexadecimal character represents 4 binary bits. The first 12 characters correspond to 48 bits. 2001:db8:deca:abce:: would have the /64 prefix, 2001:db8:: would have the /32 prefix, and 2001: would have the /16 prefix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which three security services does the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) provide? (Choose three.)

access control

authentication

authorization

data confidentiality

data redundancy

A

Answer
The correct answers are access control, authentication, and data confidentiality. CCMP is the standard encryption protocol for use with Wi-Fi Protected Access 2 (WPA2). CCMP does not provide authorization and data redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum stratum level that you can configure on a Cisco device?

12

15

21

24

A

Answer
The correct answer is 15. Cisco IOS allows you to configure stratum levels from 1 to 15.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two statements about the Dynamic Multipoint Virtual Private Network (DMVPN) are true? (Choose two.)

DMVPN creates hub-to-spoke tunnels.

DMVPN creates spoke-to-spoke tunnels.

DMVPN is used for connection between an enterprise and a provider.

DMVPN is used for connection between enterprises.

DMVPN is used within a branch network.

A

Answer
The correct answers are DMVPN creates hub-to-spoke tunnels and DMVPN creates spoke-to-spoke tunnels. After building the hub-and-spoke VPNs, the spokes can establish direct spoke-to-spoke tunnels, based on the information they obtain from the hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have set up a small office/home office (SOHO) to work from home. You are using broadband internet with a remote-access Virtual Private Network (VPN) to connect to your company resources. Which statement correctly describes this deployment mode?

A VPN-capable router is required for the SOHO network.

You can use the web browser to establish a VPN tunnel.

A permanent VPN connection is required.

VPN tunneling is performed by the internet service provider (ISP).

A

Answer
The correct answer is You can use the web browser to establish a VPN tunnel. Remote-access VPN allows you to establish VPNs using VPN-client software or a web-based client. Remote-access VPNs are not statically set up. Site-to-site VPNs, on the other hand, require VPN-capable devices to connect to the VPN gateway at the company’s side. In site-to-site deployment mode, the end hosts are not aware of the tunneling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two types of cables can be used to connect to the console port of a Cisco router? (Choose two.)

crossover

rollover

serial

straight-through

USB

A

Answer
The correct answers are rollover and USB. Cisco devices traditionally used rollover cables to connect to the console port. Today, Cisco devices also offer a USB mini console port on the device. Crossover, straight-through, and serial cables are used to interconnect devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which three fields are included in a TCP header? (Choose three.)

destination address

destination port

flags

frame check sequence

window size

A

Answer
The correct answers are destination port, flags, and window size. The destination port is the sequence of the called port (16 bits), window size is the sequence of the data amount the destination can accept (16 bits), and flags are control bits (9 bits). The destination address field is included in Ethernet and IP headers. Frame check sequence is a field in an Ethernet header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two valid IPv6 address scopes for a unique local IPv6 address? (Choose two.)

global

interface-local

link-local

organization-local

site-local

A

Answer
The correct answers are organization-local and site-local. Unique local IPv6 addresses are equivalents of private IPv4 addresses. They can be considered globally unique, because the probability of duplication is extremely low. Unique local IPv6 addresses are routable inside of a limited area, such as a site. Also, unique local IPv6 addresses may be routed between a limited set of sites (within an organization), but are not expected to be routable on the global internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a particular VLAN is deleted, what happens to interfaces that were assigned to the deleted VLAN?

They are reassigned to VLAN 1 automatically.

They are put into err-disabled mode.

They become inactive.

The interface configuration is erased.

A

Answer
The correct answer is They become inactive. When a port is assigned to a non-existent VLAN or a VLAN that gets deleted, the port becomes inactive and is unable to communicate with the rest of the network. VLAN 1 is a factory default VLAN that is automatically assigned to an access port, unless its configured otherwise. Removing a VLAN does not change interface configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which three characteristics apply to the 802.1Q protocol? (Choose three.)

It carries untagged frames.

It modifies the 802.3 frame header.

It includes an 8-bit field for TTL (Time to Live).

It is a messaging protocol that carries a VLAN configuration.

It uses an internal tagging mechanism.

A

Answer
The correct answers are It carries untagged frames, It modifies the 802.3 frame, and It uses an internal tagging mechanism. The 802.1Q protocol does not include an 8-bit field for TTL, and it is not a messaging protocol that carries a VLAN configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the exhibit. PC_A wants to communicate with PC_B, which resides on a different network. The hosts are connected via a router that acts as the default gateway for both. The ARP tables on all three devices are empty. When PC_A sends the first frame, which two things happen in the process? (Choose two.)

PC_A broadcasts the frame intended for PC_B.

PC_A sends a broadcast ARP request looking for the MAC address of the router.

The router adds an IPv4 address to the MAC address’s mapping for PC_A to its ARP table.

The router drops the packet after checking for the mapping of PC_B’s IP address.

The router receives a frame with its own MAC and mismatched IP address, and drops it.

A

Answer
The correct answers are PC_A sends a broadcast ARP request looking for the MAC address of the router and The router adds an IPv4 to the MAC address’s mapping for PC_A to its ARP table. Since PC_A does not have a destination MAC address for the IP address of host B, it first acquires this information using ARP. The ARP request is broadcast, and the router and all other devices on the same network segment receive the ARP request. Only the router responds to it with its own MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which command is used to verify a default gateway configuration on a Layer 2 switch?

show interface description

show interface stats

show ip default-gateway network

show management

show running-config

A

Answer
The correct answers is show running-config. The show interface description command displays the interface protocol status and the interface description. The show interface stats command displays interface statistics. The show management command displays the management applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which three IPv4 addresses are private? (Choose three.)

10.255.255.254

172.31.255.254

172.32.255.254

192.168.1.100

192.169.1.100

A

Answer
The correct answers are 10.255.255.254, 172.31.255.254, and 192.168.1.100. These ranges of IP addresses are private: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. Addresses in these ranges are not routed on the internet backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two symptoms are characteristic of a duplex mismatch? (Choose two.)

The full-duplex side of the link will experience increased collision rates.

The half-duplex side of the link will experience increased collision rates.

TCP data transfer will perform better than UDP data transfer.

The connection will not be operational.

The full-duplex side of the link will have a large number of CRC errors.

A

Answer
The correct answers are The half-duplex side of the link will experience increased collision rates and The full-duplex side of the link will have a large number of CRC errors. The full-duplex side of the link does not detect any collisions, since Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is disabled on the full-duplex side of the link. The connections with a duplex mismatch are typically operational, but they operate poorly. When used to send a larger amount of data, the TCP data transfer would provoke collisions and trigger TCP retransmissions, which slows down the transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When the store-and-forward switching method is in use, which part of the Ethernet frame is used to perform error checking using cyclic redundancy check (CRC)?

All frame fields, except the FCS field in the trailer.

The destination MAC address in the header, and the FCS field in the trailer.

The frame check sequence (FCS) field in the trailer.

The source MAC address in the header, and the FCS field in the trailer.

A

Answer
The correct answer is All frame fields, except the FCS field in the trailer. A cyclic redundancy check is used to generate a CRC value for the FCS field. The FCS field value is computed as a function of the contents of the destination address, source address, type, and data and padding fields of the Ethernet frame, in other words, on all Ethernet frame fields except the FCS field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are configuring an IPv6 static route using the link-local IPv6 address as the next-hop. Which command has the correct syntax?

ipv6 route 2001:0db8:beef:: 2001:0db8:feed::1

ipv6 route 2001:0db8:beef:: fa1/0 fe80::2

ipv6 route 2001:0db8:beef::/32 2001:0db8:feed::1

ipv6 route 2001:0db8:beef::/32 fa1/0 fe80::2

A

Answer
The correct answer is ipv6 route 2001:0db8:beef::/32 fa1/0 fe80::2. A static route gives an option for the link-local next hop address, which is specified with the “fe80” prefix. When using a link-local address as the next hop, you must use an exit interface, as this link-local address can be used on any interface. “2001:0db8:feed::1” shows a route to the network that points to the global IPv6 address. The answers ipv6 route 2001:0db8:beef:: 2001:0db8:feed::1 and ipv6 route 2001:0db8:beef:: fa1/0 fe80::2 are missing prefixes.

17
Q

Which of the following is the correct binary representation of the third octet of the IPv4 address 172.20.170.50?

0001 1110

0110 0110

1010 1010

1100 1011

A

Answer
The correct answer is 1010 1010. The decimal value of 170 converts to 1010 1010 in binary.

18
Q

How can a RADIUS server enhance management security in wireless environments?

By enforcing access control list (ACL) configurations.

By preventing brute-force login attempts.

By providing a stronger encryption.

By providing individualized login to specific network devices.

A

Answer
The correct answer is By providing individualized login to specific network devices. ACLs are not controlled by RADIUS servers, RADIUS does not prevent brute-force attacks, and encryption strength is not related to RADIUS server presence or absence.

19
Q

Refer to the exhibit. In an 802.1X implementation, what are the roles of the devices shown?

A: authenticator, B: supplicant, C: authentication server

A: client device, B: supplicant, C: authentication server

A: supplicant, B: authenticator, C: authentication server

A: supplicant, B: client device, C: authentication server

A

Answer
The correct answer is A: supplicant, B: authenticator, C: authentication server. A supplicant is a workstation with 802.1X-compliant client software. An authenticator acts as a proxy between the supplicant and an authentication server. An authentication server authenticates supplicants connecting to a switch port.

20
Q

How many switch ports are designated ports on a root bridge?

all of them

none of them

one

two

A

Answer
The correct answer is all of them. For root bridges, all switch ports are designated ports. Non-root bridges have only one designated switch port.