What is the route source code associated with the network used in office 2?
What multicast address is used to send routing updates in this network?
What will R1 do with a packet destined for the 172.16.3.0 network?
Which exit interface will R1 use to send a packet destined to 192.168.2.1?
Which command should you use to verify the interfaces that have been configured on a router and are included in the RIP routing process? (Choose two.)
You are experiencing some problems with your network, which is shown in the exhibit. You issue a ping command from Router A and get the following output: Router_Attping 192.168.7.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.7.1, timeout is 2 seconds: ni Success rate is 80 percent (4/5), round-trip min/avg/max = 16/16/16 ms Router_Att What is a likely cause of the problem that is illustrated by the output of the ping command?
You recently completed initial configuration of a router. A new network administrator executes a series of commands on the router that results in changes to that configuration, which he then saves to startup-config. You saved a backup copy of your configuration file on your Trivial File Transfer Protocol (TFTP) server. You want to restore your configuration file from the TFTP server to non-volatile random access memory (I\1VRAM) on the router. Which 105 command should you use to restore the configuration file?
What is the advantage of using Spanning Tree Protocol (STP) in a Local Area Network (LAN)?
Which devices creates one broadcast domain and multiple collision domains?
In which Network topology is every host device effectively directly connected to every other to host device through a common cable?
You are the network administrator for your company. You configure the network using an address space of 192.168.10.0/26. You divide the network into two parts. For one part you configure the router as the Dynamic Host Configuration Protocol (DHCP) server. You configure an IP pool of 192.168.10.0/27. The default router is assigned the 192.168.10.32 IP address. You manually assign the remaining IP addresses to the computers in the second part of the network. Some of the users are reporting that they are unable to communicate with a computer that has been assigned the IP address 192.168.10.62. What is wrong with the configuration?
- C. You cannot assign IP addresses manually to a computer when the DHCP pool has been configured. The DHCP pool should include all of the IP addresses assigned.
You recently started to manage a network with Cisco routers and switches. You do not know the password to one of the routers. You need to ensure that you can reset the password on the device. What should you do?
You want to secure the unused ports on your Cisco 2960 switch. Which command should you use?
What is the broadcast address on the subnet with a device with an IP address 192.168.10.52 and subnet mask 255.255.255.248?
You work on the network shown in the exhibit and gather the displayed information from Core Router A. You need to configure a specific route to directly reach the 10.3.3.0/24 network from Core Router A via Core Router B. Which command should you use ?
You need to provide interVLAN routing services and have decided upon a router on a stick methodology. To properly configure the router to provide this service, what is the first thing you need to do?
You upgrade the Internetwork Operating System (IOS) on your router. You decide to save a backup copy of the IOS file to your Trivial File transfer protocol (TFTP) server on the local network. Which IOS command should you use?
Which command disables the translation of DNS-based host names to IP addresses on a router?
Which command would you run to view the total number of addresses leased from a DHCP pool?
Your task is to secure the console port on a Cisco router. You have the following requirements: * Anyone with a valid username and password is allowed to connect. * The session should time out after 10 minutes. Which set of commands should you use?
Which command do you use to verify the real time status of NTP running on a cisco router?
You are the network administrator for your company and are creating a routing policy for the company's network. You have decided to implement dynamic routing on the network. You need to decide upon a routing protocol based on the following considerations: * The network is a small network with 7 routers. * It must be very easy to implement. * The protocol should support VLSM and use multicast updates. * The protocol should be a distance vector routing protocol. Which routing protocol should you use?
You are the network administrator for your company. You have enabled port security on a Cisco 2960 switch on the network. You manually added some secured Media Access Control (MAC) addresses on the secured port. You want to remove one of the secured MAC addresses from the address table. Which Cisco IOS command would you use to remove the MAC address?
Which two statements describe benefits of static routing? (Choose two.)
- B. Static routing provides ease of routing table maintenance in smaller networks that are not expected to grow significantly in future.
Which protocol is in use between a wireless LAN controller and access points?
You are the network administrator for your organization. You have recently implemented Virtual LANs (VLANs) on your network switches. A user reports that he is unable to connect to network resources after the VLAN implementation. You suspect that the switch interface through which the user connects the network was improperly configured and is not associated with the proper VLAN membership. You determine that the user connects to the switch via the FastEthernet 0/4 interface and should be a member of VLAN 2. Which three commands could you use to validate your suspicion? (Choose three.)
How many collisions domains are in the network shown in the exhibit?
You are configuring a new router for your network and want to make access to the router secure. What are three recommended practices for securing router access? (Choose three.)
- B. Encrypt all passwords in the running configuration file by using the service password-encryption command
Which address type can be used to send a message from one device to a group of devices that subscribe to the information?
What does the FCS section of an Ethernet frame provide?
- C. It contains error data, which is useful for the switch to find similar frames and discard them completely.
About Individual Course:
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|