Identify which of the following is the route source code for the network that is used in office 2?
If you want to send routing updates in this network, what multicast address will be used?
There is a packet destined for the 172.16.3.0 network. What will R1 do with that packet?
A packet is destined to 192.168.2.1. R1 will use which exit interface to send that packet?
There are interfaces configured on a router and are included in the RIP routing process. Can you identify the commands you should be using to verify those interfaces? (opt any TWO)
A router is configured by you just recently. You have completed the initial configuration as of yet. There is a new network administrator in the company. A series of commands is executed by that administrator on the router that you configured. As a result, there are some changes occurring to the router settings, and those settings are saved on the Setup config. There is a Trivial File Transfer Protocol (TFTP) server on which a backup copy of your configuration file is saved. You now decide to restore your configuration file from the TFTP server on the router. You restore the file to non-volatile random-access memory (I\1VRAM). Can you identify the 105 command that must be used to restore the configuration file?
Can you identify an advantage of using Spanning Tree Protocol (STP) in a Local Area Network (LAN)?
You want to create one broadcast domain and multiple collision domains. Which device will be used for that prupose?
There is a Network topology in which a common cable is used to effectively directly connect every host device to every other host device. Can you identify that Network topology?
You are working for an organization as a network administrator. You use the address space of 192.168.10.0/26 to configure the network. The network is divided into two parts. The router is configured as the Dynamic Host Configuration Protocol (DHCP) server for the first part of network. An IP pool of 192.168.10.0/27 is configured by you. The IP address 192.168.10.32 is assigned to the default router. Coming to the second part of the network, the leftover IP addresses are manually assigned to the computers. A complaint is reported by users as they are not able to communicate with a computer that has been assigned the IP address 192.168.10.62. Can you identify what is wrong with this configuration?
You have started working as a network architect for an organization. You are just starting to manage a network with Cisco routers and switches. You somehow forgot the password to one of the routers. What step would you take if you want to ensure that you can reset the password on the device?
You have a Cisco 2960 switch for which you want to secure the unused ports on. Identify the command you would use.
There is a subnet with a device that has an IP address 192.168.10.52 and the subnet mask 255.255.255.248. Can you identify the broadcast address on that subnet?
You are required to provide interVLAN routing services. You plan on configuring a router on a stick methodology. Can you identify the first you will take in order to properly configure the router and provide this service?
You are required to upgrade on your router the Internetwork Operating System (IOS). You have a Trivial File transfer protocol (TFTP) server on the local network. It is decided that you will save a backup copy of the IOS file to your TFTP server. Can you identify the IOS command you would use?
If you want to disable the translation of DNS-based host names to IP addresses on a router, what command will be used?
IP dddresses are temporarily leased from a DHCP pool. Can you identify which command would you run to view total IP addresses leased?
You are required to secure the console port on a Cisco router. Here are the requirements for it: -Those who have a valid username and password will be allowed to connect -The timeout duration for a session would be 10 minutes Can you identify the set of commands you would use in this situation?
You want to do a verification of the real time status of NTP running on a cisco router. Can you identify which command would you use?
You are working for an organization as a network administrator. You are required to create a routing policy for the organization's network. Dynamic routing is decided to be implemented on the network. Following are some considerations that you have keep in mind while deciding upon a routing protocol: -It is a network with seven routers -Implementation must be very easy - VLSM must be supported by the protocal and multicast updates must be used -The protocol should be a distance vector routing protocol. Can you identify the routing protocol you should choose to use?
You are working for an organization as a network administrator. There is a Cisco 2960 switch on the network for which you enable port security. Some secured Media Access Control (MAC) addresses are added manually by you on the secured port. You have to wipe out one of the secured MAC addresses from the address table. Can you identify the Cisco IOS command you would use for the purpose of removing the MAC address?
Can you identify from below two statements that describe static routing benefits? (Choose two.)
Can you identify the standard protocol that allows wireless LAN controller to manage access points?
You are working for an organization as a network administrator for your organization. Virtual Local Area Networks (LANs) are implemented on the network switches. It is reported that one of the users is facing problem connecting to network resources after the VLAN implementation. Upon digging you suspect that there was a problem in configuration of the switch interface through which the user connects the network. The switch interface seems to be not associated with the proper VLAN membership. You determine that the user connects to the switch via the FastEthernet 0/4 interface and should be a member of VLAN 2. Can you identify the three commands you would use in order to validate this suspicion? (opt any THREE)
Being a network administrator, you configure a new router for your organization’s network. You want to ensure secure access to the router. Can you identify the three practices that are identified for securing router access? (opt any THREE)
You want to send a message from one device to multiple devices who have subscribed to that information. Identify the address type that can be used to flow the message to those devices.
Can you identify what is provided by the FCS section of an Ethernet frame?
|Buy Individually Timezone|
About Individual Course:
Our experts featured on QuickStart are driven by our ExpertConnect platform, a community of professionals focused on IT topics and discussions. Interact with these experts, create project opportunities, gain help and insights on questions you may have, and more.