option
Questions
ayuda
daypo
search.php
ERASED TEST, YOU MAY BE INTERESTED ON CCNA EXAM 200-301
COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNA EXAM 200-301

Description:
2023 - QUESTIONS OF THE CISCO BOOK

Author:
C F D A
Other tests from this author

Creation Date: 15/09/2023

Category: Competitive Exam

Number of questions: 211
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? Same-layer interaction Adjacent-layer interaction OSI model All of these answers are correct.
Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) Ethernet HTTP IP UDP SMTP TCP.
Which of the following protocols are examples of TCP/IP data-link layer protocols? (Choose two answers.) Ethernet HTTP UDP SMTP TCP PPP IP.
The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data-link header and trailer, is an example of what? Data encapsulation Same-layer interaction OSI model All of these answers are correct.
Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers? Data Chunk Segment Frame Packet.
Which OSI encapsulation term can be used instead of the term frame? Layer 1 PDU Layer 2 PDU Layer 3 PDU Layer 5 PDU Layer 7 PDU Layer 4 PDU.
Which of the following terms represents L3PDU in the OSI model, which includes the network layer header and its encapsulated data? Packet Data Segment Frame.
IP functions at what layer of the OSI Reference Model? Network Physical Session Transport.
A user has sent a request to the server. What process does the server go through to determine what service is being requested by the user? De-encapsulation Fragmentation Segmentation Encapsulation.
The term segment refers to which layer PDU? Internetwork layer PDU Network Access PDU Application layer PDU Transport layer PDU.
Which of the following are advantages of using multimode fiber for an Ethernet link instead of UTP or single-mode fiber? To achieve the longest distance possible for that single link. To extend the link beyond 100 meters while keeping initial costs as low as possible. To make use of an existing stock of laser-based SFP/SFP+ modules. To make use of an existing stock of LED-based SFP/SFP+ modules.
Which of the following is true about the CSMA/CD algorithm? The algorithm never allows collisions to occur. Collisions can happen, but the algorithm defines how the computers should notice collision and how to recover. The algorithm works with only two devices on the same Ethernet. None of the other answers is correct.
Which of the following are true about the format of Ethernet addresses? (Choose three answers.) Each manufacturer puts a unique OUI code into the first 2 bytes of the address. Each manufacturer puts a unique OUI code into the first 3 bytes of the address. Each manufacturer puts a unique OUI code into the first half of the address. The part of the address that holds this manufacturer’s code is called the MAC. The part of the address that holds this manufacturer’s code is called the OUI. The part of the address that holds this manufacturer’s code has no specific name.
Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? (Choose two answers.) Burned-in address Unicast address Broadcast address Multicast address.
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? Only the devices that use cables are using Ethernet. Only the devices that use wireless are using Ethernet. Both the devices using cables and those using wireless are using Ethernet. None of the devices are using Ethernet.
A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information about hostname? ARP ping DNS None of these answers is correct.
Which of the following are true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? The host always sends packets to its default gateway. The host never sends packets to its default gateway. The host sends packets to its default gateway if the destination IP address is in a different subnet than the host. The host sends packets to its default gateway if the destination IP address is in the same subnet as the host.
Which of the following does a router normally use when making a decision about routing TCP/IP packets? Destination MAC address Source MAC address Destination IP address Source IP address Destination MAC and IP addresses.
Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2, which extracts the Ethernet frame for forwarding to PC2. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly re-created by Router2 before forwarding data to PC2. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before forwarding the packet to Router2.
Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are the most likely to be true about this WAN? (Choose two answers.) R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence. R1 will forward data-link frames to R2 using an HDLC header/trailer. R1 will forward data-link frames to R2 using an Ethernet header/trailer.
When the Cisco IOS CLI is initially accessed via console, Telnet, or SSH, with no extra privileges, which mode is the user placed into? Enable mode Boot mode Configuration mode User mode.
Which answers encrypt the password that will be required of a user after they type the enable EXEC command? enable password password-value enable password-value password password-value enable secret password-value.
What will a switch compare in its MAC table to be able to forward a frame? Destination MAC address Source MAC address Destination IP address Source IP address.
Which type of memory does a switch use to build the MAC address table ? DRAM NVRAM CAM Flash .
What are common LAN Layer 1 problem indicators? (Choose two) Late collisions Incorrect IP addressing Incorrect VLAN assignments Collisions High-bandwidth utilization.
How does a switch build its MAC address table By listening to incoming frames and examining the source MAC address By listening to outgoing frames and examining the destination MAC address By listening to incoming frames and examining the destination MAC address By listening to outgoing frames and examining the source MAC address.
What is the default aging time for MAC table entries that have not been used? 300 seconds 3 minutes 30 seconds 300 milliseconds.
After power on, a frame arrives at a switch. The switch had not yet learned the source MAC address of that frame. Which actions must the switch take in this case? The switch adds the destination MAC address to the MAC address table. The switch checks the frame for loops. The switch adds the source MAC address to its MAC table. The switch adds the source and destination MAC address to the MAC address table.
If an engineer issued the copy running-config startup-config command, which Cisco memory type would the configuration be copied to? ROM Flash NVRAM RAM.
Which command will generate the SSH encryption keys? crypto key generate rsa crypto key modulus ssh crypto key modulus rsa crypto key generate ssh.
Bob has an IP address on his computer, and can ping the interface of the switch. SSH is enabled on the vty lines, but the user Bob cannot log in to the switch via SSH? What needs to be added to the configuration? Generate the RSA key pair for SSH Make Bob’s password at least eight characters long Require local authentication Configure a domain name for the switch.
On a VLAN in which all RSTP priorities tie, the current root switch just failed. Which switch will take over as the root? Switch 0010.3245.0001 Switch 0010.3245.0122 Switch 0004.3265.0125 Switch 00A0.3245.0131.
Which of the following are LACP modes that you can use with EtherChannel configuration? Select 2 answers Passive Desirable On Auto Active.
Which of the listed configuration options for Etherchannel load distribution is valid? Select 3 answers src-ip-dst-port src-mac-dst-ip src-mac dst-ip src-dst-mac.
When configuring interfaces to be part of the same EtherChannel, which of the following should you configure identically? Select 4 answers Access VLAN on an access port Duplex MAC addresses on a trunk or access port Speed Allowed VLANs on a trunk.
Which spanning-tree modes are Cisco proprietary? Select 2 answers PVST+ RPVST+ STP MSTP RSTP MST.
Which of the following would be in a forwarding state in RSTP? (Choose two) Designated ports The root port on a nonroot switch Alternate ports All the root ports on the root switch .
What is the default bridge priority on Cisco switches? 4096 65535 32768 32765.
On which switch would you always find a root port? Nonroot switch Switch that has a designated port Switch that does not have any blocking ports Switch that has forwarding ports Root switch.
If spanning tree is disabled, what are the potential issues with a redundant Layer 2 network design? Select 3 answers Duplicate IP addresses MAC database instability TTL expiring Broadcast storms Multiple (duplicate) frames being seen.
What is the correct order for the following steps in the spanning-tree algorithm? A: Elect a designated port for each segment. B: Elect a root port for each nonroot switch. C: Root ports and designated ports transition to the forwarding state. D: Elect a root bridge. Steps D, B, A, C Steps A, C, D, B Steps D, C, B, A Steps A, C, B, D.
An STP topology with three switches has one link between each pair of switches. Which answer best describes the primary decision point as to which non-root switch has a designated port on the link between switches, and which does not? The switch with the lowest priority setting would become designated, and the other switch would block. The switch with the lowest root cost would become designated, and the other switch would block. The switch with the highest root cost would become designated, and the other switch would block. The device with the lowest BID would always become designated, and the other switch would block. The device with the highest BID would become designated, and the other switch would block. .
Which of the following are functions provided by Spanning Tree Protocol? Select 3 answers Prevents broadcast storms Prevents multiple copies of a single frame from being forwarded Places a Layer 3 port into blocking state if it is a parallel (redundant) path that would cause a loop Prevents MAC table instability Uses TTL to control loops in the network .
In a layer 2 switched LAN, all links are running at 100 Mbps. STP uses all default port cost configuration. Non-root switch SW2 receives a Hello on its root port, with that Hello listing a root cost of 38. If SW2 then forwards a Hello out some other port, what root cost will SW2 list in that Hello? 38 57 19 None of these are correct 42.
Which of the following are characteristics of 802.1Q? Select 4 answers Uses the concept of a native VLAN Does not encapsulate a normal Ethernet frame before forwarding, but instead inserts a header after the destination and source MAC addresses Supported by 2960 switches Supported by IP Phones Encapsulates a normal Ethernet frame before forwarding it over a trunk Cisco proprietary .
Which Cisco IOS command can be used to display which VLANs are supported over a specific configured switch trunk? show trunk show interfaces trunk show switchport trunk show interfaces switchport trunk .
Two switches are connected using a crossover cable. Using the combinations of configurations for the switchport mode mode interface subcommand (one on each end of the crossover cable on each switch), which of the following are accurate? Select 2 answers dynamic desirable and dynamic auto will end up in a trunk being formed. access and trunk would end up in a negotiated trunk. trunk and dynamic auto will end up in a trunk being formed. dynamic auto and dynamic auto will end up in a dynamic trunk being negotiated. .
What is true about the command switchport nonegotiate? If connected to a switch that uses dynamic desirable, the neighboring switch will not trunk. Using this command prevents a switchport from being a trunk port. This will cause DTP packets to be sent, preventing a trunk from being negotiated. This is on by default. It is used on a router to prevent VLAN hopping. .
Which command administratively disables trunking on a 2960XR switch interface, such that the switch cannot use a trunking protocol on the interface? Assume that all commands shown in the answers are used in interface configuration mode. The no switchport trunk command The no switchport mode trunk command The switchport trunk disable command The switchport mode off command The switchport mode access command The switchport access vlan x command .
One of the key differences between ISL and 802.1q is the concept of a native VLAN. Which of the following is true about the native VLAN and its use in ISL and 802.1Q? 802.1Q tags frames for the native VLAN as if they were in reserved VLAN 999 ISL does not encapsulate frames if they are a part of the native VLAN ISL encapsulates frames for the native VLAN as if they were in reserved VLAN 999 802.1Q does not tag (add) a trunking header to frames if they are a part of the native VLAN .
Which options correctly list the addresses covered by the indicated address class? Select 2 answers Class B—addresses beginning with 128–191, inclusive Class C—addresses beginning with 192–223, inclusive Class B—addresses beginning with 127–191, inclusive Class C—addresses beginning with 172–212, inclusive .
All IP addresses that begin with 186.72 would be considered part of which address class? Class C Class A Class B Class D .
Which two options are true about IP addressing rules? Select 2 answers Addresses in the same subnet do not need to be separated by a router. Addresses in different subnets do not need to be separated by a router. Addresses in different subnets need to be separated by a router. Addresses in the same subnet need to be separated by a router. .
What is the prefix notation mask for DDN mask 255.255.252.0? /22 /23 /25 /24 .
There is a reserved address range between Class A and Class B address ranges. What is this reserved range used for? Loopback Anycast Multicast Broadcast .
Which version of IP was developed with the intention of solving the address exhaustion problem that exists with IPv4? IP Next Generation IP Version 6 IP Version 5 IP Version 8 .
What is the formula to calculate the possible number of subnets in an IP network, assuming that the same mask is used in all subnets? 2 ^ network bits – host bits 2 ^ borrowed bits 2 ^ borrowed bits – 2 2 ^ host bits – 2 .
To which subnet does host 192.168.148.76/29 belong? 192.165.148.56 192.168.148.64 192.168.148.72 192.168.148.80 .
You have been assigned a class B IP network to use in your Enterprise. Which one answer offers the closest estimate to the number of IPv4 addresses in that class B network? Over 1200 254 Over 16 million Over 65,000 .
What are the default masks for each network class? class A – 255.0.0.0, class B – 255.0.255.0, class C – 255.255.255.0 class A – 255.0.0.0, class B – 255.255.0.0, class C – 255.255.255.255 class A – 255.0.0.0, class B – 255.255.0.0, class C – 255.255.255.0 class A – 255.255.0.0, class B – 255.255.255.0, class C – 255.255.255.255 .
How many usable hosts are there per subnet if you have the address 192.168.8.0 with a subnet mask of 255.255.255.240? 14 8 16 4.
An engineer at Acme Corporation was tasked with the subnetting design for a new headquarters location. The only information she was given is shown here: Select 2 answers Use the 172.20.0.0/16 address space. Plan for at least 400 different subnets of the same size. Plan for each subnet to have at least 50 hosts per subnet. How many subnet and host bits would be required? Subnet: 10, Host: 6 Subnet: 9, Host: 7 Subnet: 11, Host: 5 Subnet: 8, Host: 8 .
For the IP address 172.30.197.0/23, which statements are correct? Select 2 answers It utilizes 15 network bits. It utilizes 11 host bits. It utilizes 7 subnet bits. It utilizes 9 host bits. .
Which of the following IP address/mask combinations, if configured on a working router interface, would create a connected route for an entire classful network, instead of a route for a subnet of a classful network? Select 2 answers 10.1.1.1/16 172.16.1.1/16 172.16.4.3/24 172.16.8.1/22 192.168.1.1/24 10.2.2.2/28 .
The size of a subnet is calculated with the formula 2 raised to the H minus 2. Why are two hosts subtracted from this possible size? One host address is reserved for the subnet number, and the other is reserved for the subnet broadcast address. One host address is reserved for the default gateway address, and another is reserved for the local broadcast address. One host address is reserved for the DHCP server, and the other is reserved for the DNS server. One host address is reserved for the local broadcast address, and the other is reserved for the subnet broadcast address. .
Which of the following addresses could be used as private IP addresses? Select 2 answers 172.15.9.3 172.31.0.3 10.13.0.11 192.186.0.3 127.0.0.1 .
How many bits are used for subnetting in a subnet, based on this sample address: 125.168.32.99 255.255.128.0? 9 bits 12 bits 11 bits 10 bits .
Given a prefix length of /29, what is the correct mask in DDN? 255.255.255.128 255.255.255.248 255.255.255.240 255.255.255.192 255.255.255.252 255.255.255.224 .
Which of the following is true about the classful address 128.44.2.2?. The network broadcast address is 128.255.255.255. The network ID is 128.44.0.0. It is Class A. The first valid host on the network would be 128.44.1.0. .
Which options correctly list the addresses covered by the indicated address class? Select 2 answers Class C—addresses beginning with 172–212, inclusive Class B—addresses beginning with 128-191, inclusive Class C—addresses beginning with 192–223, inclusive Class B—addresses beginning with 128-192, inclusive .
A customer support rep at the help desk is working a problem. The problem record mentions address 172.16.1.1 and mask 255.255.254.0. At a lunch-and-learn session yesterday, the rep heard the network engineering team say that they avoided VLSM, and used only a single subnet mask in network 172.16.0.0. Which of the following answers is accurate regarding this implementation of network 172.16.0.0 and its subnetting plan? Select 2 answers Each subnet supports 126 hosts The network supports up to 512 subnets Each subnet supports 510 hosts The network supports up to 256 subnets Each subnet supports 254 hosts The network supports up to 128 subnets .
If subnetting class B network 172.18.0.0 using subnet mask 255.255.240.0 for all subnets, which answers list an address in the second subnet? Select 2 answers 172.18.33.5 172.18.16.10 172.18.8.11 172.18.31.200 .
What questions should be asked when planning subnetting? Select 2 answers How many hosts will be on each subnet? How many subnets will be needed? How many routers will be connected to each subnet? What is the speed of the hosts’ interfaces? What type of operating system is running? .
When using static routes, you type in ip route 10.1.1.0 255.255.255.0, and two options are available to specify the next hop as the next parameters in the command. Select the two valid choices. via 10.2.2.2 via serial1/0/1 serial1/0/1 10.2.2.2 pass-to 10.2.2.2 .
What are the two ICMP messages used by the ping command? Time exceeded and destination unreachable Echo request and echo reply Timestamp and timestamp reply Router advertisement and router solicitation .
Which Cisco IOS command would be used on a switched interface to enable it to become a routed interface? routing enable routing port switchport disable no switchport .
Which of the answers list a configuration step on a Cisco access switch to support IP routing using only SVIs? Select 3 answers Each routed physical interface must be configured with an IP address. The switch is enabled for IP routing. The VLAN associated with the VLAN interface must be configured and active. Each VLAN interface must be configured with an IP address. .
Which command will identify routers along the path to the destination host? ping traceroute ipconfig ifconfig.
Which switch Cisco IOS command moves the user from global config mode to the correct mode to configure a management IP address that exists in VLAN 300? vlan 300 interface dot1q 300 interface vlan 300 encapsulation dot1q 300 .
Which two steps must you perform to enable router-on-a-stick on a router subinterface? Configure the subinterface with an IP address. Configure full-duplex and speed. Configure IEEE 802.1q encapsulation for the VLAN. Configure an IP route to the VLAN. .
When you are configuring routed ports on a Layer 3 switch, what do the physical interfaces act as? An SVI interface A switchport interface A Layer 2 interface A Layer 3 interface .
How would you log in to router R1, which has IP address 10.10.10.1, from Router R2 using SSH with a username of bozo? ssh –l 10.10.10.1 bozo ssh 10.10.10.1 –l bozo ssh –l bozo 10.10.10.1 ssh username bozo 10.10.10.1 .
Which answer shows the correct configuration for 802.1Q encapsulation on a router subinterface for VLAN 2? interface FastEthernet 0/1.2 encapsulation dot1q 2 ip address 192.168.2.2 255.255.255.0 interface FastEthernet 0/1.2 ip address 192.168.2.2 255.255.255.0 interface FastEthernet 0/1.2 subinterface vlan 2 ip address 192.168.2.2 255.255.255.0 interface FastEthernet 0/1 encapsulation dot1q 2 ip address 192.168.2.2 255.255.255.0 .
You are troubleshooting connectivity issues with a router. You type in the command show ip interface brief. You notice that the status is “administratively down” and the protocol is “down.” What is the meaning of this information? Layer 1 and Layer 2 of this interface are functioning. The interface is not shut down, but the physical layer has a problem. Layer 2 has a problem. The interface has a shutdown command configured on it. .
Which type of error is purposefully triggered when using the traceroute command? ICMP TTL Exceeded ICMP Redirect ICMP Destination Unreachable ICMP Information Reply .
Which Cisco IOS command can be used on a router to view the different VLANs that have been configured into a ROAS configuration? show vlan configuration show roas status show roas configuration show vlans .
Which Cisco IOS command can be used on a switch to ensure that the interface connecting to a router configured as a ROAS is trunking? show trunking show switchport trunk show interfaces trunk show trunks .
Of the Cisco IOS commands that are typically used to view interface IP addressing information, which one shows only the address but not the mask information configured for an interface? show ip interface show protocols show ip interface brief show interfaces .
Which of the following can be used to place a valid route into the routing table of a Cisco IOS router? Select 3 answers Use OSPF with more than one router Configure static routes Implement name-to-IP resolution Add an IP address to an up/up interface Apply the use of wildcard masks .
What are the ICMP error messages that traceroute triggers from the routers when it is generating packets? Echo Reply Destination Unreachable Time-to-Live Exceeded Bad Parameter .
Which protocol is used by Cisco IOS’s version of the traceroute command for outbound messages? TCP CDP ICMP UDP .
Which Cisco IOS command is used on a router’s Ethernet subinterface to associate it with VLAN 200 and make it the interface that handles untagged frames? switchport access default vlan 200 tagging enable 200 untag vlan 200 native encapsulation dot1q 200 native .
Which Cisco IOS command is used on a switch L3 route packets? asic control routing enable sdm prefer ip-routing ip routing sdm prefer lanbase-routing .
Which Cisco IOS command is used on a router’s Ethernet subinterface to associate it with VLAN 100? encapsulation dot1q 100 switchport access vlan 100 vlan 100 tagging enable 100 .
Which Cisco IOS command can be used to display the cable type connected to a serial interface and the speed that it is configured? show hardware interface show interfaces show controllers show ip interface .
Which types of LSAs will the ABR create? Type 3 LSA Type 0 LSA Type 1 LSA Type 2 LSA .
What are two configurable settings that can influence the DR/BDR election? Select 2 answers OSPF reference bandwidth OSPF process ID OSPF interface priority OSPF Router ID .
What can you configure on an OSPF router interface to influence the DR election? Cost Network type Priority Timers .
A command reveals a router interface with a bandwidth of 1 Mbps. If not set using additional configuration, what cost will OSPF assign to the interface? 19 64 10 100.
What is the default Dead interval timer for an OSPF router? Three times the “Hello” timer Two times the “Hello” timer Four times the “Wait” timer Four times the “Hello” timer .
Which state have two OSPF routers reached when they have established a neighbor relationship and have completed the exchange of all available link-state advertisements? Down Exstart Full Loading .
OSPF routers can hear Hellos from another router, but not form neighbor relationships. Which of the following definitely prevent neighbor relationships from being formed? Select 2 answers When both routers have the same configured dead interval, but with the dead interval not being four times the Hello interval Mismatched networks listed in the configured network commands Mismatched subnet numbers An ip ospf access-group 101 in command on the interface, with ACL 101 filtering the RID of the other router Mismatched Hello intervals .
What will happen if two OSPF routers have different MTU sizes? The hello/dead timers will change. They will fail to exchange their LSDBs. They can exchange routes. They will have duplicate RIDs. .
Which type of routes will a router add to its IP routing table if the router does not use a routing protocol? Select 3 answers Connected routes Dynamic route Static routes Floating static .
OSPF-enabled routers send “Hello” packets using which multicast IP address? 224.0.0.5 224.0.0.12 224.0.0.10 224.0.0.9 .
OSPF utilizes _________ to organize topology information. LSAs TLAs SPFs DBUs.
If not configured with the router-id command, what is the next option a Cisco router uses to choose its OSPF router-ID? Use the IP address of the active non-loopback interface with the highest interface ID number Use the IP address of the active non-loopback interface with the highest IP address Use the IP address of the active loopback interface with the highest interface ID number Use the IP address of the active loopback interface with the highest IP address .
What is the default reference bandwidth for the OSPF algorithm for most Cisco IOS routers? 1 Mbps 100 Mbps 1000 Mbps 10 Mbps .
Which answers list a requirement for an OSPF neighbor relationship? Select 2 answers Hello/dead timers must match. Interfaces must be in the same subnet. The process IDs must match. The router IDs must be identical. .
Which LSA types describe the topology inside an OSPF area? LSA type 1 and LSA type 3 LSA type 2 and LSA type 3 LSA type 1 only LSA type 1 and LSA type 2 .
Four OSPF routers connect to the same LAN. In a new election after all routers have been rebooted, which router wins the DR election? R2, router-id 2.2.2.2, priority 3 R1, router-id 1.1.1.1, priority 4 R3, router-id 3.3.3.3, priority 2 R4, router-id 4.4.4.4, priority 1 .
Which OSPF message type is used to actually send the LSAs between neighbors? Link-State Update Link-State Request Link-State Shuttle Link-State Description .
Two internal OSPF routers connect to the same LAN-based subnet, with router R1 acting as DR and router R2 as BDR. What LSA(s) will R1 create and flood that R2 does not? There is no difference in the type of LSAs each router creates and floods. Type 1 LSA Type 3 LSA Type 2 LSA .
Which Cisco IOS command is used to advertise a default route into an OSPFv2 domain regardless of whether a default static route is configured? default-information originate default-information originate permanent default-information originate always default-information originate no-check .
Which options do not prevent a directly connected OSPF speaker from becoming a neighbor? Area mismatch Hello Timer mismatch Subnet Mask mismatch OSPF Process ID mismatch .
What commands will configure an OSFP point-to-point network type? R1(config)# interface fa0/1 R1(config-if)# ip ospf network point-to-point R1(config)# interface fa0/1 R1(config-if)# ospf network point-to-point R1(config)# interface fa0/1 R1(config-if)# ip network point-to-point R1(config)# interface fa0/1 R1(config-if)# no ip ospf network broadcast .
What command can you use to verify the neighbor adjacencies of an OSPF router? show ip ospf database show running-config show ospf interface brief show ip ospf neighbor .
Which options are stable OSPF neighbor states? Loading Full Exstart Established 2-way .
In the absence of a direct cost being configured for an OSPF interface, and using the default reference OSPF bandwidth, what is the OSPF cost for a Fast Ethernet interface operating at 100 Mbps? 1 64 19 4 10.
Examine the output of the show ipv6 interface brief command shown in the exhibit. What two address types are shown? Select 2 answers R1# show ipv6 interface brief FastEthernet0/0 [administratively down/down] unassigned GigabitEthernet1/0 [administratively down/down] FE80::C800:1FF:FE7E:1C FD00:1:1:2:C800:1FF:FE7E:1C Unique local Link-local Multicast Anycast .
Host A, in one Ethernet VLAN, needs to communicate using IPv6 to host B, which is in another Ethernet VLAN. Which answer best describes the protocol used by host A to learn the layer 2 address of Host B? NDP No protocol is used; A does not learn B's MAC address. ARP OSPFv3 .
What are these steps used for in an IPv6 network? 1. Split the 6-byte (12-hex-digit) MAC address in two halves (6 hex digits each). 2. Insert FFFE in between the two, making the interface ID now have a total of 16 hex digits (64 bits). 3. Invert the seventh bit of the interface ID. Determining the IPv6 address of a default gateway NetFlow flow tracking Automatic assignment of host part of an IPv6 address Configuration of SNMP for IPv6 .
IPv6 represents a binary IPv6 address using hex characters. Which of the following binary strings represent C E? C E 1100 1110 None of the provided choices are correct. 1011 1101 .
On R1, IPv6 unicast routing is not enabled. After entering the preceding commands, what do you expect to see in the show ipv6 interface brief output? R1(config-if)# mac-address 0000.1111.1111 R1(config-if)# ipv6 enable None, because IPv6 routing is not enabled FF80::200:11FF:FE11:1111 FE80::200:11FF:FE11:1111 FE80:0000:0000:0000:0000:11FF:FE11:1111 FE80:0000:0000:0000:0200:11FF:FE11:1111 .
When a device sends a Router Solicitation (RS) NDP packet, looking for a new local IPv6 router, which destination address would be involved in this request? FF02::1 The broadcast address The unicast address of a router FF02::2 The solicited node multicast address of a router .
Examine the output shown in the exhibit. What is true about the number 1 shown in brackets? R1# show ipv6 route static ! Legend omitted for brevity S 2001:DB8:1111:2::/64 [1/0] via Serial0/0/0, directly connected It is the hop count. It is the order of analysis for a routing decision. It is the metric. It is the administrative distance. .
Your company is going to be using Ethernet for the connection to the Internet service provider (ISP). The service provider (on its network) will be using Ethernet over MPLS (EoMPLS). The ISP is using an address of 2001:db8:1111:4::1/64 for this connection. Which of the following addresses would be appropriate for your end of this connection? 2001:db8:1111::2/64 None of the addresses listed as choices would be compatible with the ISP’s address. 2001:db8:1111:4::2/64 2001:db8::1111:4:2/64 .
The answers show four values the engineer could configure in an ipv6 address command on the interface. Which commands would result in the interface using the equivalent of IPv6 address 2500:6400:0087:BE00:0000:ACB0:00EB:04A0? Select 2 answers 2500:6400:87:be:0:acb:00eb:04a0 2500:6400:0087:be::acb0:eb:04a0 2500:6400:87:be00:0:acb0:00eb:4a0 2500:6400:87:be00:0:acb0:00eb:04a0 .
Examine the configuration shown in the exhibit. What type of IPv6 address configuration is being completed here? ipv6 unicast-routing ! interface GigabitEthernet0/0 ipv6 address 2001:DB8:1111:1::1/64 Dynamic unicast Static unicast IPv6 multicast addressing Modified EUI-64 .
Identify the first hex digits for a link-local address in an IPv6 network. FE80 FF 3 2.
How many subnets can be created from one hex character in an IPv6 address? 8 12 32 4 64 16.
Which Cisco IOS command would correctly route traffic destined for the 2300:1451:2463:242d:e3ab:35e4:1563:0001/64 network out the GigabitEthernet0/1 interface? ipv6 route 2300:1451:2463:242d::/64 interface Gi0/1 ipv6 route 2300:1451:2463:242d::/64 Gi0/1 ip route v6 2300:1451:2463:242d::/64 Gi0/1 ip route 2300:1451:2463:242d::/64 Gi0/1 .
If your ISP assigns you prefix 2003:1234:abcd:6600:: /56, how many bits do you have to create your subnets? 4 bits 12 bits 16 bits 8 bits .
You have decided to use an IPv6 addressing system for a small part of your network. You don’t need connectivity to the rest of the Internet, but you may add links from your company directly to partner companies, so that you want to make sure and use unique IPv6 addresses across all these partnering companies. Which of the following networks would you use for your pilot program? FE80::/64 None of the network addresses provided as choices could be used for this pilot. FD00:1:cc1e:6783::/64 FF05::/64 2001:db8:cc1e:6783::/64 .
Which of these is a correct representation of an IPv6 address? 2002:1234:A1AD:61:81AF:ABCD 2001:1:257:836F::1 3450:ABCD:WAYZ:0067::2A4 2001:1000:130F::076a::123a .
Which Cisco IOS command would correctly route traffic destined for the 2300:0:2463:114:2573:bc12:aec2:1/64 network using a next-hop address of 3000:2636:2f42:ea36::5425:1? ip route v6 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1 ip route 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1 ipv6 route 2300:0:2463:114::/64 3000:2636:2f42:ea36::5425:1 ipv6 route 2300:0:2463:114::/64 address 3000:2636:2f42:ea36::5425:1 .
What statement is true about the command ipv6 unicast-routing? This command is required for the assignment of IPv6 addresses to interfaces. This command is required for the dynamic assignment of IPv6 addresses to interfaces. This command is required for the operation of IPv6 routing on the device. This command has been deprecated and is no longer recommended. .
PC1 and PC2 reside on the same VLAN. Both hosts use IPv6. When PC1 pings PC2’s IPv6 address, PC1 does not know PC2’s MAC address. How does PC1 learn PC2’s MAC address? DHCP Stateless autoconfiguration NDP ARP .
Based on the IPv6 solicited multicast address of FF02::1:FFE0:8, which of the global unicast addresses could be configured? 2000:83B7:28A2:8134:AB83:EFCA:9384:23BA 2002:0001:BA81:8531:AB81:9384:AB7D:0008 2500:AB83:EBAC:9134:C801:1AFF:FEE0:0008 2500:AB83:EBAC:9134:C801:1AFF:FEE0:0008 .
Which Cisco IOS command would correctly route traffic destined for the 8163:bc23:4632:ac23::/64 network using the fe80::1234:7484:26b4:2362 next hop address out the GigabitEthernet0/1 interface? ipv6 route 8163:bc23:4632:ac23::/64 Gi0/1 fe80::1234:7484:26b4:2362 ipv6 route 8163:bc23:4632:ac23:/64 Gi0/1 link-local fe80::1234:7484:26b4:2362 ipv6 route 8163:bc23:4632:ac23::/64 fe80::1234:7484:26b4:2362 ip route v6 8163:bc23:4632:ac23::/64 Gi0/1 fe80::1234:7484:26b4:2362 .
Given the global unicast address of 2000:B71A:8560:AB73:816A:BE81:AB71:FF01, what would the solicited-node multicast address be? FF02::1:FF71:FF01 FF02::1:FE71:FF01 FF02::1:AB71:FF02 FF02::1:AB71:FF01 .
Which IPv6 addresses represent a global IPv6 address? (select two) fe80::3af:fe24:4567:890a 2a10::abd:3eb2:1234 ff02::a 2001:db8:85a3::8a2e:370:7334 .
Based on the configuration provided below, what would be the assigned link local address? interface FastEthernet0/0 mac-address 0000.5B2D.003A ipv6 address 2000:AB83:00FB:1DAE::/64 eui-64 FF02::0:5BFF:FE2D:3A FE80::0:5BFF:FE2D:3A FF02::200:5BFF:FE2D:3A FE80::200:5BFF:FE2D:3A .
The R1 interface has a MAC address of 00:21:2F:B5:C3:80. What will be the IPv6 address generated by the router if you configure the interface to use the EUI-64 format? 00:21:2F:FF:FE:B5:C3:80 FE80::0221:2FFE:FFB5:C380 2001::0021:2FFF:FEB5:C380 FE80::0221:2FFF:FEB5:C380 .
Which IPv6 unicast addresses would now be included in the output of the command show ipv6 interface fa0/0 on R1? Select 2 answers FF02::1:FF00:1 2001:1234::211:22FF:FE33:4455 FE80::211:22FF:FE33:4455 2001:1234::1 FE80::11:22FF:FE33:4455 .
Which of the following succinctly describes the specific address range typically used by IANA for global IPv6 addresses? fe80::/10 2000::/2 2000::/3 fe80::/16 2000:db8::/16 .
Which of the following fields cannot be compared based on an extended IP ACL? (Choose two answers.) Protocol Source IP address Destination IP address URL Filename for FTP transfers TOS byte .
An engineer configures an ACL but forgets to save the configuration. At that point, which of the following commands display the configuration of an IPv4 ACL, including line numbers? (Choose two answers.) show running-config show startup-config show ip access-lists show access-lists .
Which of the following access-list commands permit packets going from host 10.1.1.1 to all web servers whose IP addresses begin with 172.16.5? (Choose two answers.) access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www access-list 2523 permit ip host 10.1.1.1 eq www 172.16.5.0 0.0.0.255 access-list 2523 permit tcp host 10.1.1.1 eq www 172.16.5.0 0.0.0.255 access-list 2523 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www .
Assume a TCP connection already exists between PC1 and PC2. Which TCP message packet would be the final one to be sent between devices if both approve the connection termination? TCP-SYN, FIN TCP-FIN,ACK TCP-FIN TCP-ACK .
What is the correct sequence for TCP connection establishment? There is no sequence because TCP is a connectionless protocol. (1) SYN (2) SYN ACK (3) ACK (1) ACK (2) SYN ACK (3) SYN (1) SYN (2) ACK (3) SYN .
Which extended ACL port number parameter indicates a match for a specific application/application number greater than 20? > 20 gt 20 ge 20 greater 20 .
Which Cisco IOS statement could be used to match only the IP address 1.2.3.4 using ACL number 10? access-list 10 permit 1.2.3.4 access-list permit 10 1.2.3.4 access-list permit 10 ip 1.2.3.4 access-list 10 permit ip 1.2.3.4 .
Which applications use the primary Layer 4 protocol UDP (select 3 awnsers) RTP-Based Voice over IP (VoIP) DHCP Telnet TFTP HTTP (www) FTP .
Which ports are ephemeral ports? Select 2 answers 53 2286 80 80800 51974 619943.
A user sits at her PC at her desk inside an Enterprise network. She opens a web browser and connects to a website that sits on the Internet. Which of the following answers is most true about the applications and functions used as a result of this user’s actions? The user's PC sends at least two messages to the server before requesting the specific web page. The transfer of files uses the FTP protocol. UDP is used as part of the process of resolving the website's name into the default gateway's MAC address. UDP is used as part of the process of transferring files from the web server to the user's web browser. .
A junior-level engineer has been given the task of configuring an ACL on a router; he was told that the port that should be blocked is TCP 20. Which access-list command keyword could be used in place of this port number when configured? ftp smtp tftp tftp-data.
Which option would be the correct wildcard mask to match a subnet with the 255.255.248.0 subnet mask? 0.0.31.255 0.0.15.255 0.0.3.255 0.0.7.255.
A junior-level engineer has been given the task of configuring an ACL on a router; she was told that the port that should be blocked is UDP 69. Which access-list command keyword could be used in place of this port number when configured? ftp-data smtp tftp ftp .
If a numbered ACL utilized the number 1600, which type of ACL would it be? Named Extended Broad Standard .
Which options are true about implementing standard ACLs? Select 2 answers All standard ACLs have a default permit action. Place them as close to the source as possible. Place them as close to the destination as possible. All standard ACLs have a default deny action. .
Which statement would correctly match traffic coming from the 192.168.31.0/24 network to the 10.10.10.1 host? access-list 100 permit ip 10.10.10.1 192.168.31.0 0.0.0.255 access-list 100 permit ip host 10.10.10.1 192.168.31.0 0.0.0.255 access-list 100 permit ip 192.168.31.0 0.0.0.255 host 10.10.10.1 access-list 100 permit ip 192.168.31.0 0.0.0.255 10.10.10.1 .
Which of the following answers lists the correct layer 4 protocol(s) and well-known port used by each application? DNS: UDP and TCP, port 53 HTTP: TCP, port 110 SSH: TCP, port 22 POP3: UDP, 110 .
Which of the following are true about TCP? Select 2 answers This protocol is suited for important traffic such as Voice over IP (VoIP). This protocol supports multiplexing. This protocol is used by Telnet. This protocol provides a limited variety of services. .
Which option would be the correct subnet specified with the ACL access-list 1 permit 192.30.32.0 0.0.31.255? 192.30.32.0 255.255.240.0 192.30.32.0 255.255.224.0 192.30.32.0 255.255.192.0 192.30.32.0 255.255.128.0 .
Which extended ACL port number parameter indicates a direct match for a specific application/application number? = eq equal ==.
In a reflection attack, the source IP address in the attack packets is spoofed so that it contains which one of the following entities? The address of the attacker The address of the reflector The address of the victim The address of the router .
An actual potential to exploit a vulnerability is known as which one of the following terms? Vulnerability Attack Exploit Threat .
During a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform? Eavesdrop on traffic passing between hosts Induce a buffer overflow on multiple hosts Modify data passing between hosts Use ping sweeps and port scans to discover the network .
Suppose an attacker sends a series of packets toward a destination IP address with the TCP SYN flag set but sends no other packet types. Which of the following attacks is likely taking place? Spoofing attack Reflection attack Reconnaissance attack Denial-of-service attack .
In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers.) MAC address Source IP address Destination IP address ARP address .
A next-generation firewall sits at the edge of a company’s connection to the Internet. It has been configured to prevent Telnet clients residing in the Internet from accessing Telnet servers inside the company. Which of the following might a next-generation firewall use that a traditional firewall would not? Match message destination well-known port 23 Match message application data Match message IP protocol 23 Match message source TCP ports greater than 49152 .
Which actions show a behavior typically supported by a Cisco next-generation IPS (NGIPS) beyond the capabilities of a traditional IPS? (Choose two answers) Gather and use host-based information for context Comparisons between messages and a database of exploit signatures Logging events for later review by the security team Filter URIs using reputation scores .
A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows: interface range gigabitethernet 0/1 - 24 switchport mode access switchport port-security switchport port-security mac-address sticky Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.) Prevents unknown devices with unknown MAC addresses from sending data through the switch ports. If a user connects a switch to the cable, prevents multiple devices from sending data through the port. Will allow any one device to connect to each port and will save that device’s MAC address into the startup-config. Will allow any one device to connect to each port but will not save that device’s MAC address into the startup-config. .
A switch’s port Gi0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.) The switch puts the interface into an err-disabled state when the first frame arrives. The switch generates syslog messages about the violating traffic for the first frame. The switch increments the violation counter for Gi0/1 by 1. The switch discards both the first and second frame. .
Which of the following is required when configuring port security with sticky learning? Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security maximum interface subcommand. Enabling port security with the switchport port-security interface subcommand. Defining the specific allowed MAC addresses using the switchport port-security mac-address interface subcommand. All the other answers list required commands. .
Which of the following commands list the MAC address table entries for MAC addresses configured by port security? (Choose two answers.) show mac address-table dynamic show mac address-table show mac address-table static show mac address-table port-security .
A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC and the DHCP server, which ones do the client send? (Choose two answers.) Acknowledgment Discover Offer Request .
A router connects to an Internet Service Provider (ISP) using its G0/0/0 interface, with the ip address dhcp command configured. What does the router do with the DHCPlearned default gateway information? The router ignores the default gateway value learned from the DHCP server. The router uses the default gateway just like a host, ignoring its routing table. The router forwards received packets based on its routing table but uses its default gateway setting to forward packets it generates itself. The router adds a default route based on the default gateway to its IP routing table. .
Which answers list a criterion for choosing which router interfaces need to be configured as a DHCP relay agent? (Choose two answers.) If the subnet off the interface does not include a DHCP server If the subnet off the interface does include a DHCP server If the subnet off the interface contains DHCP clients If the router interface already has an ip address dhcp command .
On a multilayer switch, a switch needs to be configured to perform DHCP Snooping on some Layer 2 ports in VLAN 3. Which command may or may not be needed depending on whether the switch also acts as a DHCP relay agent? no ip dhcp snooping information option ip dhcp snooping limit rate 5 errdisable recovery cause dhcp-rate-limit ip dhcp snooping vlan 3 .
Switch SW1 needs to be configured to use DHCP Snooping in VLAN 5 and only VLAN 5. Which commands must be included, assuming at least one switch port in VLAN 5 must be an untrusted port? (Choose two answers.) no ip dhcp snooping trust ip dhcp snooping untrust ip dhcp snooping ip dhcp snooping vlan 5 .
Switch SW1 has been configured to use Dynamic ARP Inspection with DHCP Snooping in VLAN 5. An ARP request arrives on port G0/1. Which answer describes two items DAI always compares regardless of the configuration? The message’s ARP origin hardware address and the message’s Ethernet header source MAC address The message’s ARP origin hardware address and the DHCP Snooping binding table The message’s ARP target IP address and the DHCP Snooping binding table The message’s ARP target IP address and the switch’s ARP table .
Layer 2 switch SW2 connects a Layer 2 switch (SW1), a router (R1), a DHCP server (S1), and three PCs (PC1, PC2, and PC3). All PCs are DHCP clients. Which of the following are the most likely DHCP Snooping trust state configurations on SW2 for the ports connected to the listed devices? (Choose two answers.) The port connected to the router is untrusted. The port connected to switch SW1 is trusted. The port connected to PC1 is untrusted. The port connected to PC3 is trusted. .
Switch SW1 needs to be configured to use Dynamic ARP Inspection along with DHCP Snooping in VLAN 6 and only VLAN 6. Which commands must be included, assuming at least one switch port in VLAN 6 must be a trusted port? (Choose two answers.) no ip arp inspection untrust ip arp inspection trust ip arp inspection ip arp inspection vlan 6 .
A Layer 2 switch needs to be configured to use Dynamic ARP Inspection along with DHCP Snooping. Which command would make DAI monitor ARP message rates on an interface at an average rate of 4 received ARP messages per second? (Choose two answers.) ip arp inspection limit rate 4 burst interval 2 ip arp inspection limit rate 10 burst interval 2 ip arp inspection limit rate 16 burst interval 4 ip arp inspection limit rate 4 .
An engineer hears about DHCP Snooping and decides to implement it. Which of the following are the devices on which DHCP Snooping could be implemented? (Choose two answers.) Layer 2 switches Routers Multilayer switches End-user hosts .
What happens when a router’s WAN interface receives a DHCP address with a default gateway configured? The IP address and mask are configured on the router’s WAN interface, and a default route out the router’s LAN interface is dynamically configured. The IP address and mask are configured on the router’s LAN interface, and a default route out the router’s LAN interface is dynamically configured. The IP address, mask, and gateway are configured on the router’s LAN interface. The IP address, mask, and gateway are configured on the router’s WAN interface. The IP address and mask are configured on the router’s LAN interface, and a default route out the router’s WAN interface is dynamically configured. The IP address and mask are configured on the router’s WAN interface, and a default route out the router’s WAN interface is dynamically configured. .
From the spoofing attacks listed, which option(s) attempts to exhaust a system service or resource with the intent to crash the target system? Man-in-the-middle DoS/DDoS Reflection Amplification .
When comparing next-generation IPS to traditional IPS, what additional capability(ies) can be leveraged to more efficiently block traffic? (choose three) Signature-based filtering Contextual awareness Event impact level AVC .
Which security function would be the best option to mitigate a DoS attack? Stateful firewall Router ACL Security zone Stateless firewall .
After enabling port security in restrict mode on an interface, which Cisco IOS command could be used to show the number of discarded frames (if any) as well as the last source MAC address? show port-security show port-security interface interface show switchport security show interface interface switchport .
You would like to limit telnet connection into your router to a range of IP address. You have created the access list numbered 99, how do you apply this ACL to limit telnet connections? access-group 99 in under the ethernet interface access-group 99 in under the VTY interface access-class 99 in under the VTY interface access-class 99 in under the ethernet interface .
Which hash method is used by default when using the enable secret Cisco IOS command? HMAC SHA-0 MD5 3DES .
In what security zone are the public web servers located? Outside DMZ Inside Campus .
What command should you configure globally to enable automatic recovery of port security errdisable states? errdisable recovery cause port-security restrict errdisable recovery cause psecure-restrict errdisable recovery cause port-security violation errdisable recovery cause psecure-violation .
What command would need to be utilized to allow DAI to check for source MAC addresses? ip arp validate src-mac ip arp validate inspection src-mac ip arp inspection validate src-mac ip arp inspection src-mac .
Which Cisco IOS command would be used to display the current violation mode for all configured Port Security interfaces? show port-security interface interface show switchport security show interface interface switchport show port-security .
What does DAI look for to help validate correct ARP entries? (choose two) ARP ACLs Infrastructure ACLs DHCP Snooping binding data ARP table .
From the following spoofing attacks, which option(s) leverages an application, device, or service to increase the amount of traffic being sent toward a target? Amplification Reflection Man-in-the-middle DoS/DDoS .
From the malware types listed, which option(s) is packaged inside other software? Worm Trojan horse Virus .
From the password authentication and alternatives listed below, which option(s) includes something you are? Passwords Two-factor Digital certificates Biometric scanners .
Which of the following spoofing attacks eavesdrops on traffic? Reflection Man-in-the-middle Amplification DoS/DDoS .
From the password authentication and alternatives listed below, which option(s) includes something you have? (choose two) Two-factor Passwords Biometric scanners Digital certificates .
Which of the four messages used by DHCP is sent by the client to ask for the server to lease the IPv4 address listed from the server? Request Offer Acknowledgement Respond .
What command limits the messages sent to a syslog server to levels 4 through 0? logging trap 0-4 logging trap 0,1,2,3,4 logging trap 4 logging trap through 4 .
The only NTP configuration on router R1 is the ntp server 10.1.1.1 command. Which answers describe how NTP works on the router? As an NTP server only As an NTP client only As an NTP server only after the NTP client synchronizes with NTP server 10.1.1.1 As an NTP server regardless of whether the NTP client synchronizes with NTP server 10.1.1.1 .
A switch is cabled to a router whose host name is Hannah. Which of the following LLDP commands could identify Hannah’s model of hardware? (Choose two answers.) show neighbors show neighbors Hannah show lldp show lldp interface show lldp neighbors show lldp entry Hannah .
What level of logging to the console is the default for a Cisco device? Informational Errors Warnings Debugging .
Which of the following is accurate about the NTP client function on a Cisco router? The client synchronizes its time-of-day clock based on the NTP server. It counts CPU cycles of the local router CPU to more accurately keep time. The client synchronizes its serial line clock rate based on the NTP server. The client must be connected to the same subnet as an NTP server. .
Imagine that a switch connects through an Ethernet cable to a router, and the router’s host name is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah? (Choose two answers.) show neighbors Hannah show cdp show cdp neighbors show cdp neighbors Hannah show cdp entry Hannah show cdp neighbors detail .
Report abuse