In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are:
Which one of the following computer network is built on the top of another network?
Bluetooth is an example of __________
Which of the following are true regarding OSPF areas?
1.You must have separate loopback interfaces configured in each area.
2.The numbers you can assign an area go up to 65,535.
3.The backbone area is also called area 0.
4.If your design is hierarchical, then you don't need multiple areas.
5.All areas must connect to area 0.
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Which command displays the configuration register setting?
Which command will copy the IOS to a backup host on your network?
Which command will display the CHAP authentication process as it occurs between two routers in the network?
How many non-overlapping channels are available with 802.11g?
You are connecting your access point and it is set to root. What does Extended Service Set ID mean?
You have a Cisco mesh network. What protocol allows multiple APs to connect with many redundant connections between nodes?
A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?
If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
If you wanted administrators to see a message when logging into the router, which command would you use?
What is a stub network?
In a network with dozens of switches, how many root bridges would you have?
How many broadcast domains are created when you segment a network with a 12-port switch?
How often are BPDUs sent from a layer 2 device?
Which protocol does DHCP use at the Transport layer?
What are the two main types of access control lists (ACLs)?
1.Standard
2.IEEE
3.Extended
4.Specialized
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are:
Your Answer : (Not Answered)
Correct Answer : A
Every layer adds its own header to the packet from previous layer.
Which one of the following computer network is built on the top of another network?
Your Answer : (Not Answered)
Correct Answer : D
None.
Bluetooth is an example of __________
Your Answer : (Not Answered)
Correct Answer : A
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
Which of the following are true regarding OSPF areas?
1.You must have separate loopback interfaces configured in each area.
2.The numbers you can assign an area go up to 65,535.
3.The backbone area is also called area 0.
4.If your design is hierarchical, then you don't need multiple areas.
5.All areas must connect to area 0.
Your Answer : (Not Answered)
Correct Answer : D
Loopback interfaces are created on a router, and the highest IP address on a loopback (logical) interface becomes the RID of the router but has nothing to do with areas and is optional, so (1) is wrong. The numbers you can create an area with are from 0 to 4,294,967,295 option (2) is wrong. The backbone area is called area 0, so option (3) is correct. All areas must connect to area 0, so option (5) is correct. If you have only one area, it must be called area 0. This leaves option (4), which must be correct; it doesn't make much sense, but it is the best answer.
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Your Answer : (Not Answered)
Correct Answer : C
Since the configuration looks correct, you probably didn't screw up the copy job. However, when you perform a copy from a network host to a router, the interfaces are automatically shut down and need to be manually enabled with the no shutdown command.
Which command displays the configuration register setting?
Your Answer : (Not Answered)
Correct Answer : C
The show version command provides you with the current configuration register setting.
Which command will copy the IOS to a backup host on your network?
Your Answer : (Not Answered)
Correct Answer : D
To copy the IOS to a backup host, which is stored in flash memory by default, use the copy flash tftp command.
Which command will display the CHAP authentication process as it occurs between two routers in the network?
Your Answer : (Not Answered)
Correct Answer : C
The command debug ppp authentication will show you the authentication process that PPP uses between point-to-point connections.
How many non-overlapping channels are available with 802.11g?
Your Answer : (Not Answered)
Correct Answer : A
The IEEE 802.11g standard provides 3 non-overlapping channels.
You are connecting your access point and it is set to root. What does Extended Service Set ID mean?
Your Answer : (Not Answered)
Correct Answer : A
Extended Service Set ID means that you have more than one access point and they all are set to the same SSID and all are connected together in the same VLAN or distribution system so users can roam.
You have a Cisco mesh network. What protocol allows multiple APs to connect with many redundant connections between nodes?
Your Answer : (Not Answered)
Correct Answer : B
Each AP in a mesh network runs the Adaptive Wireless Path Protocol (AWPP). This protocol allows RAPs to communicate with each other to determine the best path back to the wired network via the RAP.
A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?
Your Answer : (Not Answered)
Correct Answer : B
RIP has an administrative distance (AD) of 120, while IGRP has an administrative distance of 100, so the router will discard any route with a higher AD than 100.
If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
Your Answer : (Not Answered)
Correct Answer : C
Static routes have an administrative distance of 1 by default. Unless you change this, a static route will always be used over any other found route. IGRP has an administrative distance of 100, and RIP has an administrative distance of 120, by default.
If you wanted administrators to see a message when logging into the router, which command would you use?
Your Answer : (Not Answered)
Correct Answer : C
The typical banner is a message of the day (MOTD) and is set by using the global configuration mode command banner motd.
What is a stub network?
Your Answer : (Not Answered)
Correct Answer : D
Stub networks have only one connection to an internetwork. Only default routes can be set on a stub network or network loops may occur.
In a network with dozens of switches, how many root bridges would you have?
Your Answer : (Not Answered)
Correct Answer : A
You should have only one root bridge per network.
How many broadcast domains are created when you segment a network with a 12-port switch?
Your Answer : (Not Answered)
Correct Answer : A
By default, switches break up collision domains but are one large broadcast domain.
How often are BPDUs sent from a layer 2 device?
Your Answer : (Not Answered)
Correct Answer : B
Every 2 seconds, BPDUs are sent out from all active bridge ports by default.
Which protocol does DHCP use at the Transport layer?
Your Answer : (Not Answered)
Correct Answer : C
User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service.
What are the two main types of access control lists (ACLs)?
1.Standard
2.IEEE
3.Extended
4.Specialized
Your Answer : (Not Answered)
Correct Answer : D
Standard and extended access control lists (ACLs) are used to configure security on a router.
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
We'll write only best content for you