A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
Bluetooth is an example of __________
In computer network nodes are _________
The structure or format of data is called ___________
To enable RIPng, which of the following would you use?
Which of the following is an IEEE standard for frame tagging?
You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?
You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
Which of the following protocols support VLSM, summarization, and discontiguous networking?
1.RIPv1
2.IGRP
3.EIGRP
4.OSPF
5.BGP
6.RIPv2
A network administrator needs to configure a router with a distance-vector protocol that allows classless routing. Which of the following satisfies those requirements?
Using the illustration from the previous question, what would be the IP address of S0 if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question.
What are the decimal and hexadecimal equivalents for the binary number 10110111?
In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
Which statement describes a spanning-tree network that has converged?
What is route poisoning?
What is split horizon?
Which statements are true regarding ICMP packets?
1.ICMP guarantees datagram delivery.
2ICMP can provide hosts with information about network problems.
3.ICMP is encapsulated within IP datagrams.
4.ICMP is encapsulated within UDP datagrams.
How long is an IPv6 address?
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
Your Answer : (Not Answered)
Correct Answer : C
Explanation: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination.
Bluetooth is an example of __________
Your Answer : (Not Answered)
Correct Answer : A
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
In computer network nodes are _________
Your Answer : (Not Answered)
Correct Answer : D
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.
The structure or format of data is called ___________
Your Answer : (Not Answered)
Correct Answer : A
Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. In programming languages, syntax of the instructions plays a vital role in designing of the program.
To enable RIPng, which of the following would you use?
Your Answer : (Not Answered)
Correct Answer : B
It's pretty simple to enable RIPng for IPv6. You configure it right on the interface where you want RIP to run with the ipv6 router rip number command.
Which of the following is an IEEE standard for frame tagging?
Your Answer : (Not Answered)
Correct Answer : C
802.1Q was created to allow trunked links between disparate switches.
You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?
Your Answer : (Not Answered)
Correct Answer : D
This question is a little vague, but the best answer is that the VLAN membership for the port is not configured.
You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?
Your Answer : (Not Answered)
Correct Answer : D
By creating and implementing VLANs in your switched network, you can break up broadcast domains at layer 2. For hosts on different VLANs to communicate, you must have a router or layer 3 switch.
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
Your Answer : (Not Answered)
Correct Answer : B
Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.
Which of the following protocols support VLSM, summarization, and discontiguous networking?
1.RIPv1
2.IGRP
3.EIGRP
4.OSPF
5.BGP
6.RIPv2
Your Answer : (Not Answered)
Correct Answer : C
RIPv1 and IGRP are true distance-vector routing protocols and can't do much, really-except build and maintain routing tables and use a lot of bandwidth! RIPv2, EIGRP, and OSPF build and maintain routing tables, but they also provide classless routing, which allows for VLSM, summarization, and discontiguous networking.
A network administrator needs to configure a router with a distance-vector protocol that allows classless routing. Which of the following satisfies those requirements?
Your Answer : (Not Answered)
Correct Answer : D
In this question, we're calling EIGRP just plain old distance vector. EIGRP is an "advanced" distance-vector routing protocol, sometimes called a hybrid routing protocol because it uses the characteristics of both distance-vector and link-state routing protocols.
Using the illustration from the previous question, what would be the IP address of S0 if you were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. Again, the zero subnet should not be considered valid for this question.
Your Answer : (Not Answered)
Correct Answer : C
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated not to use subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes our host range 17-30. 30 is the last valid host.
What are the decimal and hexadecimal equivalents for the binary number 10110111?
Your Answer : (Not Answered)
Correct Answer : B
You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128 + 32 + 16 + 4 + 2 + 1 = 183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By add- ing up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.
In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
Your Answer : (Not Answered)
Correct Answer : B
The split-MAC architecture allows the splitting of 802.11 protocol packets between the Cisco LWAPP-based AP, which handles real-time portions of the protocol, and the WLAN controller, which handles those items that are not time sensitive.
You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
Your Answer : (Not Answered)
Correct Answer : C
If spanning tree is disabled on a switch and you have redundant links to another switch, broadcast storms will occur, among other possible problems.
Which statement describes a spanning-tree network that has converged?
Your Answer : (Not Answered)
Correct Answer : C
Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.
What is route poisoning?
Your Answer : (Not Answered)
Correct Answer : D
Another way to avoid problems caused by inconsistent updates and to stop network loops is route poisoning. When a network goes down, the distance-vector routing protocol initiates route poisoning by advertising the network with a metric of 16, or unreachable (sometimes referred to as infinite).
What is split horizon?
Your Answer : (Not Answered)
Correct Answer : A
A split horizon will not advertise a route back to the same router it learned the route from.
Which statements are true regarding ICMP packets?
1.ICMP guarantees datagram delivery.
2ICMP can provide hosts with information about network problems.
3.ICMP is encapsulated within IP datagrams.
4.ICMP is encapsulated within UDP datagrams.
Your Answer : (Not Answered)
Correct Answer : B
ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostics, it will provide hosts with information about network problems.
How long is an IPv6 address?
Your Answer : (Not Answered)
Correct Answer : D
An IPv6 address is 128 bits long.
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
We'll write only best content for you