Which one of the following extends a private network across public networks?
In computer network nodes are _________
Which of this is not a network edge device?
Which of the following is true when describing a unique local address?
Which of the following would be a good starting point for troubleshooting if your router is not translating?
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
Which command will show you the IOS version running on your router?
You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?
How many non-overlapping channels are available with 802.11g?
What is the maximum distance with maximum data rate for 802.11g?
What is the maximum distance with maximum data rate for 802.11a?
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Which of the following is true regarding access lists applied to an interface?
Which of the following is a layer 2 protocol used to maintain a loop-free network?
Layer 2 switching provides which of the following?
1.Hardware-based bridging (ASIC)
2.Wire speed
3.Low latency
4.Low cost
Which of the following allows a router to respond to an ARP request that is intended for a remote host?
What protocols are used to configure trunking on a switch?
1.VLAN Trunking Protocol
2.VLAN
3.802.1Q
4.ISL
What is the main reason the OSI model was created?
What does a VLAN do?
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
Which one of the following extends a private network across public networks?
Your Answer : (Not Answered)
Correct Answer : B
None.
In computer network nodes are _________
Your Answer : (Not Answered)
Correct Answer : D
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.
Which of this is not a network edge device?
Your Answer : (Not Answered)
Correct Answer : D
Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch can’t operate as a host, but as a central device which can be used to manage network communication.
Which of the following is true when describing a unique local address?
Your Answer : (Not Answered)
Correct Answer : D
These addresses are meant for nonrouting purposes like link-local, but they are almost globally unique so it is unlikely they will have an address overlap. Unique local addresses were designed as a replacement for site-local addresses.
Which of the following would be a good starting point for troubleshooting if your router is not translating?
Your Answer : (Not Answered)
Correct Answer : C
In order for NAT to provide translation services, you must have ip nat inside and ip nat outside configured on your router's interfaces.
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
Your Answer : (Not Answered)
Correct Answer : B
Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.
Which command will show you the IOS version running on your router?
Your Answer : (Not Answered)
Correct Answer : C
The best answer is show version, which shows you the IOS file running currently on your router. The show flash command shows you the contents of flash memory, not which file is running.
You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?
Your Answer : (Not Answered)
Correct Answer : C
If you save a configuration and reload the router and it comes up either in setup mode or as a blank configuration, chances are you have the configuration register setting incorrect.
How many non-overlapping channels are available with 802.11g?
Your Answer : (Not Answered)
Correct Answer : A
The IEEE 802.11g standard provides 3 non-overlapping channels.
What is the maximum distance with maximum data rate for 802.11g?
Your Answer : (Not Answered)
Correct Answer : B
The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps, but you need to be close to the access point, somewhere around 90 to 100 feet.
What is the maximum distance with maximum data rate for 802.11a?
Your Answer : (Not Answered)
Correct Answer : A
The IEEE 802.11a standard provides a maximum data rate of up to 54Mbps, but you need to be close to the access point, somewhere around 65 to 75 feet.
You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
Your Answer : (Not Answered)
Correct Answer : D
The only command that shows which access lists have been applied to an interface is show ip interface Ethernet 0. The command show access-lists displays all configured access lists, and show ip access-lists displays all configured IP access lists, but neither command indicates whether the displayed access lists have been applied to an interface.
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Your Answer : (Not Answered)
Correct Answer : C
The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255. The 31 is used for a block size of 32. The wildcard is always one less than the block size.
Which of the following is true regarding access lists applied to an interface?
Your Answer : (Not Answered)
Correct Answer : C
A Cisco router has rules regarding the placement of access lists on a router interface. You can place one access list per direction for each layer 3 protocol configured on an interface.
Which of the following is a layer 2 protocol used to maintain a loop-free network?
Your Answer : (Not Answered)
Correct Answer : B
The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.
Layer 2 switching provides which of the following?
1.Hardware-based bridging (ASIC)
2.Wire speed
3.Low latency
4.Low cost
Your Answer : (Not Answered)
Correct Answer : D
Switches, unlike bridges, are hardware based. Cisco says its switches are wire speed and provide low latency, and I guess they are low cost compared to their prices in the 1990s.
Which of the following allows a router to respond to an ARP request that is intended for a remote host?
Your Answer : (Not Answered)
Correct Answer : C
Proxy ARP can help machines on a subnet reach remote subnets without configuring routing or a default gateway.
What protocols are used to configure trunking on a switch?
1.VLAN Trunking Protocol
2.VLAN
3.802.1Q
4.ISL
Your Answer : (Not Answered)
Correct Answer : A
VTP is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1Q and ISL are used to configure trunking on a port.
What is the main reason the OSI model was created?
Your Answer : (Not Answered)
Correct Answer : C
The primary reason the OSI model was created was so that different networks could inter-operate.
What does a VLAN do?
Your Answer : (Not Answered)
Correct Answer : C
VLANs break up broadcast domains at layer 2.
Total number of questions : 20
Number of answered questions : 0
Number of unanswered questions : 20
We'll write only best content for you