Which layer of the OSI model deals with the logical addressing of a packet?
Select Answer
Network Layer (Layer 3), which handles logical addressing such as IP addresses and routing decisions.
Data Link Layer (Layer 2), which handles physical addressing such as MAC addresses and frame forwarding within a LAN.
Transport Layer (Layer 4), which manages end-to-end communication and segmentation but does not handle addressing.
Physical Layer (Layer 1), which deals with the transmission of raw bits over physical media and does not involve addressing.
In the TCP/IP networking model, which layer is responsible for providing error recovery services?
Select Answer
Application Layer
Transport Layer (provides error recovery for TCP but not UDP)
Data Link Layer
Network Layer
What protocols get used in layers five through seven of the OSI model?
Select Answer
SNMP, VoIP, SMTP, POP3
HDLC, IEEE 802.3
TCP, UDP
IP
A and D only.
The TCP/IP model's "Segment" falls under what OSI layer?
Select Answer
L5PDU (Data)
L3PDU (Packet)
L4PDU (Segment) - The transport layer encapsulates data into segments, which are then passed to the network layer for packet encapsulation.
Fragmentation occurs at Layer 3, not Layer 4.
This OSI layer utilizes the Telnet and VoIP protocols and deals with how to start, control, and end conversations.
Select Answer
Transport Layer.
Application Layer.
Session Layer.
Data Link Layer.
None of the above.
Which of the following OSI layers typically does not need to add an encapsulation header?
Select Answer
Application
Transport
Network
DataLink
Which of the following protocols is not considered a protocol at the application layer?
Select Answer
HTTP
SMTP
Telnet
UDP
Which OSI layer defines the standards for cabling and connectors?
Select Answer
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5, 6, or 7
SNMP, resides on what layer of the most current TCP/IP model?
Select Answer
The Data Link Layer
The Internet/Network Layer
The Transport Layer
The Application Layer
DHCP, resides on what layer of the most current TCP/IP model?
Select Answer
Layer 3
Layer 2
Layer 4
Layer 5
This output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line listing details about the fields inside the respective header. You will need to remember some parts of the various headers, and compare those concepts to this output, to answer this question.
Based on the packet capture shown, which of the following is true?

Select Answer
Line A is used for logical addressing, routing, and path determination.
Line B is related to formatting data into frames appropriate for transmission onto some physical medium.
Line C information is used to route packets through the internetwork.
Line C corresponds to the Transport layer of the TCP/IP model.
Line D is used for connection establishment and termination, flow control, and segmentation of large data blocks into smaller parts for transmission.
A _________ address is an address a single host listens to on a network.
Select Answer
Broadcast
Multicast
Unicast
Anycast
What answer best describes Twisted Pair?
Select Answer
Higher twisting rates reduce crosstalk and EMI, improving signal integrity in noisy environments.
Improper termination of twisted pair cables can increase susceptibility to EMI and cause intermittent connectivity.
Twisting the wire pairs together helps cancel out most of the EMI by balancing the electromagnetic fields and supporting differential signaling.
Using untwisted cables in high EMI environments can lead to increased crosstalk and degraded signal quality.
Which statement correctly describes 10BASE-T and 100BASE-TX Ethernet pin assignments?
Select Answer
PC NICs transmit on pins 3 and 6; switches transmit on pins 1 and 2.
PC NICs transmit on pins 1 and 2; switches transmit on pins 3 and 6.
Devices always use the same pairs for transmit and receive, so a crossover cable is never required.
Auto-MDIX forces all devices to use pins 1 and 2 for both transmit and receive.
10BASE-T and 100BASE-TX use all four pairs for simultaneous transmit and receive.
A commonly used header format for an Ethernet Frame consists of
Select Answer
Preamble, Start Frame Delimiter, Source MAC Address, Destination MAC Address, Type, Data and Pad, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Length/Type, Data, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Type, Data and Pad, Frame Check Sequence
Start Frame Delimiter, Preamble, Destination MAC Address, Source MAC Address, Type, Data, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Data, Frame Check Sequence
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?
Select Answer
Only the devices that use cables are using Ethernet.
Only the devices that use wireless are using Ethernet.
Both the devices using cables and those using wireless are using Ethernet.
None of the devices are using Ethernet.
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Select Answer
RAM
ROM
Flash
NVRAM
Bubble
What type of cable is needed when connecting a Switch to a PC NIC?
Select Answer
a straight-through cable
a crossover cable
a UTP cable
a fiber cable
How many bytes are in the SFD field of an Ethernet frame?
Select Answer
7
1
6
2
How many bytes are in the FCS field of an Ethernet frame?
Select Answer
7
4
6
2
The following table represents an Ethernet frame. The numbers in the table represent bytes. What is the name of the field denoted with an asterisk?
|
7 |
1 |
* 6 |
6 |
2 |
Data |
4 |
Select Answer
SFD
Destination
Source
Type
Why would a computer need to request information from a DNS server?
Select Answer
The client attempts to contact the primary DNS server first; if it does not respond, it queries the secondary DNS server to resolve the domain name.
Recursive queries require the DNS server to fully resolve the domain name, while iterative queries return the best answer the server has, possibly referring the client to another DNS server.
The client needs to convert a domain name to an IP address by querying DNS servers, which may involve recursive or iterative queries and use cached information to improve resolution speed.
DNS does not convert IP addresses to names for client connections; that function is performed by reverse DNS lookups, which are separate from standard forward resolution.
Which of the following is NOT a goal of a routing protocol?
Select Answer
Dynamically learn network routes and populate the routing table with the best routes based on administrative distance and metrics.
Implement loop-prevention techniques such as split horizon, route poisoning, and hold-down timers.
Prefer the most recently learned route to a destination regardless of its metric or administrative distance.
Detect route failures and converge by recalculating or installing alternate routes according to the protocol’s convergence process.
How does the receiver of an HDLC frame know what has been encapsulated within that frame?
Select Answer
HDLC only encapsulates IPv4
Based on the FCS field
From the IP address (IPv4, IPv6, and so on)
The Type field in the header
Based on the Flag field

Refer to the diagram and exhibit. Where will traffic destined for the 5.0.0.0 network be sent by R1?
| R1's Routing Table: 2.0.0.0 -> R3 3.0.0.0 -> R4 4.0.0.0 -> 4 5.0.0.0 -> 4 default -> R2 |
Select Answer
R4
R3
It will be locally delivered via R1's interface 4.
R2
A leased line provides a _________ service.
Select Answer
Layer 2
Layer 5
Layer 3
Layer 1
Which of the following set of commands requires a user to enter a password of "cisco" when consoling into a switch or router?
Select Answer
enable
configure terminal
line console 0
password cisco
login
enable
configure terminal
line console 0
login
password cisco
enable
configure terminal
line console 0
password cisco
enable
configure terminal
password cisco
line console 0
login
None of the answers is correct. The password command must be configured before the login command on the console line to enable password checking and avoid the message "% Login disabled on line 0, until 'password' is set".
The CLI does this, when you enter Ctrl-P?
Select Answer
It recalls the previous command from the command history buffer, allowing you to cycle backward through past commands.
It moves forward through the command history buffer, recalling more recent commands after using Ctrl-P.
It deletes the character to the left of the cursor, similar to a backspace function.
It moves the cursor one character to the left without deleting any characters.
Which command sets and automatically encrypts the privileged enable mode password?
Select Answer
enable password [password].
enable secret [password].
password enable [password].
secret enable [password].
All of the following commands will erase the contents of NVRAM, except?
Select Answer
write erase
erase startup-config
erase nvram
erase flash
Which command is used to access context sensitive help in a Cisco switch or router?
Select Answer
help
/help
?
/?
A network engineer is analyzing traffic patterns on a Cisco Catalyst 2960-X switch that has been operating normally for several weeks.
A workstation with MAC address 00:11:22:33:44:55 connected to Fa0/5 in VLAN 20 sends a frame to destination MAC address AA:BB:CC:DD:EE:FF.
The switch’s MAC address table contains 247 entries, but AA:BB:CC:DD:EE:FF is not present. As a result, the frame is flooded to all ports in VLAN 20 except Fa0/5.
Five minutes later, the workstation sends another frame to the same destination MAC address, and the switch again floods the frame.
Assuming the switch is operating with default settings, which scenario BEST explains why the destination MAC address was not learned after the first frame was flooded?
Select Answer
The MAC address aging timer expired between the two frames, removing the entry before the second frame arrived.
The destination device did not transmit any frames during the five-minute interval, so the switch had no opportunity to learn its MAC address.
The destination MAC address is reserved for Layer 2 control protocols and cannot be learned.
Port security with sticky MAC address learning is enabled on the destination port, preventing dynamic MAC learning.
You are given the following output:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following is true about this interface output?
Select Answer
The duplex was definitely configured with the duplex full interface subcommand.
speed 100 interface subcommand was definitely used.
Full duplex was automatically set from factory.
duplex full subcommand may have been used.
Which of the following is NOT a purpose of the Media Access Control Address (MAC) in the Ethernet protocol?
Select Answer
To uniquely identify devices at Layer 2
To allow communication between different devices on the same network
To provide frames source and destination address in a LAN
Allow communication with devices on a different network

Currently, besides the ports assigned to VLAN 2 and VLAN 3, the rest of the switch is in its default configuration. What would be the result of assigning ports Fa0/13 through Fa0/24 on this switch to a new VLAN 4?
Select Answer
12 new broadcast domains
1 new broadcast domain
12 new collision domains
1 new collision domain
Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface?
| Switch# show interfaces status Port Name Status Vlan Duplex Speed Type Gi0/1 notconnect 1 auto auto 10/100/1000BaseTX Gi0/2 connect 1 a-half a-100 10/100/1000BaseTX Gi0/3 notconnect 1 auto auto 10/100/1000BaseTX Gi0/4 connect 1 half 100 10/100/1000BaseTX Gi0/5 notconnect 1 auto auto 10/100/1000BaseTX Gi0/6 connect 1 a-full 1000 10/100/1000BaseTX |
Select Answer
The interface speed has been autonegotiated.
The duplex full command has been configured.
The speed 100 command has been configured.
The interface duplex has been autonegotiated.
Consider the following output from a Cisco Catalyst switch:
Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3
Which of the following answers are true about this switch?
Select Answer
The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB.
The switch has learned three MAC addresses since the switch powered on.
The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch
02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
The password required to log into user mode through a Telnet connection is called what?
Select Answer
admin password.
enable password.
remote password.
vty password
None of the above.
When configuring SSH for the first time on a switch, which of the following commands will need to run before the "crypto key generate RSA" command will work?
Select Answer
"ip ssh version {version}"
"ip domain-name {name}"
"the command is missing the key size parameter (crypto key generate rsa 512)"
"banner"
Which command would you type to view the last 10 commands you entered in the console?
Select Answer
display history
show commands
call commands
show history
What password does the router use for privileged mode when both enable password blue and enable secret red are configured?
Select Answer
None; the service password-encryption command needs to be issued
The password red
The password blue
The password configured last
The password configured first
Which answers encrypt the password that will be required of a user after they type the enable EXEC command?
Select Answer
enable password-value
enable password password-value
enable secret password-value
password password-value
Which answer is true about the term "line status"?
Select Answer
It is a layer 1 status.
It is a layer 2 status.
Line status is always down if the protocol status is down.
Line status deals with data link layer problems.
Consider the network of an enterprise department is down after renovation. After a quick show interfaces command on one of the switches, you evaluated the protocol status is down due to the line status being down. Upon further inspection of the physical network Tech A and Tech B come up with the following diagnoses:
Tech A says that the cause could be that the switch is connected to the core router with a straight-through cable.
Tech B says that the core routers power switch is in the off state.
Who is correct?
Select Answer
Tech A only.
Tech B only.
Both Tech A and Tech B.
Neither Tech A or Tech B.
Which of the following is a result of using VLAN trunking?
Select Answer
VLAN Tagging
Additional Ethernet frame headings
Allows Multi-Switch VLANs
All of the above.
None of the above.
Which of the following commands will enable a disabled VLAN?
Select Answer
enable vlan <number>
no shutdown vlan <number>
vlan enable <number>
None of the above.
What command will list both access and trunk ports in a VLAN?
Select Answer
show vlan brief, show vlan num
show vlan id num
show access and trunk num
There is no command that lets you see trunk ports and acces in the VLAN
Which of the following is true about VLANs?
Select Answer
All switches must come from the same manufacturer for VLANs to work properly.
The default VLAN is 0.
VLAN trunking must be enabled to send information about multiple VLANs over a single link.
VLANs break up collision domains by default.
Cisco switches do not have a default VLAN unless configured first.
Refer to the exhibit. The device that is located off SW1's G0/1 interface is complaining that it is unable to send any traffic. Which command would be used to fix this problem?
|
SW1#show vlan brief SW1# |
Select Answer
SW1(config-vlan)#no shutdown
SW1(config-if)#no shutdown
SW1(config)#vlan 400 enable
SW1(config)#vlan 400 status enable

Refer to the diagram; what is the name of the feature that can be implemented on the Layer 2 switches shown that would allow communications from the devices in VLAN 10 to VLAN 20?
Select Answer
The VLAN tagging feature
None, because a Layer 3 device is required
The VLAN trunking feature
The 802.1Q protocol
QUESTION 1 of 50
Introduction to TCP/IP Networking
Which layer of the OSI model deals with the logical addressing of a packet?
Select Answer
Network Layer (Layer 3), which handles logical addressing such as IP addresses and routing decisions.
Data Link Layer (Layer 2), which handles physical addressing such as MAC addresses and frame forwarding within a LAN.
Transport Layer (Layer 4), which manages end-to-end communication and segmentation but does not handle addressing.
Physical Layer (Layer 1), which deals with the transmission of raw bits over physical media and does not involve addressing.
In the TCP/IP networking model, which layer is responsible for providing error recovery services?
Select Answer
Application Layer
Transport Layer (provides error recovery for TCP but not UDP)
Data Link Layer
Network Layer
What protocols get used in layers five through seven of the OSI model?
Select Answer
SNMP, VoIP, SMTP, POP3
HDLC, IEEE 802.3
TCP, UDP
IP
A and D only.
The TCP/IP model's "Segment" falls under what OSI layer?
Select Answer
L5PDU (Data)
L3PDU (Packet)
L4PDU (Segment) - The transport layer encapsulates data into segments, which are then passed to the network layer for packet encapsulation.
Fragmentation occurs at Layer 3, not Layer 4.
This OSI layer utilizes the Telnet and VoIP protocols and deals with how to start, control, and end conversations.
Select Answer
Transport Layer.
Application Layer.
Session Layer.
Data Link Layer.
None of the above.
Which of the following OSI layers typically does not need to add an encapsulation header?
Select Answer
Application
Transport
Network
DataLink
Which of the following protocols is not considered a protocol at the application layer?
Select Answer
HTTP
SMTP
Telnet
UDP
Which OSI layer defines the standards for cabling and connectors?
Select Answer
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5, 6, or 7
SNMP, resides on what layer of the most current TCP/IP model?
Select Answer
The Data Link Layer
The Internet/Network Layer
The Transport Layer
The Application Layer
DHCP, resides on what layer of the most current TCP/IP model?
Select Answer
Layer 3
Layer 2
Layer 4
Layer 5
This output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line listing details about the fields inside the respective header. You will need to remember some parts of the various headers, and compare those concepts to this output, to answer this question.
Based on the packet capture shown, which of the following is true?

Select Answer
Line A is used for logical addressing, routing, and path determination.
Line B is related to formatting data into frames appropriate for transmission onto some physical medium.
Line C information is used to route packets through the internetwork.
Line C corresponds to the Transport layer of the TCP/IP model.
Line D is used for connection establishment and termination, flow control, and segmentation of large data blocks into smaller parts for transmission.
A _________ address is an address a single host listens to on a network.
Select Answer
Broadcast
Multicast
Unicast
Anycast
What answer best describes Twisted Pair?
Select Answer
Higher twisting rates reduce crosstalk and EMI, improving signal integrity in noisy environments.
Improper termination of twisted pair cables can increase susceptibility to EMI and cause intermittent connectivity.
Twisting the wire pairs together helps cancel out most of the EMI by balancing the electromagnetic fields and supporting differential signaling.
Using untwisted cables in high EMI environments can lead to increased crosstalk and degraded signal quality.
Which statement correctly describes 10BASE-T and 100BASE-TX Ethernet pin assignments?
Select Answer
PC NICs transmit on pins 3 and 6; switches transmit on pins 1 and 2.
PC NICs transmit on pins 1 and 2; switches transmit on pins 3 and 6.
Devices always use the same pairs for transmit and receive, so a crossover cable is never required.
Auto-MDIX forces all devices to use pins 1 and 2 for both transmit and receive.
10BASE-T and 100BASE-TX use all four pairs for simultaneous transmit and receive.
A commonly used header format for an Ethernet Frame consists of
Select Answer
Preamble, Start Frame Delimiter, Source MAC Address, Destination MAC Address, Type, Data and Pad, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Length/Type, Data, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Type, Data and Pad, Frame Check Sequence
Start Frame Delimiter, Preamble, Destination MAC Address, Source MAC Address, Type, Data, Frame Check Sequence
Preamble, Start Frame Delimiter, Destination MAC Address, Source MAC Address, Data, Frame Check Sequence
In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN?
Select Answer
Only the devices that use cables are using Ethernet.
Only the devices that use wireless are using Ethernet.
Both the devices using cables and those using wireless are using Ethernet.
None of the devices are using Ethernet.
What type of switch memory is used to store the configuration used by the switch when it is up and working?
Select Answer
RAM
ROM
Flash
NVRAM
Bubble
What type of cable is needed when connecting a Switch to a PC NIC?
Select Answer
a straight-through cable
a crossover cable
a UTP cable
a fiber cable
How many bytes are in the SFD field of an Ethernet frame?
Select Answer
7
1
6
2
How many bytes are in the FCS field of an Ethernet frame?
Select Answer
7
4
6
2
The following table represents an Ethernet frame. The numbers in the table represent bytes. What is the name of the field denoted with an asterisk?
|
7 |
1 |
* 6 |
6 |
2 |
Data |
4 |
Select Answer
SFD
Destination
Source
Type
Why would a computer need to request information from a DNS server?
Select Answer
The client attempts to contact the primary DNS server first; if it does not respond, it queries the secondary DNS server to resolve the domain name.
Recursive queries require the DNS server to fully resolve the domain name, while iterative queries return the best answer the server has, possibly referring the client to another DNS server.
The client needs to convert a domain name to an IP address by querying DNS servers, which may involve recursive or iterative queries and use cached information to improve resolution speed.
DNS does not convert IP addresses to names for client connections; that function is performed by reverse DNS lookups, which are separate from standard forward resolution.
Which of the following is NOT a goal of a routing protocol?
Select Answer
Dynamically learn network routes and populate the routing table with the best routes based on administrative distance and metrics.
Implement loop-prevention techniques such as split horizon, route poisoning, and hold-down timers.
Prefer the most recently learned route to a destination regardless of its metric or administrative distance.
Detect route failures and converge by recalculating or installing alternate routes according to the protocol’s convergence process.
How does the receiver of an HDLC frame know what has been encapsulated within that frame?
Select Answer
HDLC only encapsulates IPv4
Based on the FCS field
From the IP address (IPv4, IPv6, and so on)
The Type field in the header
Based on the Flag field

Refer to the diagram and exhibit. Where will traffic destined for the 5.0.0.0 network be sent by R1?
| R1's Routing Table: 2.0.0.0 -> R3 3.0.0.0 -> R4 4.0.0.0 -> 4 5.0.0.0 -> 4 default -> R2 |
Select Answer
R4
R3
It will be locally delivered via R1's interface 4.
R2
A leased line provides a _________ service.
Select Answer
Layer 2
Layer 5
Layer 3
Layer 1
Which of the following set of commands requires a user to enter a password of "cisco" when consoling into a switch or router?
Select Answer
enable
configure terminal
line console 0
password cisco
login
enable
configure terminal
line console 0
login
password cisco
enable
configure terminal
line console 0
password cisco
enable
configure terminal
password cisco
line console 0
login
None of the answers is correct. The password command must be configured before the login command on the console line to enable password checking and avoid the message "% Login disabled on line 0, until 'password' is set".
The CLI does this, when you enter Ctrl-P?
Select Answer
It recalls the previous command from the command history buffer, allowing you to cycle backward through past commands.
It moves forward through the command history buffer, recalling more recent commands after using Ctrl-P.
It deletes the character to the left of the cursor, similar to a backspace function.
It moves the cursor one character to the left without deleting any characters.
Which command sets and automatically encrypts the privileged enable mode password?
Select Answer
enable password [password].
enable secret [password].
password enable [password].
secret enable [password].
All of the following commands will erase the contents of NVRAM, except?
Select Answer
write erase
erase startup-config
erase nvram
erase flash
Which command is used to access context sensitive help in a Cisco switch or router?
Select Answer
help
/help
?
/?
A network engineer is analyzing traffic patterns on a Cisco Catalyst 2960-X switch that has been operating normally for several weeks.
A workstation with MAC address 00:11:22:33:44:55 connected to Fa0/5 in VLAN 20 sends a frame to destination MAC address AA:BB:CC:DD:EE:FF.
The switch’s MAC address table contains 247 entries, but AA:BB:CC:DD:EE:FF is not present. As a result, the frame is flooded to all ports in VLAN 20 except Fa0/5.
Five minutes later, the workstation sends another frame to the same destination MAC address, and the switch again floods the frame.
Assuming the switch is operating with default settings, which scenario BEST explains why the destination MAC address was not learned after the first frame was flooded?
Select Answer
The MAC address aging timer expired between the two frames, removing the entry before the second frame arrived.
The destination device did not transmit any frames during the five-minute interval, so the switch had no opportunity to learn its MAC address.
The destination MAC address is reserved for Layer 2 control protocols and cannot be learned.
Port security with sticky MAC address learning is enabled on the destination port, preventing dynamic MAC learning.
You are given the following output:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following is true about this interface output?
Select Answer
The duplex was definitely configured with the duplex full interface subcommand.
speed 100 interface subcommand was definitely used.
Full duplex was automatically set from factory.
duplex full subcommand may have been used.
Which of the following is NOT a purpose of the Media Access Control Address (MAC) in the Ethernet protocol?
Select Answer
To uniquely identify devices at Layer 2
To allow communication between different devices on the same network
To provide frames source and destination address in a LAN
Allow communication with devices on a different network

Currently, besides the ports assigned to VLAN 2 and VLAN 3, the rest of the switch is in its default configuration. What would be the result of assigning ports Fa0/13 through Fa0/24 on this switch to a new VLAN 4?
Select Answer
12 new broadcast domains
1 new broadcast domain
12 new collision domains
1 new collision domain
Refer to the exhibit. Based on the information shown in the exhibit, what can be said of the configuration of the Gi0/6 interface?
| Switch# show interfaces status Port Name Status Vlan Duplex Speed Type Gi0/1 notconnect 1 auto auto 10/100/1000BaseTX Gi0/2 connect 1 a-half a-100 10/100/1000BaseTX Gi0/3 notconnect 1 auto auto 10/100/1000BaseTX Gi0/4 connect 1 half 100 10/100/1000BaseTX Gi0/5 notconnect 1 auto auto 10/100/1000BaseTX Gi0/6 connect 1 a-full 1000 10/100/1000BaseTX |
Select Answer
The interface speed has been autonegotiated.
The duplex full command has been configured.
The speed 100 command has been configured.
The interface duplex has been autonegotiated.
Consider the following output from a Cisco Catalyst switch:
Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 02AA.AAAA.AAAA DYNAMIC Gi0/1 1 02BB.BBBB.BBBB DYNAMIC Gi0/2 1 02CC.CCCC.CCCC DYNAMIC Gi0/3 Total Mac Addresses for this criterion: 3
Which of the following answers are true about this switch?
Select Answer
The output proves that port Gi0/2 connects directly to a device that uses address 02BB.BBBB.BBBB.
The switch has learned three MAC addresses since the switch powered on.
The three listed MAC addresses were learned based on the destination MAC address of frames forwarded by the switch
02CC.CCCC.CCCC was learned from the source MAC address of a frame that entered port Gi0/3.
The password required to log into user mode through a Telnet connection is called what?
Select Answer
admin password.
enable password.
remote password.
vty password
None of the above.
When configuring SSH for the first time on a switch, which of the following commands will need to run before the "crypto key generate RSA" command will work?
Select Answer
"ip ssh version {version}"
"ip domain-name {name}"
"the command is missing the key size parameter (crypto key generate rsa 512)"
"banner"
Which command would you type to view the last 10 commands you entered in the console?
Select Answer
display history
show commands
call commands
show history
What password does the router use for privileged mode when both enable password blue and enable secret red are configured?
Select Answer
None; the service password-encryption command needs to be issued
The password red
The password blue
The password configured last
The password configured first
Which answers encrypt the password that will be required of a user after they type the enable EXEC command?
Select Answer
enable password-value
enable password password-value
enable secret password-value
password password-value
Which answer is true about the term "line status"?
Select Answer
It is a layer 1 status.
It is a layer 2 status.
Line status is always down if the protocol status is down.
Line status deals with data link layer problems.
Consider the network of an enterprise department is down after renovation. After a quick show interfaces command on one of the switches, you evaluated the protocol status is down due to the line status being down. Upon further inspection of the physical network Tech A and Tech B come up with the following diagnoses:
Tech A says that the cause could be that the switch is connected to the core router with a straight-through cable.
Tech B says that the core routers power switch is in the off state.
Who is correct?
Select Answer
Tech A only.
Tech B only.
Both Tech A and Tech B.
Neither Tech A or Tech B.
Which of the following is a result of using VLAN trunking?
Select Answer
VLAN Tagging
Additional Ethernet frame headings
Allows Multi-Switch VLANs
All of the above.
None of the above.
Which of the following commands will enable a disabled VLAN?
Select Answer
enable vlan <number>
no shutdown vlan <number>
vlan enable <number>
None of the above.
What command will list both access and trunk ports in a VLAN?
Select Answer
show vlan brief, show vlan num
show vlan id num
show access and trunk num
There is no command that lets you see trunk ports and acces in the VLAN
Which of the following is true about VLANs?
Select Answer
All switches must come from the same manufacturer for VLANs to work properly.
The default VLAN is 0.
VLAN trunking must be enabled to send information about multiple VLANs over a single link.
VLANs break up collision domains by default.
Cisco switches do not have a default VLAN unless configured first.
Refer to the exhibit. The device that is located off SW1's G0/1 interface is complaining that it is unable to send any traffic. Which command would be used to fix this problem?
|
SW1#show vlan brief SW1# |
Select Answer
SW1(config-vlan)#no shutdown
SW1(config-if)#no shutdown
SW1(config)#vlan 400 enable
SW1(config)#vlan 400 status enable

Refer to the diagram; what is the name of the feature that can be implemented on the Layer 2 switches shown that would allow communications from the devices in VLAN 10 to VLAN 20?
Select Answer
The VLAN tagging feature
None, because a Layer 3 device is required
The VLAN trunking feature
The 802.1Q protocol
1:00:00
Your Exam is paused.
Please wait...
Since this is a preview of our actual test taking interface your progress cannot not be saved.