Exam Source
Question 1: (QID=25141)
Which DHCP message is sent as a broadcast on the network?
1. DHCP Discover
2. DHCP Offer
3. DHCP Request
4. DHCP Acknowledgement
---------------------------------------------
Correct answer(s): 1
Explanation: The DHCP Discover message is sent as a broadcast on the network.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 2: (QID=2352)
Given the following IP Address 172.45.34.1/24. What is the network and host portion?
1. Network 172.45.34 Host 1
2. Network 172 Host 45.34.1
3. Network 172.45 Host 34.1
4. This is an invalid IP Address
---------------------------------------------
Correct answer(s): 1
Explanation: 172.45.34.1/24 is the same as 172.45.34.1 255.255.255.0. So we can see from the subnet mask that the first 3 octets belong to the network portion of the IP Address and the 4th octet is the host portion.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 3: (QID=25120)
You want to use RIPv2 as your routing protocol. Which commands will enable RIPv2 on your router?
A
router#configure terminal
router (config)#router rip version2
router(config-router)#network 10.0.0.0
router(config-router)#network 172.16.0.0
router(config-router)#^Z
B
router#router rip
router(config-router)#network 10.0.0.0
router(config-router)#network 172.16.0.0
router(config-router)#^Z
C
router#configure terminal
router(config)#router rip v2
router(config-router)#network 10.0.0.0
router(config-router)#network 172.16.0.0
router(config-router)#^Z
D
router#configure terminal
router(config)#router rip
router(config-router)#version 2
router(config-router)#network 10.0.0.0
router(config-router)#network 172.16.0.0
router(config-router)#^Z
1. A
2. B
3. C
4. D
---------------------------------------------
Correct answer(s): 4
Explanation: Only three steps are necessary to configure RIPv2:
Enable RIP with the command router rip.
Specify the version with the version 2 command
Specify each major network on which to run RIP with the network command.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 4: (QID=25125)
You want to implement port-security on your 2960 but you don’t know all of the MAC addresses. How can you still enable port-security and protect the currently attached devices?
1. switch(config-if)#switchport port-security mac-address sticky
2. switch(config-if)#switchport port-security mac-address enable
3. switch(config-if)#switchport port-security mac-address learn
4. switch(config-if)#switchport port-security mac-address dynamic
---------------------------------------------
Correct answer(s): 1
Explanation: When we use the switchport port-security mac-address sticky interface configuration command the switch looks at the the header of the first frame to determine the mac-address of the host that is currently connected to that port.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 5: (QID=25121)
How do you enable ppp on a serial interface?
1. router(config)#ppp enable
2. router(config-if)#encapsulation ppp
3. router(config-if)#ppp enable
4. router(config-if)#no encapsulation hdlc
---------------------------------------------
Correct answer(s): 2
Explanation: The encapsulation ppp interface configuration command enables ppp on the interface.
[Implement and verify WAN links]
--------------------------------------------------------------------------------
Question 6: (QID=2368)
What command do we use if we want to discover other Cisco devices on the network?
1. Discover neighbors
2. Show neighbors
3. CDP run
4. CDP enable
---------------------------------------------
Correct answer(s): 3
Explanation: To enable Cisco Discovery Protocol (CDP), use the cdp run global configuration command. To disable CDP, use the no form of this command.
no cdp run
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 7: (QID=1323)
Spanning Tree is used in a switched network to:
1. Create a loop-free switched network
2. Manage a switched network
3. Avoid collisions on the switched network
4. Route between VLAN’s
---------------------------------------------
Correct answer(s): 1
Explanation: Spanning Tree is a technology that allows bridges to communicate with each other to discover physical loops in the network. The protocol then specifies an algorithm that bridges use to create a loop-free logical topology.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 8: (QID=3620)
What switching method is described by the following:
"The switch receives the entire frame and calculates a CRC. This method has high latency because of this behaviour."
1. Cut-Through
2. Cisco Express Forwarding
3. Fragment-Free
4. Store-and-Forward
---------------------------------------------
Correct answer(s): 4
Explanation: The Store-and-Forward switching mode receives the entire frame before beginning the switching process. When it receives the complete frame, the switch examines it for the source and destination addresses and any errors it may contain, and then it possibly applies any special filters created by the network administrator to modify the default behaviour. If the switch observes any errors in the frame, it is discarded, preventing errored frames from consuming bandwidth on the destination segment.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 9: (QID=2365)
What command is used during an IOS upgrade to place the IOS image on the router?
1. Show version
2. Copy TFTP: Flash:
3. Copy TFTP: RAM:
4. Copy running-config startup-config
---------------------------------------------
Correct answer(s): 2
Explanation: Router Memory Commands
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 10: (QID=2380)
Which command do we use to move from interface configuration mode to global configuration mode without exiting configuration mode?
1. Disable
2. Logout
3. End
4. Exit
---------------------------------------------
Correct answer(s): 4
Explanation: Click here for more information.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 11: (QID=25131)
In 802.11b, how many non-overlapping channels are available?
1. 1
2. 3
3. 5
4. 7
5. 11
---------------------------------------------
Correct answer(s): 2
Explanation: 802.11b has 3 non-overlapping channels, channel 1, 6 and 11
[Explain and select the appropriate administrative tasks required for a WLAN]
--------------------------------------------------------------------------------
Question 12: (QID=2999)
What command do we use if we want to see the output of our debugs during our session?
1. Show debug all
2. u all
3. Terminal monitor
4. Show all debug
---------------------------------------------
Correct answer(s): 3
Explanation: The terminal monitor command in EXEC mode will display all debug outputs and system error messages for the current terminal and session.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 13: (QID=2996)
You have lost telnet access to your switch which is located on-site. When trying to access the switch via the console port we are unable to get a connection going. Our terminal emulation program settings are: 9600 baud, 8N1, no flow-control. What could be the cause of the problem?
1. We are using a cross-over cable
2. We are using a roll-over cable
3. Our terminal emulation program is not configured correctly
4. The operating system on our PC/laptop is not compatible with Cisco
---------------------------------------------
Correct answer(s): 1
Explanation: In order to use the console port on a router we need to configure our Terminal Emulation program (Hyper Terminal, TerraTerm Pro, …) with the following parameters:
Baud rate: 9600
Data bits:8
Parity: none
Stop bits: 1
Flow control: none
The cable type we use is a cross-over cable. [Implement a small switched network]
--------------------------------------------------------------------------------
Question 14: (QID=25139)
What can we use to detect an attack that has a specific packet pattern?
1. Firewall
2. IPS
3. Anti-virus
4. URL filtering
5. DMZ
---------------------------------------------
Correct answer(s): 2
Explanation: An IPS, Intrusion Prevention System or IDS, Intrusion Detection System, is used to detect/prevent attacks that have a distinctive packet pattern.
[Identify security threats to a network and describe general methods to mitigate those threats]
--------------------------------------------------------------------------------
Question 15: (QID=1324)
According to the IEEE 802.3 standard, Ethernet can run on what type of media? [Select all that apply]
1. 10BaseF
2. 100BaseTX
3. 1000BaseF
4. 10Base5
5. 10Base4
---------------------------------------------
Correct answer(s): 1 4
Explanation: 10BaseT - Ethernet over Twisted Pair Media
10BaseF - Ethernet over Fiber Media
10Base2 - Ethernet over Thin Coaxial Media
10Base5 - Ethernet over Thick Coaxial Media
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 16: (QID=25127)
Which of the following encourages the interoperability of wireless products?
1. IEEE
2. FCC
3. Wi-Fi alliance
4. ITU-R
---------------------------------------------
Correct answer(s): 3
Explanation: The Wi-Fi alliance encourages the interoperability of wireless products using their Wi-Fi certified program.
[Explain and select the appropriate administrative tasks required for a WLAN]
--------------------------------------------------------------------------------
Question 17: (QID=2383)
Which of the following describes the correct order when a router is powered on?
1. Locate the IOS image, hardware is initialized, load configuration file, decompress the IOS image
2. Load configuration file, hardware is initialized, locate the IOS image, decompress the IOS image
3. Locate the IOS image, decompress the IOS image, hardware is initialized, load configuration file
4. Hardware is initialized, locate the IOS image, decompress the IOS image, load configuration file
---------------------------------------------
Correct answer(s): 4
Explanation: The boot sequence of a Cisco router is as follows:
ROM Monitor is the first to start and together with the BOOTSTRAP the following functions are performed:
Power-on register settings are configured
NVRAM and DRAM is tested
Hardware is initialized
Software structures are initialized
ROMmon looks for the IOS image in the flash
Once the IOS image is located the router decompresses it and loads it into DRAM. The IOS itself performs the following functions:
recognition of interfaces and other hardware
setting up proper data structures
allocating buffers
loading the configuration file from NVRAM to RAM
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 18: (QID=3680)
When our information is travelling down the OSI model what name do we give it when it reaches layer 3?
1. Frames
2. Segments
3. Bits
4. Packets
5. Data
---------------------------------------------
Correct answer(s): 4
Explanation: When user data travels through the OSI layers each layer adds its own information to the data. User data is called ‘Data’ at the application, presentation and session layer, when it moves through the transport layer it is called ‘Segments’. Packets can be found at the network layer of the OSI model. At layer 2 or Datalink layer we are talking about ‘Frames’ that will be put on the wire at the physical layer in the form of ‘Bits’.
[Describe the operation of data networks]
--------------------------------------------------------------------------------
Question 19: (QID=25135)
Which of the following are parts of a socket?
1. IP address
2. Transport protocol
3. Sequence number
4. Port number
---------------------------------------------
Correct answer(s): 1 2 4
Explanation: A socket has three parts:
IP Address
Transport protocol (TCP or UDP)
Port number
[Describe the operation of data networks]
--------------------------------------------------------------------------------
Question 20: (QID=3677)
What protocol is used to resolve MAC Addresses to a known IP Address?
1. ICMP
2. RARP
3. IGMP
4. ARP
---------------------------------------------
Correct answer(s): 4
Explanation: A host that wants to communicate with another host of which the IP Address is known will send out an ARP request to discover the MAC Address.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 21: (QID=2338)
What type of connection do you recommended for the following scenario: The remote sites need fast downloads while their uploads to the head office can be slower, cost has to be taken into account.
1. ATM
2. ISDN
3. Frame-Relay
4. ADSL
---------------------------------------------
Correct answer(s): 4
Explanation: Asymmetric Digital Subscriber Line. One of four DSL technologies. ADSL is designed to deliver more bandwidth downstream (from the central office to the customer site) than upstream. Downstream rates range from 1.5 to 9 Mbps, whereas upstream bandwidth ranges from 16 to 640 kbps. ADSL transmissions work at distances up to 18,000 feet (5,488 meters) over a single copper twisted pair.
[Describe the operation of data networks]
--------------------------------------------------------------------------------
Question 22: (QID=3006)
One of the software engineers in the company wants to test a new application. When he connects the PC to a free port on the switch he does not get a link light. When he temporarily connects the PC to a different port there is a link light. What is the most likely cause of this problem?
1. The NIC in the PC is 100Mb and the switch port is configured for 10MB
2. All the switch ports are faulty
3. The application is not working properly
4. The cable is faulty
---------------------------------------------
Correct answer(s): 1
Explanation: Because there is a speed mismatch between the PC and the switch port a link will not be established.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 23: (QID=2376)
We want to configure a password in order to secure the Privileged EXEC mode? Which of the following are commands we can use?
1. Password enable password
2. Enable password password
3. Secret Password password
4. Enable Secret password
---------------------------------------------
Correct answer(s): 2 4
Explanation: To set a local password to control access to various privilege levels, use the enable password command in global configuration mode. To specify an additional layer of security over the enable password command, use the enable secret command in global configuration mode.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 24: (QID=2373)
We want to know which routing protocols are active on the router. Which command do we use?
1. Show IP Protocols
2. Show IP Routing Protocols
3. Show Active Protocols
4. Show IP Active Protocols
---------------------------------------------
Correct answer(s): 1
Explanation: To display the parameters and current state of the active routing protocol process, use the show ip protocols command in privileged EXEC mode.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 25: (QID=3611)
Users complain that they are not able access resources at the head office. You ping a few hosts on the head office LAN and the responses are all unsuccessful. What would be the next step you do to locate the problem?
1. Use the trace route utility
2. Reboot the router
3. Clear the routing table
4. Replace the faulty router
---------------------------------------------
Correct answer(s): 1
Explanation: When we use the trace route utility to one of the IP Addresses we pinged we will find out at which hop the problem lies. We then can continue our troubleshooting from that point.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 26: (QID=2988)
Which of the following commands would you use to troubleshoot a routing problem?
1. Show version
2. Show IP route
3. Show IP interface brief
4. Ping
5. Show users
6. Traceroute
7. Show hosts
8. Show history
---------------------------------------------
Correct answer(s): 2 4 6
Explanation: When troubleshooting a routing issue we usually start by ‘pinging’ a host on the remote network we try to reach. If we don’t get a response back we check the routing table to see if we have a route to the remote network. If there is a route we do a ‘traceroute’ to the remote network to find out at which hop the possible cause of the problem might lie.
Understanding the Ping and Traceroute Commands Troubleshooting Tools
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 27: (QID=2989)
What command do we use to show us all the RIP entries in the routing table but no other routes?
1. Show ip route
2. Show ip rip route
3. Show rip route
4. Show ip route rip
---------------------------------------------
Correct answer(s): 4
Explanation: The show ip route command can be ‘extended’ with the name of the routing protocol running on the router. Adding the name of the routing protocol displays only entries of that protocol in the routing table.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 28: (QID=25132)
Which of the following wireless parameters has to be the same on both the client and AP?
1. SSID
2. ESS
3. radio power setting
4. BSS
---------------------------------------------
Correct answer(s): 1
Explanation: In order to get an association with the AP the SSID, Service Set Identifier, has to be same on the AP and wireless client.
[Explain and select the appropriate administrative tasks required for a WLAN]
--------------------------------------------------------------------------------
Question 29: (QID=3683)
Look at the network topology in the exhibit. How many collision domains are there?
1. 1
2. 2
3. 3
4. 4
5. 5
6. 6
---------------------------------------------
Correct answer(s): 5
Explanation: A Collision Domain is defined as all of the Ethernet segments between a pair of bridges or other layer 2 devices.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 30: (QID=2367)
After making configuration changes, you want to save them. What command do you use? [Select best answer]
1. Save config
2. write memory
3. Copy startup-config running-config
4. Copy running-config startup-config
---------------------------------------------
Correct answer(s): 4
Explanation: Copy running-config startup-config will save your changes to NVRAM. Although write memory will do the same thing it is better to use the copy command.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 31: (QID=1295)
RIP Version 2 uses which multicast address to update its routing tables.
1. 224.0.0.10
2. 224.0.0.5
3. 224.0.0.1
4. 224.0.0.9
---------------------------------------------
Correct answer(s): 4
Explanation: More information about RIP version 2 can be found at RIP Version 2 RFC 2453. The other multicast addresses are used by different routing protocols (EIGRP, OSPF).
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 32: (QID=25146)
Which proprietary Cisco field is added to the HDLC standard frame?
1. Type
2. Flag
3. Destination
4. Control
---------------------------------------------
Correct answer(s): 1
Explanation: Cisco added a type field to the HDLC standard frame to make it Cisco proprietary.
[Implement and verify WAN links]
--------------------------------------------------------------------------------
Question 33: (QID=2377)
What command do we use to show us a summary of the all the interfaces on a router?
1. Show IP interface brief
2. Show interfaces all
3. Show IP interface detail
4. Show interfaces brief
---------------------------------------------
Correct answer(s): 1
Explanation: The show ip interface brief command will give you all the interfaces of the router and their status, IP Address, etc… This command can be useful troubleshooting tool if you quickly want to view the interface details.
click here for sample output of this command.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 34: (QID=3623)
Which switching method will store the first 64 bytes of the packet?
1. Store-and-Forward
2. Cut-Through
3. Cisco Express Forwarding
4. Fragment-Free
---------------------------------------------
Correct answer(s): 4
Explanation: A less common method is fragment-free. It works like cut-through but stores the first 64 bytes of the packet before sending it on. The reason for this is that most errors and all collisions occur during the initial 64 bytes of a packet.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 35: (QID=2358)
When implementing a switched network we have to make sure that the following is running?
1. VTP Pruning
2. IGMP
3. A routing protocol
4. Spanning Tree
---------------------------------------------
Correct answer(s): 4
Explanation: Spanning tree will provide a loop free switched environment.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 36: (QID=3624)
Which port does TFTP use?
1. 53
2. 21
3. 69
4. 20
---------------------------------------------
Correct answer(s): 3
Explanation: TFPT uses port 69. Well-known Port Numbers
[Describe the operation of data networks]
--------------------------------------------------------------------------------
Question 37: (QID=1285)
What is the administrative distance of the following Static Route:
IP Route 192.168.3.0 255.255.255.0 Serial0/1
1. 1
2. 110
3. 0
4. 255
5. 170
---------------------------------------------
Correct answer(s): 3
Explanation: Static routes using an exit interface have an administrative distance of 0. Administrative Distance.
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 38: (QID=25129)
Which two modes exist in a wireless network?
1. Ad-hoc mode
2. Peer-to-peer mode
3. Shared mode
4. Infrastructure mode
---------------------------------------------
Correct answer(s): 1 4
Explanation: Wireless networks operate either in Ad-Hoc mode or Infrastructure mode.
[Explain and select the appropriate administrative tasks required for a WLAN]
--------------------------------------------------------------------------------
Question 39: (QID=3631)
In which of the following configurations would you use a crossover cable?
1. Host to switch
2. Switch to router
3. Host to router
4. Hub to Switch
5. Hosts to hub
---------------------------------------------
Correct answer(s): 3 4
Explanation: Crossover cables can be used in the following situations:
to connect 2 hosts together
to connect 2 switches or hubs
to connect a router to a host
Modern switches come with MDIX ports but the speed and duplex setting must remain on auto.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 40: (QID=3694)
We need a minimum of 2500 hosts on each of the subnets. Our network address is 10.0.0.0/8. What is the subnet mask?
1. 255.255.224.0
2. 255.255.248.0
3. 255.255.240.0
4. 255.255.192.0
---------------------------------------------
Correct answer(s): 3
Explanation: To provide 2500 hosts on each subnet we need 12 bits available for host addressing.
Following the rules: 2^12 – 2 = 4096 – 2 = 4094 possible hosts on each subnet. Now we have 12 bits available for the subnet mask or in binary 1111 1111.1111 1111.1111 0000. The first 8 bits are from the default subnet mask of the network, convert the previous into decimal and it gives us 255.255.240.0 or /20.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 41: (QID=2974)
We want to see a summary of the VLANs configured on our Catalyst 2960 switch. What command do we use?
1. Show vlan
2. Show vlan summary
3. Show vlan detail
4. Show vlan brief
---------------------------------------------
Correct answer(s): 4
Explanation: The show vlan brief command displays one line for each of the VLANs configured on the switch. The line contains the VLAN name, status and port membership.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 42: (QID=3695)
Given the following network 172.16.1.0/26. How many hosts do we have available on each of the subnets?
1. 62
2. 4096
3. 64
4. 128
---------------------------------------------
Correct answer(s): 1
Explanation: /26 or 255.255.255.192 leaves us 6 bits for possible hosts on each subnet. Following the rule for hosts 2^n -2 = available hosts, 2^6 – 2 = 64 – 2 = 62 hosts. The -2 is to deduct the network address and the broadcast address of the subnet.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 43: (QID=1481)
We need 30 hosts on each of the subnets we create from the following network 192.168.3.0/24. What is the correct subnet mask?
1. 255.255.0.0
2. 255.255.255.0
3. 255.255.252.0
4. 255.255.255.224
---------------------------------------------
Correct answer(s): 4
Explanation: We need 30 hosts on each subnet and in order to accommodate those we need 5 bits of the last octet to be allocated to hosts 2^5 -2 = 30. This leaves us 3 bits for the available subnets 2^3 = 8 subnets. In binary that becomes 111, first 3 bits for the subnet or 224 and the remaining 5 positions for the hosts on each subnet.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 44: (QID=1281)
RFC1918 specifies the allocation of IP Addresses for Private Internetworks. What are they?
1. 10.0.0.0 - 10.255.255.255
2. 192.168.0.0 - 192.168.255.255
3. 172.16.0.0 - 172.32.0.0
4. 172.16.0.0 – 172.31.255.255
5. 192.169.0.0 - 192.169.255.255
---------------------------------------------
Correct answer(s): 1 2 4
Explanation: 10.0.0.0, 172.16.0.0 – 172.31.255.255 and 192.168.0.0 are the IP Address ranges that must be used in private internetworks. These address ranges are not routed on the internet. To find out more about this: RFC1918.
[Implement an IP addressing scheme and IP services to meet network requirements for a small branch office]
--------------------------------------------------------------------------------
Question 45: (QID=25130)
When we have more than one AP in our infrastructure mode it is called?
1. BSS
2. ESS
3. CSS
4. EBSS
---------------------------------------------
Correct answer(s): 2
Explanation: A extended service set or ESS is created when we use more than one AP with overlap in infrastructure mode.
[Explain and select the appropriate administrative tasks required for a WLAN]
--------------------------------------------------------------------------------
Question 46: (QID=3614)
We notice a huge number of FCS errors on one of the switch ports that is running in full-duplex mode. What could be the cause of this?
1. Faulty switch port
2. Faulty cable
3. It is normal to have FCS errors in full-duplex mode
4. The switch is running out of memory
5. Software/hardware issues with the NIC
---------------------------------------------
Correct answer(s): 1 2 5
Explanation: In full-duplex mode the collision counter is not active. If the FCS, CRC errors increment then the most likely cause is a duplex mismatch. Other causes can be a faulty cable, a faulty switch port or hardware/software issues with the NIC.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 47: (QID=2970)
We have acquired a new Catalyst 3550 switch with Enhanced IOS image. What command allows us to remotely manage that switch using Cisco’s defaults?
A) Switch(config)#interface vlan1
Switch(config-if)#ip address 10.1.1.5 255.255.255.0
B) Switch(config)#interface fastethernet0/1
Switch(config-if)#ip address 10.1.1.5 255.255.255.0
C) Switch(config)#interface vlan1
Switch(config-vlan)#ip address 10.1.1.5 255.255.255.0
D) Switch(config)#interface ip 10.1.1.5 255.255.255.0
1. A
2. B
3. C
4. D
---------------------------------------------
Correct answer(s): 1
Explanation: We assign an ip address to the default management VLAN 1 using interface configuration mode. By default the management VLAN is 1 but it can be any VLAN between 1 to 1001.
[Implement a small switched network]
--------------------------------------------------------------------------------
Question 48: (QID=2369)
We want to try a new IOS release but we don’t have enough space on our Flash memory to hold both IOS’s. What needs to be done to use the new image?
1. Add the following line to the configuration: no boot system flash [filename]
2. Add the following line to the configuration: boot system tftp [filename] [ip address]
3. Add the following line to the configuration: no boot system rom
4. This can not be done; we need to upgrade the IOS
---------------------------------------------
Correct answer(s): 2
Explanation: To specify the system image that the router loads at startup, use one of the following boot system global configuration commands. To remove the startup system image specification, use the no form of the command.
boot system file-url
no boot system file-url
boot system flash [flash-fs:][partition-number:][filename]
no boot system flash [flash-fs:][partition-number:][filename]
boot system mop filename [mac-address] [interface]
no boot system mop filename [mac-address] [interface]
boot system rom
no boot system rom
boot system {rcp | tftp | ftp} filename [ip-address]
no boot system {rcp | tftp | ftp} filename [ip-address]
no boot system
[Implement a small routed network]
--------------------------------------------------------------------------------
Question 49: (QID=1478)
What is the maximum cable length for UTP cable?
1. 185m
2. 2000m
3. 100m
4. 500m
---------------------------------------------
Correct answer(s): 3
Explanation: 10 BaseT & 100 BaseT 100m
10 Base2 185m
10 Base5 500m
10 BaseFL 2000m
[Describe the operation of data networks]
--------------------------------------------------------------------------------
Question 50: (QID=25147)
Which ppp protocol is used to test the data link connection?
1. UDP
2. Q.931
3. NCP
4. LCP
---------------------------------------------
Correct answer(s): 4
Explanation: LCP or Link Control Protocol is used in the PPP protocol suite to test the data link connection.
[Implement and verify WAN links]
No comments:
Post a Comment