Which command displays IPX routing update packets recieve or transmitted betwen a router?SHOW IPX ROUTINGDEBUG IPX ROUTING ACTIVITYSHOW IPX ROUTING ACTIVITYDEBUG IPX INTERFACE ACTIVITYThe DEBUG IPX ROUTING ACTIVITY command displays messages relating to IPX routing activity.Which commands will display the IPX address on Interface Ethernet 0?SH INT E0SH IPX INT E0SHOW INTERFACE ETHERNET 0SHOW IPX INTERFACE ETHERNET 0SH IPX INT BRIEFThe SHOW IPX INTERFACE ETHERNET 0 command will show the interface's IPX address. This command can also be abbreviated to SH IPX INT E0.Which three statements are true regarding frame-relay configuration?IEFT encapsulation must be configured unless the connecting routers are both CiscoThe default LMI type is CISCOThere are three encapsulation types and three LMI typesThe default encapsulation is IETFIn release 11.3 LMI type is autosensedThere are two encpsulations types (Cisco and IETF). The default is Cisco. There are three LMI types (Cisco, Ansi, and Q933A). The default is Cisco. If you are connecting to a non-Cisco device across frame-relay you should use the IETF encapsulation. Beginning with 11.2 IOS LMI, type can be autosensed.Which two of the following are Session Layer standards?ASCII & EDBICNFS & SQLPICT & JPGRPC & NETBIOSMIDI & MPEGNFS, SQL, RPC, and NETBIOS are all examples of Sessesion Layer protocols.Which three functions are characteristic of the Data Link LLC layer?Provides logical addressProvides hardware addressCapable of flow control and sequencingEnables media independence for upper layersProvides SAPs that the MAC sub-layer usesThe Data Link LLC layer enables media independence for upper layers, uses DSAP and SSAP addresses, and is capable of flow control and sequencing.Which is true regarding the Presentation Layer?Segments and reassembles dataProvides error detection, correction, and flow controlDetermines the best way to move data from one place to anotherProvides data transfer, control, and management between cooperating application processesProvides a common representation of application information between two cooperating operating systems.The Presentation Layer is reponsible for providing data to the Application Layer in a common format.Which two are functions of the Data Link MAC Layer?Provides SAPs for highter level protocolsAllows multiple devices to uniquely identify one another on the physical mediumProvides flow controlManages protocol access to the physical network mediumThe MAC layer provides unique hadrware address for each device and manages access to the physical network layer.Which command will show whether an access-list is applied to an interface?SHOW IP ACCESS LISTSSHOW IP ACCESS-LISTSSHOW ACCESS LISTSSHOW IP INTERFACESHOW INTERFACEThe SHOW ACCESS-LISTS and SHOW IP ACCESS-LISTS commands show the access list but do not show which interface the list is applied to. SHOW IP INTERFACE will show if an access-list has been applied to an interface.Can this be reworded to "whether an access-list is applied..."? This wording sounds as if a new command is available when you apply an access list.Which layer of the OSI model is resposible for determining the proper path to take to get to the destination?Data Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerThe job of sending packets from the source network to the destination network is the Network layer's primary function.Which are characteristics of Store and Forward switching?Reads the entire frame and checks CRC before forwardingForwards the packet as soon as the packet header is receivedLatency is increases as packet size increasesLatency remanes constat regardless of packet sizeStore and foward switching reads the entire packet and checks the CRC before forwarding the packet. Therefore, as the packet size increses, latency will also increase.What key sequence will bring you back to the beginning of the command-line?Ctrl ACtrl BCtrl PCtrl NCtrl ZEntering the Control A key sequence will bring you to the beginning of the command-line.What does the IPX MAXIMUM-PATHS command do?Sets the maxiumum metric that can appear in the route tableAllows you to override the TTL on an IPX packetConfigures round-robin load sharing over multiple equal cost pathsDefines the maximum number of hops that a packet can transverse before being droppedThe IPX MAXIMUM-PATHS command configures the number of equal costs paths that can be used for round-robin load sharing.What is the syntax to specify second sub-interface on the first serial port?int s0.2int s0.1int s0.0int s1.1int s1-0The first serial port is s0 and the second sub-interface is 2 so the answer is int s0.2What command sets up a secondary IP address of 192.16.1.2 with a Class C mask?secondary ip address 192.16.1.2 255.255.0.0ip address 192.16.1.2 255.255.255.0ip address 192.16.1.2 255.255.0.0 secondaryip address 192.16.1.2 255.255.255.0 secondarysecondary ip address 192.16.1.2 255.255.255.0The command "ip address 192.16.1.2 255.255.255.0 secondary" will configure a seconday address with a 24-bit, or Class C, mask.If you received the following output after issuing the "CL" command, what would be the next command you should type? ROUTER#CL % Ambigous command: "CL"CL?HELP CLCL ?? CLSHOW CLTyping CL? would provide a list of all commands which start with "CL"A bridge works at what layer of the OSI reference model?PhysicalData LinkNetworkTransportSessesionA bridge works at the Data Link layer of the OSI reference layer.A router works at what layer of the OSI reference model?PhysicalData LinkNetworkTransportSessionA router works at the Network layer of the OSI reference model.Which three of the following are true statements regarding connection-oriented sessions?A manageable data flow is maintained in order to avoid congestion and overloadingAny segments not acknowledge are droppedThe segments delivered are acknowledge back to the senderUpon arrival at their destination, packets are reassembled into the orriginal order they were transmitted inConnection-oriented sessions provide end-to-end flow control, reassembly of packet order, and acknowledgemet of reception.What does CPE stand for?Central Processing EquipmentCustomer Processing EquipmentCustom Processing EquipmentCustomer Provided EquipmentCustomer Premise EquipmentCPE is an acronym that stands for Customer Premise Eqiupment. When describing a WAN connection, the equipment owned and operated by the end-user is referred to as CPE. It is also possible the CPE might belong to the provider and be leased to the customer.Choose three reason why the networking industry uses a layered model?It facilitates systematic troubleshootingIt requires changes to occur in all layers when changing one protocolIt clarifies what general function is to be done rather than how to do itIt clarifes how to do it rather than what general functions should be doneIt allows changes in one layer to occur without affecting other layersThe OSI model shows generalizations rather than specifics. It also facilitates systematic troubleshooing and allows changes to be made within one layer without affecting other layers.Which layer of the OSI reference model is resposible for bit synhronization?SessionData LinkPhysicalNetworkApplicationThe Pysical layer is responsible for the synchronized transmission and receptions of 0's and 1's (bits).Which OSI reference layer is responsible for placing 1s and 0s into a logical grouping order?PhysicalData LInkApplicationNetworkSessionThe Data Link layer organizes the data into specific bit patterns before the physical layer transmits the data.What are the two sub-layers of the Data Link layer?Layered Link Control and MACLogical Link Control and Media Access ControlData Link and MACLLC and Media Access CenterData Link and LLCThe Data Link layer consists of the Media Access Contol (MAC) and the Logical Linnk Control (LLC) sub-layers.What command can be used to create a backup of the IOS software?copy flash tftpcopy tftp flashcopy running-config tftpcopy startup-config tftpcopy running-config startup-configThe command "copy flash tftp" can be used to copy a file from flash to a TFTP server.What is the command that will put you in privileged exec mode?privuserloginenableexecThe enable command is used to place the user in privileged exec mode.What commands can be used to view the configuration that is currently running on the router?Chapter 2, Internetworking Operating Systemsshow startup-configwriteshow running-configshow configwrite terminalThe commands "show running-config" and "write terminal" will both show the configuration that is currently running. The commands "show config" and "show startup-config" will show the configuration that is stored in NVRAM.What commands can be used to configure the router from a configuration file stored on a TFTP server?configcopy tftp flashcopy tftp running-configcopy tftp startup-configconfig networkThe commands "copy tftp running-config", "coppy tftp startup-config", and "config network" can all be used to copy a configuration file to the router from a TFTP server.What command will configure the router to boot the IOS image from flash?copy flash running-configboot sytem memboot system flashboot systemcopy running-config flashThe command "boot system flash' is used to boot the router from the IOS imaged stored in flash.What command is used to boot a router using an IOS image that resides on the network?boot system network FILENAME HOSTNAMEboot sytem tftp FILENAME HOSTNAMEboot system tftp HOSTNAME FILENAMEboot system network HOSTNAME FILENAMEboot system networkThe command "boot system tftp FILENAME HOSTNAME" is used to boot the IOS image from a TFTP server on the network.What command is used to boot the router from the IOS image that is stored in ROM?boot system ios romboot systemboot system romboot romboot rom systemThe command "boot system rom" will configure the router to boot using the IOS image stored in ROM.What is the command used to enter the System Configuration Dialog?setupconfigureconfig tinstallconfig systemThe "setup" command is used to enter the System Configuration Dialog.What commands can be used to save the current configuration to NVRAM?save configwrite memwritewrite terminalcopy running-config startup-cofigThe commands "write mem", "write", and "copy running-config startup-config" can all be used to save the current configuration to NVRAM.What command is used to configure an encrypted enable password?enable password PASSWORDenable PASSWORDenable secret PASSWORDenable password encryptedenable password encrypted PASSWORDThe command "enable secret PASSWORD" is used to configure an encrypted enable password.What command would you type in order to see what options are available for the "show" command?help ?help showshow?show ?The command "show ?" will show all of the options available for the show command.What command would you type to see a list of available commands?helpshow commands?help commandsThe command "?" will show a list of all avaiable commands.What command would you type to see a list of all commands that start with the letters TE?te ?help tete?show te? teTyping "te?" will display a list of all command that start with "te".Which of the following commands will show how much flash memory is installed?show versionshow memshow mem flashmemdisplay flashThe "show version" command will display how much flash memory is installed in the router.Which command will show a neighboring Cisco router's IP address?show router neighborsshow neighborsshow cdp neighbor detailshow cdp neighborshow neighbors detailThe command "show cdp neighbor detail" will show the ip address of neighboring routers.Which command will show the current value of the configuration register?show config-registershow versionshow registershow regThe value of the configuration register can be shown using the "show version" command.What command will display the contents of the flash?show nvramshow memshow ramshow flashThe "show flash" command will display the contents of flash.When in line configuration mode, which command will set a login password of "cisco"?password ciscologin password ciscologin ciscoenable password ciscoenable ciscoWhen in line configuration mode, the command "password PASSWORD" will set the login password.Which of the following is the correct syntax for configuring a message of the day banner?bannerbanner motd &banner .banner motd .banner exec .The correct syntax to configure a message of the day banner is "banner motd DELIMITER", where DELIMITER is your choice of delimiting characters.Which of the following will clear the configuration from NVRAM?write eraseclear configclear startup-configerase startup-configerase configTo erase the startup-config from NVRAM, you can use the command "write erase" or the command "erase startup-config"Which of the following commands can be used to copy the startup-config to a network server?copy running-config tftpwrite networkcopy config tftpNone of the aboveThe answer is none of the above. The correct command is "copy startup-config tftp"What is the proper command to copy a new version of the IOS image from a network server into flash?load flash tftpcopy flash tftpcopy tftp flashcopy flashNone of the aboveThe command "copy tftp flash" is used to copy files from a TFTP server into flash.What is the command used to bond two 64K ISDN B channels into one 128K circuit?ppp bondingmultilink pppppp multilinkmultilinkNone of the aboveThe command "ppp multilink" is used to enable multilink PPP which will bond two B channels into one logical circuit.What type of circuit has 23 64K B channels and one 64K D channel?T1DS3PRIBRINone of the aboveAn ISDN PRI circuit consits of 23 B channels and 1 D channel with 64Kbps per channel.What type of channels does a standard ISND BRI consist of?Two 64Kbs B ChannelTwo 64Kbs B Channels & one 64Kbs D ChannelTwo 16Kbs B Channels & one 64Kbs D ChannelTwo 64K B Channels & one 16Kbs D ChannelTwo 64Kbs D Channels and one 16Kbs B ChannelAnd ISND BRI has two 64Kbps B channels used for data and one 16Kbps D channel used for ISDN signaling information.What is the default encapsulation type for stardard serial asyncronous interfaces?ciscohdlcframe-relaypppNone of the aboveThe default encapsulation for standard asyncronous serial interfaces is HDLC.What is the proper command to assign DLCI 102 to a sub-interface?frame relay interface dlci 102frame relay interface-dlci 102frame-relay interface-dlci 102frame-relay inteface dlci 102The command "frame-relay interface-dlci" is used to assign a DLCI to a frame-relay sub-interface.What is the proper command to set the frame-relay LMI type to Annex D?frame-relay lmi-type ciscoframe-relay lmi-type annexdframe-relay lmi-type ansiframe-relay lmi-type q933aframe-relay lmi-type annex dThe command "frame-relay lmi-type ansi" is used set the LMI type to Ansi, also known as Annex D.What command would you type to view the active DLCI's on the router?show frame-relay pvcshow frame-relay dlcishow frame-relay ipshow frame-relay mapNone of the aboveThe command "show frame-relay pvc" will display the active and inactive DLCI's.CSU/DSU in a acronym for which one of the following?Channel System Unit/Data System UnitCall System Unit/Data System UnitChannel Service Unit/Data Service UnitCustomer System Unit/Data Service UnitNone of the AboveCSU/DSU stands for Channel Serivce Unit/Data Service Unit.Which of the following uses a PVC at layer 2?ISDNHDLCX.25PPPFrame-RelayFrame-relay uses a PVC, or Permenant Virtual Circuit, at the Data-Link layer.What command will display the DLCI and line speed for a serial interface?show frame-relay pvcshow interfaceshow frame-relay speedshow frame-relayshow ip interfaceThe show interface command will show the DLCI as well as the configured line speed.Which one of the following is true about a frame-relay DLCI?The DLCI represents a single physical circuitThe DLCI represents a logical connection between two pointsThe DLCI is optional for frame-relayThe DLCI is assigned dynamicallyThe DLCI represents a logical circuit between two devices on a frame-relay network.Which of the following is provided by the local management interface?The LMI enapsulation typeThe global or local significance of the DLCI valuesThe current DLCI valuesThe status of the PVCsThe current PVC utilization rateThe local management interface, or LMI, provides information such as the following: The global or local significance of the DLCI, the current DLCIs, and the status of the virtual circuits.Which ISDN protocol prefix specifies switching?IDSQEProtocols beginning with the letter Q specify switching and signaling.Which ISDN protocol prefix specifies concepts, terminology, and services?DIQSEProtocols beginning with the letter I specify concepts, terminology, and services.Which ISDN reference point defines the point between the NT1 and the line-termination equipment?STUS/TRThe U reference point defines the reference point between the NT1 device and the line-termination equipment on the carrier's network.Which ISDN protocol prefix specifies basic telephone service?QETIRProtocols beginning with the letter E specify ISDN over the existing telephone network.Which ISDN channel signals the router that a call is coming in?ABDUSThe D channel is used for signalling information such as notifications of inbound calls.What command enables X.25 encapsulation on a Cisco router?encap frame-relayencap lapdencap hdlcencap x25encap x21bisThe command to enable X.25 encapsulation is "encap x25".Which of the following are protocols commonly used int X.25 implementations?HDLCX.21bisLAPDPLPPPPThe X.25 protocol suite includes Packet Layer Protocol (PLP), Link Access Procedure Balanced (LAPB) and X.21bis.What term is used to represent the standard telephone system?Plain Old Telephone ServicePublic Dial-up NetworkPublic Offered Telephone ServicePublic Telephone NetworkPublic Communications NetworkThe term POTS, or Plain Old Telephone Service, is used to describe the standard dial-up telephone network.What is the command used to configure spid 1 on a Cisco router?Router(config)#isdn spid 1 21055512120101 5551212Router(config-if)#isdn spid 1 21055512120101 5551212Router(config)#isdn spid1 21055512120101 5551212Router(config-if)#isdn spid1 21055512120101 5551212Router(config)#isdn spid 21055512120101 5551212The command "isdn spid1" when issued in interface configuration mode is used to configure the SPID 1 for an ISDN BRI.What command would configure your ISDN BRI port for connecting to a DMS100 telephone switch?Router(config)#isdn switch-type dms100Router(config-if)#isdn switch-type dms100Router(config)#isdn switch-type basic-dms100Router(config-if)#isdn switch-type basic-dms100None of the aboveThe command "isdn switch-type basic-dms100", when issued in global configuration mode, will configure your ISDN BRI port to connect to a DMS100 telephone switch.What is the command to configure CHAP authentication for a dialer interface?ppp chapppp authentication chapauthentication chapchap authenticationppp chap authenticationThe command "ppp authentication chap" will configure chap authentication.Which of the following encapsulation types are available for a standard synchronous serial port?x25lapbppphdlcsdlcAll of the listed encapsulation types are valid for standard syncronous serial ports.Which of the following is true regarding DDR?You should use dynamic routingYou should use static routingYou should not use routingYou should use x25 ecapsulationYou should use frame-relay encapsulationYou should not generally use dynamic routing when using DDR since the routing updates will keep the link up. Static routing can be used to allow routing without having constant routing updates accross the DDR interface.Which layer defines the physical topology?ApplicationPresentationPhysicalNetworkData LinkThe Physical layer defines the physical topology of the network.Which layer is responsible for the logical addressing of devices and the routing through an internetwork?ApplicationNetworkData LinkSessionTransportThe Network layer is responsible for the logical addresses and the routing through an internetwork.Is this really a question for WAN Protocols, or is it OSI Reference Model? Please clarify. Thanks, ami Yes, this Objective should have been OSI Reference. lsWhich layer of the OSI model is responsible for framing?ApplicationSesstionNetworkData Link TransportThe Data Link layer assembes the data into frames.Which layer of the OSI reference model is resposible for flow control, acknowledgement, and windowing?ApplicationTransportSessionData-LinkNetworkThe Transport layer is resposible for flow control, acknowledgement, and windowing.Which layer of the OSI reference model can provide multiplexing of data streams?ApplicationSessionTransportData LinkNetworkThe Transport layer can provide multiplexing capabilites.Which layer of the OSI reference model is responsible for establishing and tearing down connections between two devices on the network?ApplicationSessionTransportNetworkData LinkThe Transport layer is responsible for the establishment and tear-down of sessions.Which layer of the OSI reference model is responsible for negotiating the syntax of the data?ApplicationPresentationSessionTransportNetworkThe Presentation layer is responsible for negotiating the syntax for the data.On the following line, what does the "bia" stand for? Hardware is Lance, address is 0010.7b3b.a621 (bia 0010.7b3b.a621)Binary index addressBasic interupped indexBit index addressBurned in addressBasic indentity addressThe term "bia" stands for burrned in address.Which of the following is a Data Link address?0010.7b3b.a621204.57.117.1DLCI 10210.102A000.0010.7b3b.a6210010.7b3b.a621 and DLCI 102 are both Data Link addresses.Which of the following are examples of protocols that operate at the Data Link layer of the OSI reference model?HDLCTCP/IPPPPIPXLAPBHDLC, PPP, and LAPB are all examples of protocols that operate at the Data Link layer.What is the correct order for the following five conversion steps of data encapsulation? A. Segments are converted into packets or datagrams B. Frames are converted into bits C. Data is converted into segments D. User information is converted into data E. Packets or datagrams are converted into framesA, C, B, D, EE, A, C, D, BC, D, A, E, BD, C, A, E, BB, E, A, D, CUser information is converted into data, data is converted into segments, segments are converted into packets, packets are converted into frames, and frames are converted into bits.The hardware address of a device resides on which layer or sub-layer of the OSI reference model?MAC sub-layerLLC sub-layerPhysical LayerNetwork LayerSession LayerThe hardware address of a device, or MAC address, resides on the MAC sub-layer of the OSI reference model.Is this really a fair question/answer since the MAC sublayer is not really a layer of the OSI reference model, but a sublayer of the Datalink layer? Question has be reworded. lsWhich of the following is a network address?0010.7b3b.a6215.0010.7b3b.a62134.101204.57.117.5DLCI 1025.0010.7b3b.a621 is an IPX network address, 34.101 is an AppleTalk network address, and 204.57.117.5 is a TCP/IP network address.What Data Link Layer standard is also referred to as CSMA/CD?Token-RingEthernetFDDIATMArcnetEthernet is Carrier Sense Multiple Access with Collision Detection, or CSMA/CD.Which of the following Data Link standards use a type of token-passing technology?EthernetFast EthernetArcnetToken-RingFDDIFDDI, Token-Ring, and Arcnet all use token-passing.Which two layers, or sub-layers, of the OSI reference model are commonly used to establish connection-oriented services?MAC sub-layerLLC sub-layerNetworkSessionTransportThe Transport layer handles connection-oriented protocols. For some protocol stacks, the LLC sub-layer can establish a connection-oriented session.If a router interface has two IP addresses configured, what command would you type to add the IP address 204.57.117.40 as a third IP address?ip address 204.57.117.40 backupip address 204.57.117.40ip address 204.57.117.40 255.255.255.192 secondaryip address 204.57.117.40 255.255.255.192 additionalip address 204.57.117.40 255.255.255.192The command "ip address 204.57.117.40 255.255.255.192 secondary" will configure an additional IP address on the interface.What is the proper command to configure an IP address of 10.25.16.1/16 on an interface?ip address 10.25.16.1ip address 10.25.16.1 255.255.255.0ip address 10.25.16.1 255.255.0.0ip address 10.25.16.1 255.255.255.16ip address 10.25.16.1 255.0.0.0The command "ip address 10.25.16.1 255.255.0.0" configures the IP address with a 16-bit mask.Which of the following networks can the IP address 204.57.117.40 belong to? (Assume subnet zero is valid)204.57.117.0 255.255.255.0204.57.117.0 255.255.255.128204.57.117.0 255.255.255.192204.57.117.0 255.255.255.224204.57.117.0 255.255.255.240The IP address 204.57.117.40 is valid for the following networks: 204.57.117.0/24, 204.57.117.0/25, and 204.57.117.0/26.What type of address is the following? 204.57.117.40AppleTalkIPXTCP/IPDECNETCLNSThe address 204.57.117.40 is an example of a TCP/IP address.Which type of address is the following? 1002.200AppleTalkIPXTCP/IPCLNSNetBIOSThe address 1002.200 is an example of an AppleTalk address.What type of address is the following? A1.0010.7b3b.a621AppleTalkIPXTCP/IPDECNETMACThe address A1.0010.7b3b.a621 is an example of an IPX address.For the following address, what is the network portion of the address? 10.25.15.74 255.255.255.19210.25.15.010.25.0.010.25.15.6410.0.0.0None of the aboveThe address 10.25.15.74 with a mask of 255.255.255.192 belongs to the 10.25.15.64 network.Given the following AppleTalk address, what is the station address? 1002.1510022.151002.12.115The network address is 1002 and the station address is 15.What network mask would you use to subnet a Class C network into four subnets if the command "ip subnet zero" was configured on the router?255.255.255.0255.255.255.128255.255.255.192255.255.255.224225.255.255.240If the router has been configured to accept subnet zero, using a mask of 255.255.255.192 would subnet a Class C address into four subnets.What network mask would you use to subnet a Class C network into two subnets if the command "ip subnet zero" was configured on the router?255.255.255.0255.255.255.128255.255.255.192255.255.255.224255.255.255.240If the router has been configured to accept subnet zero, using a mask of 255.255.255.128 would subnet a Class C address into two usable subnets.What network mask would you use to subnet a Class C network into two subnets if the command "ip subnet zero" was NOT configured on the router?255.255.255.0255.255.255.128255.255.255.192255.255.255.224255.255.255.240If the router has not been configured to accept subnet zero, you would need to use a mask of 255.255.255.192 to get two usable subnets.Given the following IPX address, what is the network address component of the address? 6a01.0010.7b3b.a6216a0100107b3ba6216a01.00106a01 is the network address and 0010.7b3b.a621 is the node address.Given the following TCP/IP address what is the node address? 204.57.117.75 255.255.255.192204.57.117.64117.757511None of the aboveThe node address is 11 and the network address is 204.57.117.64.Which TCP/IP protocol provides connection-oriented services?UDPTCPARPRIPICMPThe TCP protocol provides connection-oriented services.Which TCP/IP protocol provides connectionless network services?TCPUDPRIPICMPARPThe UDP protocol provices connectionless network services.Which TCP/IP protcol maps network address to hardware address?UDPTCPICMPARPIPThe Address Resolution Protocol, ARP, maps network address to hardware addresses.Which TCP/IP protocol does the Ping command utilize?ARPIPICMPTCPUDPThe ping command utilizes the ICMP protocol.Which TCP/IP protocol will send a message to a sending host if the remote network is unavailable?TCPUDPICMPARPIPThe ICMP protocol will send a Network Unreachable message to a transmitting host if the destination network is unavailable.Which of the following TCP/IP protocols is responsible for making routing decisions?TCPUDPARPICMPIPThe IP protocol is responsible for making routing decisions.Which TCP/IP protocol is capable of sending redirect packets?TCPUDPIPICMPARPThe ICMP protocol can send a redirected packet if there is a better path to the remote network.Which of the following protocol can be used to obtain an IP address for a known MAC address.ARPRARPBOOTPIPTCPReverse ARP (RARP) and BOOTP can both be used to obtain an IP address for a known MAC address.Which of the following protocols operate at the Transport Layer of the OSI model?TCPUDPIPICMPBOOTPUDP and TCP operate at the Transport Layer of the OSI model.The User Datagram Protocol works at which layer of the OSI reference model?Data LinkNetworkTransportSessionPresentationThe User Datagram Protocol, UDP, works at the Transport Layer of the OSI reference model?A workstation is configured with an IP address of 204.57.117.63 and a mask of 255.255.255.192. When you try to ping a remote device, you get a timeout error. What is most likely the problem?The default gateway has not been configured.The next-hop router is down.The IP address assigned to the workstation is invalid.The network cable is not plugged into the network card.When using a mask of 255.255.255.192, the IP address 204.57.117.63 would be a broadcast address and therefore, not a valid address for a workstation.What is the syntax to configure a port on a router with a VIP card installed?slot/portslot/port adapter/portportport/slotport/port adatper/slotA port on a VIP card is referenced by slot/port adapter/port.Which command would you use to see if you were receiving SAP and RIP information on a particular interface?show ipx serversshow ipx trafficshow ipx interfaceshow ipx routedebug ipx ripThe "show ipx interface" command will display the number of RIP and SAP packets transmitted and received on an interface.Which of the following are valid Cisco/Novell encapsulation pairs?arpa = Ethernet_802.3novell-ether = Ethernet_802.3sap = Ethernet_IIarpa = Ethernet_IInovell-ether = Ethernet_802.2novell-ether is the equivilent of Novell's Ethernet_802.3 and arpa is the equivalent of Novell's Ethernet_II.What is the default Novell frame type on a Cisco router Ethernet interface?Ethernet_802.2Ethernet_802.3Ethernet_IIEthernet_SNAPThere is no defualtIf an encapsulation type is not specified, the the router will default to novell-ether which is Novell's Ethernet_802.3.In a RIP routed network, what does a metric of 16 represent?The number of milliseconds to the remote networkThe number of hops to the remote networkThe network is unreachableThe bandwidth is 16KbsFor RIP, a metric or hop count of 16 represents that the network is unreachable. Which of the following commands are used to configure IGRP routing?igrp routingrouter igrp 100router igrpip routing igrp 100ip routing igrpThe command "router igrp 100" is used to configure the router for IGRP routing in Autonomous System 100.What commmand is used to configure RIP routing?ip routingip routing riprouter rip 100router ripip routing rip 100The command "router rip" is issued to configure RIP routing.What is split-horizon?The router splits the traffic between multiple interfacesThe router does not send routing updates for a network back out that same interface that the update was received onIf a network route goes down, the router advertises it as unreachable.If a packet is too large, the router will split the packet into smaller units before transmittingSplit-horizon defines that a router should not send a routing update for a network out the same interface as it was received on. What type of routing algorithm is used by EIGRP?Link-StateDistance-VectorShorest Path FirstNone of the aboveEIGRP uses the Distance-Vector algorithim.Which of the following is true regarding Distance-Vector routing protocols?Convergence time is slowConvergence time is fastWorks well in small networksWorks well in large networksDistance-Vector routing protocols work well for small networks, but their convengence time is relatively slow when compared to Link-State protocols.Which routing protocol is best suited for small networks consisting of Cisco and non-Cisco routers?RIPOSPFIGRPStatic routesRIP is best suited for small networks that must support interoperability between different router vendors.What routing metric is used by IGRP?TTLHop countBandwidth, reliability, MTU, delay, and loadDistanceIGRP uses a metric composed of bandwidth, reliability, MTU, delay, and load.Which of the following are benefits of segmenting your network using routers?Network security can be more easily controlledBroadcast traffic is minimizedThe network is more scalableNetwork traffic can be more controlled more efficientlyA routed network is the easiest to implement.Segmenting your network with routers is usually more difficult than segmenting using switches, but some of the benefits are: network security can be more easily controlled, broadcast traffic is minimized, the network is more scalable, and network traffic can be controlled more efficiently.Which of the following routing protocols use an AS?RIPRIP v2IGRPEIGRPOSPFIGRP, EIGRP, and OSPF all use an Autonomous Systems (AS) number.To specify that all hosts in the class A network 10.0.0.0 are denied access, what would you use for your access-list?access-list 100 deny 10.0.0.0 255.0.0.0access-list 100 deny 10.0.0.0 0.255.255.255access-list 1 deny 10.0.0.0 255.0.0.0access-list 1 deny 10.0.0.0 0.255.255.255access-list 100 deny 10.0.0.0 255.0.0.0 anyThe standard access-list "access-list 1 deny 10.0.0.0 0.255.255.255" would deny traffic originating from Class A network 10.0.0.0.What access-list will allow only WWW traffic into network 204.57.117.0?access-list 100 permit tcp 204.57.117.0 0.0.0.255 eq wwwaccess-list 100 permit www any 204.57.117.0 0.0.0.255access-list 100 permit tcp 204.57.117.0 eq wwwaccess-list 100 permit tcp any 204.57.117.0 0.0.0.255 eq wwwaccess-list 100 permit any 204.57.117.0 0.0.0.255 eq wwwThe access-list "access-list 100 permit tcp any 204.57.117.0 0.0.0.255 eq www" would only permit www traffic into network 204.57.117.0.Which of the following can be logged by using IPX extended access-lists?Source MAC addressSource socketDestination addressDestination socketProtocolIPX extended access-lists can log source address, destination address, source socket, destination socket, and protocol. MAC addresses can not be logged using IPX extended access-lists.Which of the following commands will show extended access-list 101?show ip access-listshow ipx access-listshow access-list extendedshow ip access-list 101show access-list 101"show ip access-list", "show ip access-list 101", and "show access-list 101" will all display access-list 101. In addition, "show access-list" will also display access-list 101.What is the list range for an IP extended access-list?1-99100-199200-2991000-11991-1000IP extented access-lists range from 100-199,What would be the result of the following command? access-list 101 permit tcp host 204.57.117.1 any eq 23FTP traffic from 204.57.117.1 will be permittedFTP traffic to 204.57.117.1 will be permittedSMTP traffic to 204.57.117.1 will be permittedTelnet traffic to 204.57.117.1 will be permittedTelnet traffic from 204.57.117.1 will be permittedThe access-list "access-list 101 permit tcp host 204.57.117.1 any eq 23" will permit telnet traffic from host 204.57.117.1 to any destination.Which of the following commands would give you some type of information regarding IPX access-lists?show access-listsshow ipx access-listsshow interfaceshow ipx interfaceshow ipx"show access-lists" and "show ipx access-lists" will display the IPX access-lists and "show ipx interface" will display what access-lists are applied to an interface.When configuring an extended IP access-list, which of the following would be valid ways to refer to a single host with the address of 204.57.117.1?host 204.57.117.1204.57.117.1 255.255.255.255204.57.117.1 0.0.0.0any 204.57.117.1user 204.57.117.1Both "host 204.57.117.1" and "204.57.117.1 0.0.0.0" refer to a single host with the address of 204.57.117.1.In an IP access-list, which of the following would include the host located at 204.57.117.40?204.57.117.40 0.0.0.31204.57.117.40 0.0.0.0204.57.117.0 0.0.0.255204.57.117.0 0.0.0.63host 204.57.117.40"204.57.117.40 0.0.0.0", "204.57.117.0 0.0.0.255", "204.57.117.0 0.0.0.63", and "host 204.57.117.40" would all include host 204.57.117.40.Which of the following is a characteristic of a switch?Forwards packets based on the MAC address in the frameForwards packets based on the IP address int the frameDoes not forward all broadcast trafficForwards all broadcast trafficA switch switches packets based on the destination MAC address in the frame. A switch will also propogate all broadcast traffic.Which of the following are switching methods?Store-and-forwardFragment FreeCut-throughFast-SwitchStore-and-forward, Fragment Free, and Cut-through are all switching methods.Which of the following describes frame tagging?A user assigned ID is added to each frameFrames are tagged based on protocolA unique ID is placed in the header of each frame as it traverses the switch fabricUnwanted packets are tagged and later discardedA random value is inserted into each frame.Frame tagging is when a unique user assigned ID is added in the header of the frame and the value will change as the packets travels through different "virtual lans" throughout the switching fabric.If a packet is switched as soon as the destination address is read, what type of switching method is being utilized?Store-and-ForwardCut-throughFragment FreeFast-SwitchSwitch-ThroughCut-through switching will switch the packet as soon as the destination address can be read.Which of the following describes a full-duplex Ethernet?Full-Duplex can only be configured when connected to a switching deviceFull-Duplex can be configured when connecting to a shared media hub if the hub supports itData can be transmitted in both directions, but only one way at a timeData can be transmitted in both directions at the same timeFull-Duplex can only be configured when connecting to a switching device. When using full-duplex, data can be trasmitted in both directions at the same time.What is the maximum distance that a 100Base-T cable can be run when using Catagory 5 cable?50 Meters100 Meters100 Feet150 Meters150 FeetThe maximum distance for an 100Base-T cable run is 100 Meters.What is the purpose of the Spanning Tree Algorithm?To prevent routing loopsTo pervent bridging loopsTo build a switch tableTo detect packet errorsThe Spanning Tree Algorithm is used to prevent loops in a bridged or switched network.Which of the following is true regarding cut-through switching?Latency through the switch is constant regardless of the packet sizeLatency through the switch changes as the packet size changesIt is the default for all Cisco switchesIt will forward packet errorsIt will not forward packet errorsWhen using cut-though switching, the latency through the switch remains constant regardless of the packet size. Cut-though switching will also forward packet errors.Which of the following is a disadvantage of creating a large switched network?The network will be slowBroadcast storms could cause problemsThe network will exerience too many collisionsUsers will not get the full benefit from the networkWhen creating a large switched network, broadcasts storms could cause problems on the entire network.Which of the following is an advantage of segmenting your network using switches?Collisions will be decreasedBroadcasts will be decreasedNetwork contention will be increasedSome traffic can stay localizedNetwork throughput can be increasedWhen segmenting your network using switches, collisions will be decreased, some traffic will stay localized, and network throughput should be increased.Which switching type has the highest latency?Store-and-forwardCut-throughFragment FreeFast-SwitchStore-and-forward switching has the highest latency.Which one of the following is true regarding CSMA/CD?Collisions will occur as traffic increasesCollisions will be avoidedNetwork congestion will not occurIt is not widely usedCSMA/CD is the access method used by Ethernet. Collisions will occur as traffic increases.Which one of the following would be a reason for segmenting your network with bridges?There are too many broadcasts on the networkCollisions are highDatagram filtering must be impementedTraffic must be prioritized based on protocol typeWhen your network is saturated with collisions, segmenting your network with bridges will help decrease the number of collisions.What information is examined by a switch or a bridge in order to make a forwarding decision?Source MAC addressDestination MAC addressSource network addressDestination network addressPacket TypeThe destination address is used to make forwarding decisions.Normally, if a switched network has multiple redundant paths, the traffic is load-balanced on these links. True or FalseTRUEFALSEFalse. The Spanning Tree Algorithm shuts down a redundant link in order to prevent bridging loops.Which of the following commands will apply an IPX SAP access-list for incoming traffic?ipx access-group 1050 inipx access-group 1050ipx input-sap-filter 1050 inipx input-sap-filter 1050"ipx input-sap-filter 1050" applies an incoming sap filter 1050.What is the list range for IPX extended access-lists?1-99100-199900-9991000-1999800-899IPX extended access-lists range from 900-999.