Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
207 Cards in this Set
- Front
- Back
06.01
The OSI has seven layers, which layer does SMTP work at? A. Network B. Transport C. Session D. Application |
The OSI has seven layers, which layer does SMTP work at? A. Network B. Transport C. Session D. Application |
|
06.02 You need to have secure communications using HTTPS. What port number is used by default? A. 69 B. 23 C. 21 D. 443 |
You need to have secure communications using HTTPS. What port number is used by default? A. 69 B. 23 C. 21 D. 443 |
|
06.03 You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? A. SMTP B. SNMP C. DHCP D. ARP |
You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? A. SMTP B. SNMP C. DHCP D. ARP |
|
06.04 What protocol is used to find the hardware address of a local device? A. RARP B. ARP C. IP D. ICMP E. BootP |
What protocol is used to find the hardware address of a local device? A. RARP B. ARP C. IP D. ICMP E. BootP |
|
06.05 You need to login to a Unix server across a network that is not secure. Which of the following protocols will allow you to remotely administrator this server securely? A. Telnet B. SSH C. SFTP D. HTTP |
You need to login to a Unix server across a network that is not secure. Which of the following protocols will allow you to remotely administrator this server securely? A. Telnet B. SSH C. SFTP D. HTTP |
|
06.06 If you can ping by IP address but not by hostname, or FQDN, which of the following port numbers is related to the server process that is involved? A. 21 B. 23 C. 53 D. 69 E. 80 |
If you can ping by IP address but not by hostname, or FQDN, which of the following port numbers is related to the server process that is involved? A. 21 B. 23 C. 53 D. 69 E. 80 |
|
06.07 Which of the following describe the DHCP Discover message? (Choose two.) A. It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. B. It uses UDP as the Transport layer protocol. C. It uses TCP as the Transport layer protocol. D. It does not use a Layer 2 destination address. |
Which of the following describe the DHCP Discover message? (Choose two.) A. It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. B. It uses UDP as the Transport layer protocol. C. It uses TCP as the Transport layer protocol. D. It does not use a Layer 2 destination address. |
|
06.08 What layer 4 protocol is used for a Telnet connection, and what is the default port number? A. IP, 6 B. TCP, 21 C. UDP, 23 D. ICMP, 21 E. TCP, 23 |
What layer 4 protocol is used for a Telnet connection, and what is the default port number? A. IP, 6 B. TCP, 21 C. UDP, 23 D. ICMP, 21 E. TCP, 23 |
|
06.09 Which statements are true regarding ICMP packets? (Choose two.) A. They acknowledge receipt of a TCP segment. B. They guarantee datagram delivery. C. They can provide hosts with information about network problems. D. They are encapsulated within IP datagrams. E. They are encapsulated within UDP datagrams. |
Which statements are true regarding ICMP packets? (Choose two.) A. They acknowledge receipt of a TCP segment. B. They guarantee datagram delivery. C. They can provide hosts with information about network problems. D. They are encapsulated within IP datagrams. E. They are encapsulated within UDP datagrams. |
|
06.10 Which of the following services use TCP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP |
Which of the following services use TCP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP |
|
06.11 Which of the following services use UDP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP |
Which of the following services use UDP? (Choose three.) A. DHCP B. SMTP C. SNMP D. FTP E. HTTP F. TFTP |
|
06.12 Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose three.) A. IP B. TCP C. Telnet D. FTP E. TFTP |
Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose three.) A. IP B. TCP C. Telnet D. FTP E. TFTP |
|
06.13 Which of the following protocols is used by e‑mail servers to exchange messages with one another? A. POP3 B. IMAP C. SMTP D. HTTP |
Which of the following protocols is used by e‑mail servers to exchange messages with one another? A. POP3 B. IMAP C. SMTP D. HTTP |
|
06.14 If you use either Telnet or FTP, which is the highest layer you are using to transmit data? A. Application B. Presentation C. Session D. Transport |
If you use either Telnet or FTP, which is the highest layer you are using to transmit data? A. Application B. Presentation C. Session D. Transport |
|
06.15 Which of the following protocols can use TCP and UDP, permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices? A. DNS B. SNMP C. SMTP D. TCP |
Which of the following protocols can use TCP and UDP, permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices? A. DNS B. SNMP C. SMTP D. TCP |
|
06.16 You need to transfer files between two hosts. Which two protocol can you use? A. SNMP B. SCP C. RIP D. NTP E. FTP |
You need to transfer files between two hosts. Which two protocol can you use? A. SNMP B. SCP C. RIP D. NTP E. FTP |
|
06.17 What layer in the IP stack is equivalent to the Transport layer of the OSI model? A. Application B. Host-to-Host C. Internet D. Network Access |
What layer in the IP stack is equivalent to the Transport layer of the OSI model? A. Application B. Host-to-Host (The IP Stack is also referred to as the DOD model). C. Internet D. Network Access |
|
06.18 You need to make sure that your network devices have a consistent time across all devices. What protocol do you need to run on your network? A. FTP B. SCP C. NTP E. RTP |
You need to make sure that your network devices have a consistent time across all devices. What protocol do you need to run on your network? A. FTP B. SCP C. NTP E. RTP |
|
06.19 Which of the following allows a server to distinguish among different simultaneous requests from the same host? A. They have different port numbers. B. A NAT server changes the IP address for subsequent requests. C. A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin. D. The MAC address for each one is unique. |
Which of the following allows a server to distinguish among different simultaneous requests from the same host? A. They have different port numbers. B. A NAT server changes the IP address for subsequent requests. C. A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin. D. The MAC address for each one is unique. |
|
06.20 Which of the following protocols uses both TCP and UDP? A. FTP B. SMTP C. Telnet D. DNS |
Which of the following protocols uses both TCP and UDP? A. FTP B. SMTP C. Telnet D. DNS |
|
06.21 What might be the problem if a DHCP client suddenly finds itself in a different IP subnet from the one it should be in? |
The most likely problem is that a rogue DHCP server has been introduced into the network and is handing this device an incorrect lease. |
|
06.22 Name the protocol that uses both TCP ports 20 and 21. |
FTP uses both TCP ports 20 and 21 for the data channel and the control channel, respectively. |
|
06.23 What two well-known port numbers does a DNS server use? |
A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions. |
|
06.24 Which protocol dynamically reports errors to source hosts by using IP directly to build packets? |
ICMP uses IP directly to build error-reporting packets that are transmitted back to the originating source host when issues arise during the delivery of data packets. ICMP is also used during ping and some Traceroute operations. |
|
06.25 What could cause a server that you can ping not to provide the particular TCP/IP service, such as FTP, HTTP, and so on, that you expect it to offer? |
Quite simply, the service might not be running currently on that server. Another possibility might be that a firewall between the client and the server has blocked the protocol in question from passing. |
|
06.26 What might cause your email to stop functioning properly when you change Internet service providers? |
Most ISPs have their own mail servers. When you switch service, you might need to point your mail application to the servers provided by the new service provider. |
|
06.27 Which UNIX command is used for terminal emulation in the same way Telnet is used? |
The UNIX command rlogin functions similarly to Telnet. |
|
06.28 What protocol is at the heart of the ping and tracert commands in a Windows operating system? |
ICMP is the protocol that the ping and tracert commands rely on. If you’re having trouble getting pings and Traceroutes through a router, you might need to check if ICMP is being allowed thorough. |
|
06.29 Which destination Transport-layer protocol and port number does a TFTP client use to transfer files over the network? |
TFTP servers respond to UDP messages sent to port 69. |
|
06.30 What well-known port numbers do SMTP, POP3, and IMAP4 servers use? |
SMTP uses TCP port 25. POP3 uses TCP port 110. IMAP4 uses TCP port 143. |
|
06.31.1 * Provide the missing. Protocol: ? Port: 20 (data) and 21 (control) Transfer Protocol: TCP |
Protocol: FTP Port: 20 (data) and 21 (control) Transfer Protocol: TCP |
|
06.31.2 * Provide the missing. Protocol: FTP Port: ? Transfer Protocol: TCP |
Protocol: FTP Port: 20 (data) and 21 (control) Transfer Protocol: TCP |
|
06.31.3 * Provide the missing. Protocol: FTP Port: 20 (data) and 21 (control) Transfer Protocol: ? |
Protocol: FTP Port: 20 (data) and 21 (control) Transfer Protocol: TCP |
|
06.32.1 * Provide the missing. Protocol: ? Port: 161 Transfer Protocol: UDP |
Protocol: SNMP Port: 161 Transfer Protocol: UDP |
|
06.32.2 * Provide the missing. Protocol: SNMP Port: ? Transfer Protocol: UDP |
Protocol: SNMP Port: 161 Transfer Protocol: UDP |
|
06.32.3 * Provide the missing. Protocol: SNMP Port: 161 Transfer Protocol: ? |
Protocol: SNMP Port: 161 Transfer Protocol: UDP |
|
06.33.1 * Provide the missing. Protocol: ? Port: 22 Transfer Protocol: TCP |
Protocol: SSH Port: 22 Transfer Protocol: TCP |
|
06.33.2 * Provide the missing. Protocol: SSH Port: ? Transfer Protocol: TCP |
Protocol: SSH Port: 22 Transfer Protocol: TCP |
|
06.33.3 * Provide the missing. Protocol: SSH Port: 22 Transfer Protocol: ? |
Protocol: SSH Port: 22 Transfer Protocol: TCP |
|
06.34.1 * Provide the missing. Protocol: ? Port: 23 Transfer Protocol: TCP |
Protocol: Telnet Port:23 Transfer Protocol: TCP |
|
06.34.2 * Provide the missing. Protocol: Telnet Port: ? Transfer Protocol: TCP |
Protocol: Telnet Port: 23 Transfer Protocol: TCP |
|
06.34.3 * Provide the missing. Protocol: Telnet Port:23 Transfer Protocol: ? |
Protocol: Telnet Port:23 Transfer Protocol: TCP |
|
06.35.1 * Provide the missing. Protocol: ? Port: 53 Transfer Protocol: Both UDP and TCP |
.
Protocol: DNS Port: 53 Transfer Protocol: Both UDP and TCP |
|
06.35.2 * Provide the missing. Protocol: DNS Port: ? Transfer Protocol: Both UDP and TCP |
Protocol: DNS Port: 53 Transfer Protocol: Both UDP and TCP |
|
06.35.3 * Provide the missing. Protocol: DNS Port: 53 Transfer Protocol: ? |
Protocol: DNS Port: 53 Transfer Protocol: Both UDP and TCP |
|
06.36.1 * Provide the missing. Protocol: ? Port: 67 (server) and 68 (client) Transfer Protocol: UDP |
Protocol: DHCP Port: 67 (server) and 68 (client) Transfer Protocol: UDP |
|
06.36.2 * Provide the missing. Protocol: DHCP Port: ? Transfer Protocol: UDP |
Protocol: DHCP Port: 67 (server) and 68 (client) Transfer Protocol: UDP |
|
06.36.3 * Provide the missing. Protocol: DHCP Port: 67 (server) and 68 (client) Transfer Protocol: ? |
Protocol: DHCP Port: 67 (server) and 68 (client) Transfer Protocol: UDP |
|
06.37.1 * Provide the missing. Protocol: ? Port: 69 Transfer Protocol: UDP |
Protocol: TFTP Port: 69 Transfer Protocol: UDP |
|
06.37.2 * Provide the missing. Protocol: TFTP Port: ? Transfer Protocol: UDP |
Protocol: TFTP Port: 69 Transfer Protocol: UDP |
|
06.37.3 * Provide the missing. Protocol: TFTP Port: 69 Transfer Protocol: ? |
Protocol: TFTP Port: 69 Transfer Protocol: UDP |
|
06.38.1 * Provide the missing. Protocol: ? Port: 445 Transfer Protocol: UDP |
Protocol: SMB Port: 445 Transfer Protocol: UDP |
|
06.38.2 * Provide the missing. Protocol: SMB Port: ? Transfer Protocol: UDP |
Protocol: SMB Port: 445 Transfer Protocol: UDP |
|
06.38.3 * Provide the missing. Protocol: SMB Port: 445 Transfer Protocol: ? |
Protocol: SMB Port: 445 Transfer Protocol: UDP |
|
06.39.1 * Provide the missing. Protocol: ? Port: 3389 Transfer Protocol: : TCP |
Protocol: RDP Port: 3389 Transfer Protocol: : TCP |
|
06.39.2 * Provide the missing. Protocol: RDP Port: ? Transfer Protocol: : TCP |
Protocol: RDP Port: 3389 Transfer Protocol: : TCP |
|
06.39.3 * Provide the missing. Protocol: RDP Port: 3389 Transfer Protocol: ? |
Protocol: RDP Port: 3389 Transfer Protocol: : TCP |
|
06.40.1 * Provide the missing. Protocol: ? Port: 80 Transfer Protocol: TCP |
Protocol: HTTP Port: 80 Transfer Protocol: TCP |
|
06.40.2 * Provide the missing. Protocol: HTTP Port: ? Transfer Protocol: TCP |
Protocol: HTTP Port: 80 Transfer Protocol: TCP |
|
06.40.3 * Provide the missing. Protocol: HTTP Port: 80 Transfer Protocol: ? |
Protocol: HTTP Port: 80 Transfer Protocol: TCP |
|
06.41.1 * Provide the missing. Protocol: ? Port: 443 Transfer Protocol: TCP |
Protocol: HTTPS Port: 443 Transfer Protocol: TCP |
|
06.41.2 * Provide the missing. Protocol: HTTPS Port: ? Transfer Protocol: TCP |
Protocol: HTTPS Port: 443 Transfer Protocol: TCP |
|
06.41.3 * Provide the missing. Protocol: HTTPS Port: 443 Transfer Protocol: ? |
Protocol: HTTPS Port: 443 Transfer Protocol: TCP |
|
06.42.1 * Provide the missing. Protocol: ? Port: 137 (name services), 138 (datagram services), 139 (session services) Transfer Protocol: TCP (139) and UDP (137 and 138) |
Protocol: NetBIOS Port: 137 (name services), 138 (datagram services), 139 (session services) Transfer Protocol: TCP (139) and UDP (137 and 138) |
|
06.42.2 * Provide the missing. Protocol: NetBIOS Port: ? Transfer Protocol: TCP (139) and UDP (137 and 138) |
Protocol: NetBIOS Port: 137 (name services), 138 (datagram services), 139 (session services) Transfer Protocol: TCP (139) and UDP (137 and 138) |
|
06.42.3 * Provide the missing. Protocol: NetBIOS Port: 137 (name services), 138 (datagram services), 139 (session services) Transfer Protocol: ? |
Protocol: NetBIOS Port: 137 (name services), 138 (datagram services), 139 (session services) Transfer Protocol: TCP (139) and UDP (137 and 138) |
|
06.43.1 * Provide the missing. Protocol: ? Port: 110 Transfer Protocol: TCP |
Protocol: POP3 Port: 110 Transfer Protocol: TCP |
|
06.43.2 * Provide the missing. Protocol: POP3 Port: ? Transfer Protocol: TCP |
Protocol: POP3 Port: 110 Transfer Protocol: TCP |
|
06.43.3 * Provide the missing. Protocol: POP3 Port: 110 Transfer Protocol: ? |
Protocol: POP3 Port: 110 Transfer Protocol: TCP |
|
06.44.1 * Provide the missing. Protocol: ? Port: 143 Transfer Protocol: TCP |
Protocol: IMAP Port: 143 Transfer Protocol: TCP |
|
06.44.2 * Provide the missing. Protocol: IMAP Port: ? Transfer Protocol: TCP |
Protocol: IMAP Port: 143 Transfer Protocol: TCP |
|
06.44.3 * Provide the missing. Protocol: IMAP Port: 143 Transfer Protocol: ? |
Protocol: IMAP Port: 143 Transfer Protocol: TCP |
|
06.45.1 * Provide the missing. Protocol: ? Port: 25 Transfer Protocol: TCP |
Protocol: SMTP Port: 25 Transfer Protocol: TCP |
|
06.45.2 * Provide the missing. Protocol: SMTP Port: ? Transfer Protocol: TCP |
Protocol: SMTP Port: 25 Transfer Protocol: TCP |
|
06.45.3 * Provide the missing. Protocol: SMTP Port: 25 Transfer Protocol: ? |
Protocol: SMTP Port: 25 Transfer Protocol: TCP |
|
06.46.1 * Provide the missing. Protocol: ? Port: 5060/5061 Transfer Protocol: : UDP |
Protocol: SIP Port: 5060/5061 Transfer Protocol: : UDP |
|
06.46.2 * Provide the missing. Protocol: SIP Port: ? Transfer Protocol: : UDP |
Protocol: SIP Port: 5060/5061 Transfer Protocol: : UDP |
|
06.46.3 * Provide the missing. Protocol: SIP Port: 5060/5061 Transfer Protocol: : ? |
Protocol: SIP Port: 5060/5061 Transfer Protocol: : UDP |
|
06.47.1 * Provide the missing. Protocol: ? Port: 2427/2727 Transfer Protocol: Both UDP and TPC |
Protocol: MGCP (Media Gateway Control Protocol) Port: 2427/2727 Transfer Protocol: Both UDP and TPC |
|
06.47.2 * Provide the missing. Protocol: MGCP (Media Gateway Control Protocol) Port: ? Transfer Protocol: Both UDP and TPC |
Protocol: MGCP (Media Gateway Control Protocol) Port: 2427/2727 Transfer Protocol: Both UDP and TPC |
|
06.47.3 * Provide the missing. Protocol: MGCP (Media Gateway Control Protocol) Port: 2427/2727 Transfer Protocol: ? |
Protocol: MGCP (Media Gateway Control Protocol) Port: 2427/2727 Transfer Protocol: Both UDP and TPC |
|
06.48.1 * Provide the missing. Protocol: ? Port: 5004/5005 Transfer Protocol: UDP |
Protocol: RTP Port: 5004/5005 Transfer Protocol: UDP |
|
06.48.2 * Provide the missing. Protocol: RTP Port: ? Transfer Protocol: UDP |
Protocol: RTP Port: 5004/5005 Transfer Protocol: UDP |
|
06.48.3 * Provide the missing. Protocol: RTP Port: 5004/5005 Transfer Protocol: ? |
Protocol: RTP Port: 5004/5005 Transfer Protocol: UDP |
|
06.49.1 * Provide the missing. Protocol: ? Port: 1720 Transfer Protocol: TCP |
Protocol: H.323 Port: 1720 Transfer Protocol: TCP |
|
06.49.2 * Provide the missing. Protocol: H.323 Port: ? Transfer Protocol: TCP |
Protocol: H.323 Port: 1720 Transfer Protocol: TCP |
|
06.49.3 * Provide the missing. Protocol: H.323 Port: 1720 Transfer Protocol: ? |
Protocol: H.323 Port: 1720 Transfer Protocol: TCP |
|
07.01 Which of the following addresses is not allowed on the Internet? A. 191.192.168.1 B. 191.168.169.254 C. 172.32.255.0 D. 172.31.12.251 |
Which of the following addresses is not allowed on the Internet? A. 191.192.168.1 B. 191.168.169.254 C. 172.32.255.0 D. 172.31.12.251 (The Class B private address range is 172.16.0.0 through 172.31.255.255. The given address is in the private range, and thus not publically accessible.) |
|
07.02 A host automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server? A. 169.254.0.X with a mask of 255.255.255.0 B. 169.254.X.X with a mask of 255.255.0.0 C. 169.254.X.X with a mask of 255.255.255.0 D. 169.255.X.X with a mask of 255.255.0.0 |
A host automatically configured with an address from which of the following ranges indicates an inability to contact a DHCP server? A. 169.254.0.X with a mask of 255.255.255.0 B. 169.254.X.X with a mask of 255.255.0.0 (Given address in the APIPA range: 169.254.0.0 through 169.254.255.255.) C. 169.254.X.X with a mask of 255.255.255.0 D. 169.255.X.X with a mask of 255.255.0.0 |
|
07.03 Which statement regarding private IP addresses is most accurate? A. Private addresses cannot be used in intranets that require routing. B. Private addresses must be assigned by a registrar or ISP. C. A remote host across the Internet cannot ping your host if it has a private address. D. Private addresses can only be used by a single administrative domain. |
Which statement regarding private IP addresses is most accurate? A. Private addresses cannot be used in intranets that require routing. B. Private addresses must be assigned by a registrar or ISP. C. A remote host across the Internet cannot ping your host if it has a private address. D. Private addresses can only be used by a single administrative domain. |
|
07.04 Which of the following is a valid Class A address? A. 191.10.0.1 255.0.0.0 B. 127.10.0.1 255.0.0.0 C. 128.10.0.1 255.0.0.0 D. 126.10.0.1 255.0.0.0 |
Which of the following is a valid Class A address? A. 191.10.0.1 255.0.0.0 B. 127.10.0.1 255.0.0.0 C. 128.10.0.1 255.0.0.0 D. 126.10.0.1 255.0.0.0 |
|
07.05 Which of the following is a valid Class B address? A. 10.1.1.1 255.255.0.0 B. 126.1.1.1 255.255.0.0 C. 129.1.1.1 255.255.0.0 D. 192.168.1.1 255.255.0.0 |
Which of the following is a valid Class B address? A. 10.1.1.1 255.255.0.0 B. 126.1.1.1 255.255.0.0 C. 129.1.1.1 255.255.0.0 D. 192.168.1.1 255.255.0.0 |
|
07.06 Which of the following describes a broadcast address? A. All network bits are on (1s). B. All host bits are on (1s). C. All network bits are off (0s). D. All host bits are off (0s). |
Which of the following describes a broadcast address? A. All network bits are on (1s). B. All host bits are on (1s). C. All network bits are off (0s). D. All host bits are off (0s). |
|
07.07 Which of the following is a Layer 2 broadcast? A. FF:FF:FF:EE:EE:EE B. FF:FF:FF:FF:FF:FF C. 255.255.255.255 D. 255.0.0.0 |
Which of the following is a Layer 2 broadcast? A. FF:FF:FF:EE:EE:EE B. FF:FF:FF:FF:FF:FF C. 255.255.255.255 D. 255.0.0.0 |
|
07.08 In a class C IP address, how long is the network address? A. 8 bits B. 16 bits C. 24 bits D. 32 bits |
In a class C IP address, how long is the network address? A. 8 bits B. 16 bits C. 24 bits D. 32 bits |
|
07.09 Which of the following is true when describing a unicast address? A. Packets addressed to a unicast address are delivered to a single interface. B. These are your typical publicly routable addresses, just like regular publicly routable addresses in IPv4. C. These are like private addresses in IPv4 in that they are not meant to be routed. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Which of the following is true when describing a unicast address? A. Packets addressed to a unicast address are delivered to a single interface. B. These are your typical publicly routable addresses, just like regular publicly routable addresses in IPv4. C. These are like private addresses in IPv4 in that they are not meant to be routed. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
|
07.10 A host is rebooted and you view the IP address that it was assigned. The address is 169.123.13.34. Which of the following happened? A. The host received an APIPA address B. The host received a multicast address C. The host received a public address D. The host received a private address |
A host is rebooted and you view the IP address that it was assigned. The address is 169.123.13.34. Which of the following happened? A. The host received an APIPA address B. The host received a multicast address C. The host received a public address (Remember that APIPA, the other possibility, is 169.254.X.X.) D. The host received a private address |
|
07.11 An IPv4 addresses uses 32 bits. How many bits is an IPv6 address? A. 64 B. 128 C. 192 D. 255 |
An IPv4 addresses uses 32 bits. How many bits is an IPv6 address? A. 64 B. 128 C. 192 D. 255 |
|
07.12 12. Which of the following is true when describing a multicast address? A. Packets addressed to a unicast address from a multicast address are delivered to a single interface. B. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. C. It identifies multiple interfaces and is delivered to only one address. This address can also be called one-to-one-of-many. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
12. Which of the following is true when describing a multicast address? A. Packets addressed to a unicast address from a multicast address are delivered to a single interface. B. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. C. It identifies multiple interfaces and is delivered to only one address. This address can also be called one-to-one-of-many. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
|
07.13 Which of the following is true when describing an anycast address? A. Packets addressed to a unicast address from an anycast address are delivered to a single interface. B. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. C. This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one-to-one-of-many. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
Which of the following is true when describing an anycast address? A. Packets addressed to a unicast address from an anycast address are delivered to a single interface. B. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. C. This address identifies multiple interfaces, and the anycast packet is delivered to only one address. This address can also be called one-to-one-of-many. D. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. |
|
07.14 You want to ping the loopback address of your local host. Which two addresses could you type? A. ping 127.0.0.1 B. ping 0.0.0.0 C. ping ::1 D. trace 0.0.::1 |
You want to ping the loopback address of your local host. Which two addresses could you type? A. ping 127.0.0.1 B. ping 0.0.0.0 C. ping ::1 D. trace 0.0.::1 |
|
07.15 What two statements about IPv6 addresses are true? A. Leading zeros are required. B. Two colons (::) are used to represent successive hexadecimal fields of zeros. C. Two colons (::) are used to separate fields. D. A single interface will have multiple IPv6 addresses of different types. |
What two statements about IPv6 addresses are true? A. Leading zeros are required. B. Two colons (::) are used to represent successive hexadecimal fields of zeros. C. Two colons (::) are used to separate fields. D. A single interface will have multiple IPv6 addresses of different types. |
|
07.16 What two statements about IPv4 and IPv6 addresses are true? A. An IPv6 address is 32 bits long, represented in hexadecimal. B. An IPv6 address is 128 bits long, represented in decimal. C. An IPv4 address is 32 bits long, represented in decimal. D. An IPv6 address is 128 bits long, represented in hexadecimal. |
What two statements about IPv4 and IPv6 addresses are true? A. An IPv6 address is 32 bits long, represented in hexadecimal. B. An IPv6 address is 128 bits long, represented in decimal. C. An IPv4 address is 32 bits long, represented in decimal. D. An IPv6 address is 128 bits long, represented in hexadecimal. |
|
07.17 Which of the following is a Class C network address? A. 10.10.10.0 255.255.255.0 B. 127.0.0.1 255.255.255.0 C. 128.0.0.0 255.255.0.0 D. 192.255.254.0 255.255.255.0 |
Which of the following is a Class C network address? A. 10.10.10.0 255.255.255.0 B. 127.0.0.1 255.255.255.0 C. 128.0.0.0 255.255.0.0 D. 192.255.254.0 255.255.255.0 |
|
07.18 Which two of the following are private IP addresses? (Choose two.) A. 12.0.0.1 B. 168.172.19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.168.24.43 |
Which two of the following are private IP addresses? (Choose two.) A. 12.0.0.1 B. 168.172.19.39 C. 172.20.14.36 D. 172.33.194.30 E. 192.168.24.43 |
|
07.19 Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? A. 10.10.1.1 B. 168.16.1.1 C. 234.1.1.1 D. 172.30.1.1 |
Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? A. 10.10.1.1 B. 168.16.1.1 C. 234.1.1.1 D. 172.30.1.1 |
|
07.20 Which of the following is an invalid IP address for a host? A. 10.0.0.1 B. 128.0.0.1 C. 224.0.0.1 D. 172.0.0.1 |
Which of the following is an invalid IP address for a host? A. 10.0.0.1 B. 128.0.0.1 C. 224.0.0.1 (This is a Class D multicast address, and thus not a vaild host address.) D. 172.0.0.1 |
|
07.21 Class A valid address range? |
First Valid Host Address: 1.0.0.1 Last Valid Host Address: 126.255.255.254 |
|
07.22 Class A private address range? |
First Valid Address: 10.0.0.1 Last Valid Address: 10.255.255.254 |
|
07.23 Loopback address? |
127.0.0.1 (or IPv6 ::1) |
|
07.24 Class B valid address range? |
First Valid Host Address: 128.0.0.1 Last Valid Host Address: 191.255.255.254 |
|
07.25 Class B private address range? |
First Valid Address: 172.16.0.1 Last Valid Address: 172.31.255.254 |
|
07.26 Class C valid address range? |
First Valid Host Address: 192.0.0.1 Last Valid Host Address: 223.255.255.254 |
|
07.27 Class C private address range? |
First Valid Address: 192.168.0.1 Last Valid Address: 192.168.255.254 |
|
07.28 APIPA address range? |
First Valid Address: 169.254.0.0 Last Valid Address: 169.254.255.255 (or. 169.254.X.Y) |
|
07.29 Class D (multicast) address range? |
First Valid Network: 224.0.0.1 Last Valid Network: 239.255.255.254 |
|
07.30 Class E (reserved) address? |
First Valid Network: 240.0.0.1 Last Valid Network: 255.255.255.254 |
|
08.01 2^0 = ? |
2^0 = 1 |
|
08.02 2^1 = ? |
2^1 = 2 |
|
08.03 2^2 = ? |
2^2 = 4 |
|
08.04 2^3 = ? |
2^3 = 8 |
|
08.05 2^4 = ? |
2^4 = 16 |
|
08.06 2^5 = ? |
2^5 = 32 |
|
08.07 2^6 = ? |
2^6 = 64 |
|
08.08 2^7 = ? |
2^7 = 128 |
|
08.09 2^8 = ? |
2^8 = 256 |
|
08.10 2^9 = ? |
2^9 = 512 |
|
08.11 2^10 = ? |
2^10 = 1,024 |
|
08.16 What is decimal for the binary 10000000? |
128 |
|
08.17 What is decimal for the binary 11000000? |
192 |
|
08.18 What is decimal for the binary 11100000? |
224 |
|
08.19 What is decimal for the binary 11110000? |
240 |
|
08.20 What is decimal for the binary 11111000? |
248 |
|
08.21 What is decimal for the binary 11111100? |
252 |
|
08.22 What is decimal for the binary 11111110? |
254 |
|
08.23 What is decimal for the binary 11111111? |
255 |
|
08.24 Formula for the number of subnets given a CIDR notation? |
Two steps: 1) n = number borrowed bits (ie. a class C subnet 255.255.255.224 /27 burrows 3 bits since 11100000 (base2) = 224 (base 10)) 2) s = number of subnets = 2^n |
|
08.25 Formula for number of hosts in a subnet? |
Two steps: 1) n = number of hostbits 2) h = 2^n - 2 |
|
08.26 Formula for subnet block-size? |
Two steps: 1) x = decimal value of “borrowed bits” 2) b = block-size = 256-x |
|
08.27 How do you determine the first available subnet given a 255.W.X.Y /n subnet? |
Set all “burrowed binary bits” and 'host bits" to 0 |
|
08.101 What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? A. 14 B. 15 C. 16 D. 30 E. 31 F. 62 |
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? A. 14 B. 15 C. 16 D. 30 E. 31 F. 62 |
|
08.107 On a network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? A. /27 B. /28 C. /29 D. /30 E. /31 |
On a network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? A. /27 B. /28 C. /29 D. /30 (Note that a /30 has 2 host bits, allowing 2^2-2 = 4-2 = 2 hosts. The /31 would have no hosts since 2^1-2 = 2-2 - 0.) E. /31 |
|
08.108 On which of the following devices are you most likely to be able to implement NAT? A. Hub B. Ethernet switch C. Router D. Bridge |
On which of the following devices are you most likely to be able to implement NAT? A. Hub B. Ethernet switch C. Router D. Bridge |
|
08.109 You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to router interface? A. 6 B. 8 C. 30 D. 62 E. 126 |
You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to router interface? A. 6 B. 8 C. 30 D. 62 E. 126 |
|
08.110 When configuring the IP settings on a computer on one subnet to ensure it can communicate with a computer on another subnet, which of the following is desirable? A. Configure the computer with the same default gateway as the other computer. B. Configure the computer with the same subnet mask as the other computer. C. Configure the computer with a default gateway that matches the IP address of the router’s interface that is attached to the same subnet as the computer. D. Configure the computer with a subnet mask that matches the IP address of the router’s interface that is attached to the same subnet as the computer. |
When configuring the IP settings on a computer on one subnet to ensure it can communicate with a computer on another subnet, which of the following is desirable? A. Configure the computer with the same default gateway as the other computer. B. Configure the computer with the same subnet mask as the other computer. C. Configure the computer with a default gateway that matches the IP address of the router’s interface that is attached to the same subnet as the computer. D. Configure the computer with a subnet mask that matches the IP address of the router’s interface that is attached to the same subnet as the computer. |
|
08.112 What is the highest usable address on the 172.16.1.0/24 network? A. 172.16.1.255 B. 172.16.1.254 C. 172.16.1.253 D. 172.16.1.23 |
What is the highest usable address on the 172.16.1.0/24 network? A. 172.16.1.255 B. 172.16.1.254 C. 172.16.1.253 D. 172.16.1.23 |
|
08.117 If you are forced to replace a router that has failed to the point that you are unable to access its current configuration to aid in setting up interface addresses on the new router, which of the following can you reference for assistance? A. The default-gateway settings on computers from each subnet that the old router interconnected. B. The router’s configuration that was periodically cached on the DHCP server. C. The router’s configuration that was periodically cached on the DNS server. D. The new router will auto-configure itself with the correct settings. |
If you are forced to replace a router that has failed to the point that you are unable to access its current configuration to aid in setting up interface addresses on the new router, which of the following can you reference for assistance? A. The default-gateway settings on computers from each subnet that the old router interconnected. B. The router’s configuration that was periodically cached on the DHCP server. C. The router’s configuration that was periodically cached on the DNS server. D. The new router will auto-configure itself with the correct settings. |
|
08.120 You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. What technology will you use to implement a solution? A. PAT B. VPN C. DNS D. LANs |
You have one IP address provided from your ISP with a /30 mask. However, you have 300 users that need to access the Internet. What technology will you use to implement a solution? A. PAT (PAT will give you approximately 65,000 hosts) B. VPN C. DNS D. LANs |
|
09.01 Which is not a routing protocol? A. RIP B. RIPv2 C. RIPv3 D. EIGRP |
Which is not a routing protocol? A. RIP B. RIPv2 C. RIPv3 (Version 3 it is actually called RIPng… for “next generation) D. EIGRP |
|
09.02 Which of these best describes dynamic routing? A. All network addresses must be hand-typed into the routing table. B. Only a portion of the network address must be hand-typed into the routing table. C. Routing tables are updated automatically when changes occur in the network. D. A and B |
Which of these best describes dynamic routing? A. All network addresses must be hand-typed into the routing table. B. Only a portion of the network address must be hand-typed into the routing table. C. Routing tables are updated automatically when changes occur in the network. D. A and B |
|
09.03 Which is true regarding dynamic routing? A. Static routes are best in large networks thus better to use then dynamic routing protocols. B. Static routes are automatically added to the routing table, dynamic routes must be added by hand C. You must use a DNS and WINS server when configuring dynamic routing D. Dynamic routes are automatically added to the routing table |
Which is true regarding dynamic routing? A. Static routes are best in large networks thus better to use than dynamic routing protocols. B. Static routes are automatically added to the routing table, dynamic routes must be added by hand C. You must use a DNS and WINS server when configuring dynamic routing D. Dynamic routes are automatically added to the routing table |
|
09.04 Which of the following is true for MAC addresses? A. MAC addresses are never local on the LAN and always pass through a router. B. MAC addresses are always local on the LAN and never go through or past a router. C. MAC addresses will always be the IP address of Fa0/0 interface. D. None of the above |
Which of the following is true for MAC addresses? A. MAC addresses are never local on the LAN and always pass through a router. B. MAC addresses are always local on the LAN and never go through or past a router. C. MAC addresses will always be the IP address of Fa0/0 interface. D. None of the above |
|
09.05 The time required by protocols to update their forwarding tables after changes have occurred are called what? A. Name resolution B. Routing C. Convergence D. ARP resolution |
The time required by protocols to update their forwarding tables after changes have occurred are called what? A. Name resolution B. Routing C. Convergence D. ARP resolution |
|
09.06 What command would be used to view the ARP cache on your host? A. C:\ >show ip route B. C:\ >show ip arp C. C:\ >show protocols D. C:\ >arp -a |
What command would be used to view the ARP cache on your host? A. C:\ >show ip route B. C:\ >show ip arp C. C:\ >show protocols D. C:\ >arp -a |
|
09.07 What happens when a router receives a packet for a network that isn’t listed in the routing table? A. It forwards the packet to the next available router. B. It holds the packet until the address is updated in the routing table. C. The router will use RIP to inform the host that it can’t send the packet. D. None of the above |
What happens when a router receives a packet for a network that isn’t listed in the routing table? A. It forwards the packet to the next available router. B. It holds the packet until the address is updated in the routing table. C. The router will use RIP to inform the host that it can’t send the packet. D. None of the above (This traffic is discarded since based on what the router knows based on the routing table, the destination is unreachable.) |
|
09.08 Which of the following is not a Distance Vector protocol? A. RIPv1 B. RIPv2 C. OSPF D. IGRP |
Which of the following is not a Distance Vector protocol? A. RIPv1 B. RIPv2 C. OSPF (OSPF is a link state protocol.) D. IGRP |
|
09.09 Which two of the following are Link State protocols? A. RIPv1 B. RIPv2 C. OSPF D. IS-IS E. IGRP |
Which two of the following are Link State protocols? A. RIPv1 B. RIPv2 C. OSPF D. IS-IS E. IGRP |
|
09.10 Which of the following is a hybrid routing protocol? A. RIPv2 B. EIGRP C. IS-IS D. IGRP |
Which of the following is a hybrid routing protocol? A. RIPv2 B. EIGRP C. IS-IS D. IGRP |
|
09.11 What does the acronym IGRP stand for? A. Interior Gateway Routing Protocol B. Inside Gateway Redundancy Protocol C. Interior Group Reliability Protocol D. Interior Gateway Redundancy Protocol |
What does the acronym IGRP stand for? A. Interior Gateway Routing Protocol B. Inside Gateway Redundancy Protocol C. Interior Group Reliability Protocol D. Interior Gateway Redundancy Protocol |
|
09.12 What EGP protocol is used on the Internet? A. GGP B. EGP C. BGP D. IGP |
What EGP protocol is used on the Internet? A. GGP B. EGP C. BGP D. IGP |
|
09.13 What are the two categories of IGP protocols? A. Link State B. Static C. Distance Vector D. EGP |
What are the two categories of IGP protocols? A. Link State B. Static C. Distance Vector D. EGP |
|
09.14 What two pieces of information does a router require to make a routing decision? A. Destination network (address) B. Destination MAC address C. Application layer protocol D. Neighbor router |
What two pieces of information does a router require to make a routing decision? A. Destination network (address) B. Destination MAC address C. Application layer protocol D. Neighbor router (If the MAC is not on a local LAN, the router forwards the packet to its neighbor). |
|
09.15 Where does a frame have to carry a packet if it is destined for a remote network? A. Default gateway B. Neighbor host C. Switch D. Hub |
Where does a frame have to carry a packet if it is destined for a remote network? A. Default gateway B. Neighbor host C. Switch D. Hub |
|
09.16 Where along the IP routing process does a packet get changed? A. Router B. Host A C. Destination device D. Host B |
Where along the IP routing process does a packet get changed? A. Router B. Host A C. Destination device (The frame gets changed along the way -- for example, a router changes the sender information to its own -- but the packet remains unchanged, destined only for the selected recipient.) D. Host B |
|
09.17 When all routers in a network agree about the path from one point to another, the network is said to be what? A. Dynamic B. Static C. Secure D. Converged |
When all routers in a network agree about the path from one point to another, the network is said to be what? A. Dynamic B. Static C. Secure D. Converged |
|
09.18 What type of request must a client send if it does not know the destination MAC address? A. ARP broadcast B. Multicast C. ICMP redirect D. Reverse ARP |
What type of request must a client send if it does not know the destination MAC address? A. ARP broadcast B. Multicast C. ICMP redirect D. Reverse ARP |
|
09.19 You need to perform maintenance on a router in your corporate office. It is important that the network does not go down. What can you do to accomplish your goal? A. Configure BGP on the router B. Implement NAT on the router C. Configure a static route on the router that temporarily re-routes traffic through another office D. Implement convergence on the router |
You need to perform maintenance on a router in your corporate office. It is important that the network does not go down. What can you do to accomplish your goal? A. Configure BGP on the router B. Implement NAT on the router C. Configure a static route on the router that temporarily re-routes traffic through another office D. Implement convergence on the router |
|
09.20 When are you most likely to see a request-timed-out message? A. When an unknown error has occurred B. When you have used the arp -a command incorrectly C. When a known error has occurred D. When you are using a hybrid routing protocol |
When are you most likely to see a request-timed-out message? A. When an unknown error has occurred (If the error is a known error, the code would be “destination unreachable.” B. When you have used the arp -a command incorrectly C. When a known error has occurred D. When you are using a hybrid routing protocol |
|
09.21 True/False: RIPv2 is a hybrid routing protocol. |
False. RIP and RIPv2 are both Distance Vector protocols. |
|
09.22 True/False: RIPv1 is a Link State routing protocol. |
False. RIP and RIPv2 are both Distance Vector protocols. |
|
09.23 True/False: EIGRP is a non-proprietary routing protocol. |
True. EIGRP was proprietary, but Cisco opened up EIGRP for other vendors to use in 2013. |
|
09.24 True/False: EIGRP is harder to configure than RIP. |
False. EIGRP has basically the same configuration as RIP. |
|
09.25 You need a routing protocol that can be run in a very large network with routers from multiple vendors. What routing protocol would be your best choice? |
RIP does not work well in large networks, so OSPF would be the best answer. EIGRP is not the answer because it only runs on routers manufactured to use it -- mostly Cisco and a handful of other adopters). |
|
09.26 Which type of routing would you configure on a router if you needed to use as little router overhead and CPU processing as possible? |
Static routing |
|
09.27 You are trying to reach a server on another subnet. What will be the destination hardware address of a frame sent from your host? |
The MAC address of your default gateway (router) |
|
09.28 You are trying to reach a server on another subnet. What will be the destination IP address of a packet sent from your host? |
The IP address of the server |
|
09.29 A server has received a frame from your remote host. What will be the destination hardware address of the frame? |
The MAC address of the router sending the frame to the server |
|
09.30 A server has received a packet from your remote host. What will be the destination IP address of the packet? |
The IP address of the server |
|
10.01 Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.) A. RIPv1 B. IGRP C. EIGRP D. OSPF E. BGP F. RIPv2 |
Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.) A. RIPv1 B. IGRP C. EIGRP D. OSPF E. BGP F. RIPv2 |
|
10.02 Which of the following are considered distance-vector routing protocols? (Choose two.) A. OSPF B. RIP C. RIPv2 D. IS-IS |
Which of the following are considered distance-vector routing protocols? (Choose two.) A. OSPF B. RIP C. RIPv2 D. IS-IS |
|
10.03 Which of the following are considered link-state routing protocols? (Choose two.) A. OSPF B. RIP C. RIPv2 D. IS-IS |
Which of the following are considered link-state routing protocols? (Choose two.) A. OSPF B. RIP C. RIPv2 D. IS-IS |
|
10.04 Which of the following is considered a hybrid routing protocol? A. OSPF B. BGP C. RIPv2 D. IS-IS E. EIGRP |
Which of the following is considered a hybrid routing protocol? A. OSPF B. BGP C. RIPv2 D. IS-IS E. EIGRP |
|
10.05 Why would you want to use a dynamic routing protocol instead of using static routes? A. Less overhead on the router B. Dynamic routing is more secure C. Dynamic routing scales to larger networks D. The network runs faster |
Why would you want to use a dynamic routing protocol instead of using static routes? A. Less overhead on the router B. Dynamic routing is more secure C. Dynamic routing scales to larger networks D. The network runs faster (FYI -- Networks may actually run slower using dynamic routing since the processor devotes some processor time and interface bandwidth to converge routing tables.) |
|
10.06 Which of the following is a vendor-specific routing protocol? A. IGRP B. OSPF C. RIPv1 D. EIGRP E. IS-IS F. None of the above |
Which of the following is a vendor-specific routing protocol? A. IGRP B. OSPF C. RIPv1 D. EIGRP E. IS-IS F. None of the above (Cisco made EIGRP available in early 2013.) |
|
10.07 RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to reconverge. Which can you implement to improve convergence time on the network? A. Replace RIP with static routes B. Update RIP to RIPv2 C. Update RIP to OSPF using Link State D. Replace RIP with BGP as an exterior gateway protocol |
RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to reconverge. Which can you implement to improve convergence time on the network? A. Replace RIP with static routes B. Update RIP to RIPv2 C. Update RIP to OSPF using Link State D. Replace RIP with BGP as an exterior gateway protocol |
|
10.08 What is the administrative distance of OSPF? A. 90 B. 100 C. 110 D. 120 |
What is the administrative distance of OSPF? A. 90 B. 100 C. 110 D. 120 |
|
10.09 Which of the following protocols will advertise routed IPv6 networks? A. RIP B. RIPng C. OSPFv2 D. EIGRPv3 |
Which of the following protocols will advertise routed IPv6 networks? A. RIP B. RIPng C. OSPFv2 D. EIGRPv3 |
|
10.10 What is the difference between static and dynamic routing? A. You use static routing in large, scalable networks B. Dynamic routing is used by a DNS server C. Dynamic routes are added automatically D. Static routes are added automatically |
What is the difference between static and dynamic routing? A. You use static routing in large, scalable networks B. Dynamic routing is used by a DNS server C. Dynamic routes are added automatically D. Static routes are added automatically |
|
10.11 Which routing protocol has a maximum hop count of 15? A. RIPv1 B. IGRP C. EIGRP D. OSPF |
Which routing protocol has a maximum hop count of 15? A. RIPv1 B. IGRP C. EIGRP D. OSPF |
|
10.12 Which of the following describes routing convergence? A. The time it takes for your VPN to connect B. The time required by protocols to update their forwarding tables after changes have occurred C. The time required for IDS to detect an attack D. The time required by switches to update their link status and go into forwarding state |
Which of the following describes routing convergence? A. The time it takes for your VPN to connect B. The time required by protocols to update their forwarding tables after changes have occurred C. The time required for IDS to detect an attack D. The time required by switches to update their link status and go into forwarding state |
|
10.13 What routing protocol is typically used to connect AS’s on the Internet? A. IGRP B. RIPv2 C. BGP D. OSPF |
What routing protocol is typically used to connect AS’s on the Internet? A. IGRP B. RIPv2 C. BGP D. OSPF |
|
10.14 RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more efficiently. What type of transmission does RIPv2 use to accomplish this task? A. Broadcasts B. Multicasts C. Telecast D. None of the above |
RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so more efficiently. What type of transmission does RIPv2 use to accomplish this task? A. Broadcasts B. Multicasts C. Telecast D. None of the above |
|
10.15 Which routing protocols have an administrative distance of 120? (Choose two.) A. RIPv1 B. RIPv2 C. EIGRP D. OSPF |
Which routing protocols have an administrative distance of 120? (Choose two.) A. RIPv1 B. RIPv2 C. EIGRP (AD of 90) D. OSPF (AD of 110) |
|
10.16 Which of the following routing protocols uses AS-Path as one of the methods to build the routing tables? A. OSPF B. IS-IS C. BGP D. RIP E. EIGRP |
Which of the following routing protocols uses AS-Path as one of the methods to build the routing tables? A. OSPF B. IS-IS C. BGP D. RIP E. EIGRP |
|
10.17 Which IPv6 routing protocol uses UDP port 521? A. RIPng B. EIGRPv6 C. OSPFv3 D. IS-IS |
Which IPv6 routing protocol uses UDP port 521? A. RIPng B. EIGRPv6 C. OSPFv3 D. IS-IS |
|
10.18 What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.) A. DUAL table B. Neighbor table C. Topology table D. Successor route |
What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.) A. DUAL table B. Neighbor table C. Topology table (EIGRP holds 3 tables in memory: Routing, Topology and Neighbor. Routing is share, but each router builds their Neighbor and Topology tables using hello packets.) D. Successor route (This is “sort of” -- the successor route is stored in the Routing Table. But it is not listed as correct in the book.) |
|
10.19 Which is true regarding EIGRP successor routes? A. Successor routes are saved in the neighbor table. B. Successor routes are stored in the DUAL table. C. Successor routes are used only if the primary route fails. D. A successor route is used by EIGRP to forward traffic to a destination. |
Which is true regarding EIGRP successor routes? A. Successor routes are saved in the neighbor table. B. Successor routes are stored in the DUAL table. C. Successor routes are used only if the primary route fails. D. A successor route is used by EIGRP to forward traffic to a destination. (Successor routes are preferred routes in EIGRP. Think "successful." They are stored in the routing table.) |
|
10.20 Which of the following uses only hop count as a metric to find the best path to a remote network? A. RIP B. EIGRP C. OSPF D. BGP |
Which of the following uses only hop count as a metric to find the best path to a remote network? A. RIP B. EIGRP C. OSPF D. BGP |
|
10.21 The default administrative distance of RIP is___________________? |
120 |
|
10.22 The default administrative distance of EIGRP is___________________? |
90 |
|
10.23 The default administrative distance of RIPv2 is___________________? |
120 |
|
10.24 The default administrative distance of a static route is___________________? |
1 |
|
10.25 What is the version or name of RIP that is used with IPv6? |
RIPng (Next Generation). |
|
10.26 What is the version or name of OSPF that is used with IPv6? |
OSPFv3 |
|
10.27 What is the version or name of EIGRP that is used with IPv6? |
EIGRPv6 |
|
10.28 When would you use BGP? |
To connect two autonomous systems (ASs) together |
|
10.30 Is BGP considered link state or distance vector? |
Neither. BGP is a path vector protocol. |