Posts

Showing posts from May, 2022

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following does a router normally use when making a decision about routing TCP/IP packets? A: Destination IP address Explanation: Routers compare the packet’s destination IP address to the router’s IP routing table, making a match and using the forwarding instructions in the matched route to forward the IP packet.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the following protocols and features requires PC1 to learn information from some other server device? A: DNS

NTC/362: Fundamentals of Networking

 Q: Which OSI encapsulation term can be used instead of the term frame? A: Layer 2 PDU

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is true about a LAN-connected TCP/IP host and its IP routing (forwarding) choices? A: The host sends packets to its default gateway if the destination IP address is in a different subnet than the host.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following terms describe Ethernet addresses that can be used to send one frame that is delivered to multiple devices on the LAN? Each correct answer represents a complete solution. Choose all that apply. A: Broadcast address, Multicast address

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet with Router2. When PC1 sends data to PC2, which of the following is true? A: Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following protocols are examples of TCP/IP data-link layer protocols? Each correct answer represents a complete solution. Choose all that apply. A: Ethernet, PPP

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following protocols are examples of TCP/IP transport layer protocols? Each correct answer represents a complete solution. Choose all that apply. A: TCP, UDP

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond the ISO standard HDLC? A: Type

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following are the advantages of using multimode fiber for an Ethernet link instead of UTP or single-mode fiber? Each correct answer represents a complete solution. Choose all that apply. A: To extend the link beyond 100 meters while keeping initial costs as low as possible, To make use of an existing stock of LED-based SFP/SFP+ modules

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-to-point service between these two routers only, as a Layer 2 Ethernet service. Which of the following are most likely to be true about this WAN? Each correct answer represents a complete solution. Choose all that apply. A: R1 will forward data-link frames to R2 using an Ethernet header/trailer, R1 will connect to a physical Ethernet link with the other end of the cable connected to a device at the WAN service provider point of presence.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: The process of TCP on one computer marking a TCP segment as segment 1, and the receiving computer then acknowledging the receipt of TCP segment 1 is an example of what? A: Same-layer interaction

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is true about Ethernet crossover cables for Fast Ethernet? A: Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following terms is used specifically to identify the entity created when encapsulating data inside data-link layer headers and trailers? A: Frame

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is true about the Ethernet FCS field? A: It resides in the Ethernet trailer, not the Ethernet header.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data-link header and trailer, is an example of what? A: Data encapsulation

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling? A: 1000BASE-T

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Each answer lists two types of devices used in a 100BASE-T network. If these devices were connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable? Each correct answer represents a complete solution. Choose all that apply. A: Wireless access point (Ethernet port) and switch, Router and hub, PC and switch

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following are true about the format of Ethernet addresses? Each correct answer represents a complete solution. Choose all that apply. A: The part of the address that holds this manufacturer's code is called the OUI, Each manufacturer puts a unique OUI code into the first half of the address, Each manufacturer puts a unique OUI code into the first 3 bytes of the address.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: In the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). Which of the following is true regarding the use of Ethernet in this LAN? A: Only the devices that use cables are using Ethernet.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is true about the CSMA/CD algorithm? A: Collisions can happen, but the algorithm defines how computers should notice a collision and how to recover.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following are functions of a routing protocol? Each correct answer represents a complete solution. Choose all that apply. A: Advertising known routes to neighboring routers, Learning routes and putting those routes into the routing table for routes advertised to the router by its neighboring routers

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: The process of HTTP asking TCP to send some data and making sure that it is received correctly is an example of what? A: Adjacent-layer interaction

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: How many seconds does the Cisco IOS  ping  command wait to receive a reply? A: 2 seconds Explanation: When  ping  sends its five echo messages (by default), the command sends each message and waits up to two seconds for a reply. If a reply is heard within that timeout period, the command lists an !. If there is no echo reply within those two seconds, the command will respond with a period.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: PC 1 was just powered on and has not sent any frames into the network. PC 1 has a statically configured IP address and the default gateway is configured as the Router Fa0/0 interface. PC 1 sends a PING to 172.16.0.33 and gets a reply. What dynamic ARP entries should appear in the ARP cache of the various devices in the network? A: 0000.1111.1111 in the router's ARP table Explanation: ARP is a local function, and PC 1 will ARP for the MAC address of the router’s Fa0/0 interface only, and through that process, the router will learn PC 1’s MAC address, too. The router will ARP for PC 3’s MAC address, as well. PC 1 will not know the remote PC 3’s MAC address, and PC 3 will not know the remote PC 1’s MAC address.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: A BSSID looks identical to which other network parameter? A: A MAC address Explanation: A BSSID is identical to the AP’s wireless radio MAC address, along with an index to the wireless LAN that is being carried over the BSS. A BSSID cannot be a text string, whereas an SSID can. A BSSID is neither an IP address nor a frequency in GHz.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: Refer to the exhibit. An engineer is tasked with configuring a floating static route on R1. The faster path toward the 3000::/64 network should be prioritized over the other using an administrative distance of 10 versus an administrative distance of 20 for the slower path. Which command would correctly configure the higher priority route using an IPv6 next-hop address?Exhibit A:  ipv6 route 3000::/64 2000::2 10 Explanation: A floating static route uses the same format as all IPv6 static routes but explicitly adds an administrative distance. In this case, the command to configure would be  ipv6 route 3000::/64 2000::2 10 . The second command would be  ipv6 route 3000::/64 2001::2 20 . Note, however, that the interface is used for the primary route must go down for the second route to be inserted into the routing table.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: When you are configuring EtherChannel between two switches, what are the two channel-group modes that you can configure if one end is using PAgP? A: Desirable, Auto Explanation: When you are using the dynamic EtherChannel protocol PAgP, the two channel-group modes you can use are desirable and auto. When you are using the EtherChannel protocol LACP, the two modes that you can use when one side is active are active and passive.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: OSPF utilizes _________ to organize topology information. A: LSAs Explanation: OSPF organizes topology information using link-state advertisements (LSA) and the link-state database (LSDB).

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: To connect a Cisco wireless LAN controller to a wired network, which of the following would you use? Assume that this connection will carry traffic to and from APs. A: Distribution system port Explanation: The distribution system ports on a WLC are used to connect to the switched network infrastructure and carry data to and from APs. The console port is not used because it is a serial connection dedicated to WLC management. The service port is a network connection but is used only for out-of-band management. There is no AP data port. It is a fictitious concept.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: What would be the status of a port due to a mismatched STP cost? A: Err-disabled Explanation: EtherChannel misconfiguration occurs when there is a mismatch in channel parameters, which results in the following message: %PM-4-ERR_DISABLE: channel-misconfig error (STP) error detected on Po1, putting E0/2 in err-disable state Therefore, from the output above, you can see that when misconfigured, the physical (member) interface is put into the err-disable state.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following addresses could be used as private IP addresses? Each correct answer represents a complete solution. Choose all that apply. A: 10.13.0.11 , 172.31.0.3 Explanation: The ranges for the private IP address space is 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255, and 192.168.0.0–192.168.255.255. All the other addresses are not within the private address range, and 127.0.0.0–127.255.255.255 is reserved as a local address space.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: A local user (Bob) has been created on the switch and the following output is from the same switch: SW1#show crypto key mypubkey rsa % Key pair was generated at: 04:04:02 UTC Mar 2 2012 Key name: http://SW1.example.com Storage Device: not specified Usage: General Purpose Key Key is not exportable. Key Data: 30819F30 0D06092A 864886F7 0D010101 05000381 8D003081 89028181 009A57C6 78938149 5740DCE8 4C29BF0B 6A75E3A2 30899991 14C2F5CE 5EE96D32 3BD16F27 ADB93E31 76EE584F AEE9B437 D52C31A1 38655F4B B44EF4AD 7D9BF6C4 585F0AE2 EF1D526E 6D45BB2C E16733CE DDDB3385 9D41A234 2A2F2FB4 D018623E 1315AB88 30FEC410 61701A3A 35B7FBBE 366CA098 E4FE207B 77AAA99F 6BC1E440 99020301 0001 % Key pair was generated at: 04:04:03 UTC Mar 2 2012 Key name: http://SW1.example.com.server Temporary key Usage: Encryption Key Key is not exportable. Key Data: 307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00B39B93 1CA95CF8 53A6C686 DB890DB9 884007E4 F9DCB7D0 27240DE0 2A2...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: How many bits are used for subnetting in a subnet, based on this sample address: 125.168.32.99 255.255.128.0? A: 9 bits Explanation: The address beginning with 125 is a Class A address and has a default mask of 255.0.0.0 (or 8 bits). In the example from the question, the mask implies a total of 17 combined network and subnet bits, which consists of 8 network and 9 subnet bits. Using a mask with 10 subnet bits, along with a Class A network, means the mask is 255.255.192.0, which does not match the mask in the question. Using a mask with 11 subnet bits, along with a Class A network, means the mask is 255.255.224.0, which does not match the mask in the question. Using a mask with 12 subnet bits, along with a Class A network, means the mask is 255.255.240.0, which does not match the mask in the question.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is considered to offer the  best  and most robust security for wireless users? A: WPA3 Explanation: The highest WPA version is always considered to be the most robust and more secure suite. Therefore, WPA3 is the correct choice. WPA is not correct because it is commonly used to denote WPA1.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Router R1’s Fa0/0 interface was up and working, and was then configured as follows: R1(config)# interface fa0/0 R1(config-if)# mac-address 0011.2233.4455 R1(config-if)# ipv6 address 2001:1234::1/64 A:2001:1234::1 , FE80::211:22FF:FE33:4455 Explanation:The global unicast address of 2001:1234::1 would be exactly as configured. The link-local address would be FE80::211:22FF:FE33:4455, using the modified EUI-64 format, with the 7th bit of the MAC address inverted. Regarding the other answers, FE80::11:22FF:FE33:4455 doesn’t have the 7th bit from the MAC address inverted. The other global address of 2001:1234::211:22FF:FE33:4455 uses the EUI 64 format, and in the output of the configuration, we specified the whole IP without the modified EUI-64 option for the host ID. Two of the addresses beginning with FF are multicast groups that were joined (solicited node multicast groups, based on the two IP addresses in use by the router).

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which Cisco IOS command would correctly route traffic destined for the 2300:1451:2463:242d:e3ab:35e4:1563:0001/64 network out the GigabitEthernet0/1 interface? A:  ipv6 route 2300:1451:2463:242d::/64 Gi0/1 Explanation: The correct syntax for an IPv6 static route to an interface is  ipv6 route   prefix/prefix-length interface . In this case, the correct command would be  ipv6 route 2300:1451:2463:242d::/64 Gi0/1 .

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Given a mask of 255.255.255.0, which of the following statements are true? Each correct answer represents a complete solution. Choose all that apply. A: This is not the default mask for a Class A address, There could be 254 possible hosts on the subnet with this mask. Explanation: Using 24 bits for network addressing, and leaving only 8 for host addressing, there could be up to 254 possible hosts (2 ^ 8 –2 = 254). This mask would be a nondefault mask for a Class A or B network. This is the default mask for a Class C address. For a Class B network, using 8 more bits for subnets, you could create 256 additional subnets (2 ^ 8 = 256).

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: In a split-MAC wireless architecture, the traditional autonomous AP functions are split between which of the following entities? Each correct answer represents a complete solution. Choose all that apply. A: A wireless LAN controller, A lightweight AP Explanation: The split-MAC architecture splits or distributes traditional AP functions between a lightweight AP and a wireless LAN controller. Wireless user devices are not involved in split-MAC at all. RADIUS servers can integrate with a wireless network to provide security functions like authentication, authorization, and accounting, but cannot become part of the split-MAC wireless architecture.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following succinctly describes the specific address range typically used by IANA for global IPv6 addresses? A: 2000::/3 Explanation: All IPv6 global routing prefixes assigned by IANA began with 2 or 3. (This address range can be written succinctly as prefix 2000::/3. This means that the first 3 bits must be 001). In hex, the first group of numbers will be in the range of 2000 through 3fff. 2000::/2 indicates that the first 2 bits must be 00, without any control over the third bit (which needs to be on). 000:db8::/16 is an address range targeted for use in documentation (so that we don’t use other people’s addresses as examples contained in training and other generic purposes). FE80 are link-local addresses.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: What is the purpose of configuring multiple SVI interfaces on a layer 3 switch? A: To support routing between the subnets residing on local VLANs Explanation: Each SVI gives a switch to a layer-3 interface that connects internally to some VLAN. Configuring multiple SVIs on a single layer 3 switch gives that switch multiple layer-3 interfaces connected to the various VLANs so that the switch can route IP traffic between the subnets that reside in those VLANs. SVI interfaces do nothing in support of layer 2 forwarding functions. An SVI is often used to configure an IP address on a switch to allow remote management, but the question asks why a switch would need multiple SVIs, and to support remote management, a single SVI is needed.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Of the Cisco IOS commands that are typically used to view interface IP addressing information, which one shows only the address but not the mask information configured for an interface? A:  show ip interface brief Explanation: A number of different commands can be used to view IP addressing configuration information about the interfaces on a router. Some of them include  show ip interface ,  show ip interface brief ,  show interfaces ,  show protocols , and  show running-config . One of the most commonly used is the  show ip interface brief  command because it gives a nice abridged output of the configured IP addresses along with the status of each of the router’s interfaces; however, this command does not include any information about the configured subnet mask for the interfaces.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following is true about the classful address 128.44.2.2? A: The network ID is 128.44.0.0. Explanation: Based on the first octet being 128, it is a Class B address, and as a result, the network ID is the first 16 bits of 128.44.0.0. The broadcast address of the classful network 128.44.0.0/16 would be 128.44.255.255, and the first valid host of that same classful network would be 128.44.0.1.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which options do  not  prevent a directly connected OSPF speaker from becoming a neighbor? A: OSPF process ID mismatch Explanation: The OSPF process IDs on neighboring routers do not have to match. However, the area number, the subnet mask, the subnet in which the routers' IP addresses exist, and the Dead and Hello timers must match.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which protocol is used by Cisco IOS's version of the  traceroute  command for outbound messages? A: UDP Explanation: One important thing to note when using the Cisco IOS version of the  traceroute  command is that it uses UDP for outbound messages. This can affect the result compared to the result of a Windows host, which uses ICMP for these outbound messages. It is possible that features (e.g., ACL's) across the network could be handling ICMP or UDP differently, causing different results.

NTC/362: Fundamentals of Networking

 Q: Which answers list an Ethernet-based WAN service? Each correct answer represents a complete solution. Choose all that apply. A: Ethernet over MPLS (EoMPLS), Ethernet Line service Explanation: Ethernet WAN services include Ethernet Line (E-Line) and Ethernet LAN (E-LAN) services. The term EoMPLS refers to how a service provider can provide an Ethernet-based service using an MPLS network internal to the SP. Answers D and C are incorrect because they list two terms that are used to describe a leased-line and point-to-point WAN link.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which IP addresses could use the subnet 151.192.8.48/29? Each correct answer represents a complete solution. Choose all that apply. A: 151.192.8.54, 151.192.8.50 Explanation: The range of addresses for the subnet 151.192.8.48/29 is 151.192.8.49 to 151.192.8.54. All other addresses are outside of that range and are not appropriate for that subnet.

NTC/362: Fundamentals of Networking

 Q: A user at host 10.3.0.1 powers on the device and issues a  ping 10.3.0.2  command. Which of the following are true about the ARP request sent by the host 10.3.0.1? Each correct answer represents a complete solution. Choose all that apply. A: Host 10.3.0.1 is attempting to learn a Layer 2 address, The device processing the request will reply with a unicast frame from host 10.3.0.2 to 10.3.0.1. Explanation: Because the host just powered up, when it pings 10.3.0.2, the host first needs to use Address Resolution Protocol (ARP) to learn the MAC address used by host 10.3.0.2 (making one answer correct.) The host encapsulates the ARP Request message in an Ethernet broadcast frame, causing all hosts in the LAN to de-encapsulate and process the frame (making one answer incorrect.) The ARP Reply, sent by host 10.3.0.2, is sent directly to host 10.3.0.1 in a unicast Ethernet frame. Finally, note that the  ping 10.3.0.2  command does not use any hostname, so it does not...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which OSPF message type is used to actually send the LSAs between neighbors? A: Link-State Update Explanation: The OSPF Link-State Update (LSU) message type is used to send requested LSAs between neighbors; the Link-State Request (LSR) message type is used to request those LSAs that are specifically missing from a router’s link-state database (LSDB). The OSPF Database Description (DD) message type is used to exchange a list of known LSAs between neighbors; it is from this list that a router learns which LSAs it does not know.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: If not configured with the  router-id  command, what is the next option a Cisco router uses to choose its OSPF router-ID? A: Use the IP address of the active loopback interface with the highest IP address. Explanation: The router first considers only the active loopback interfaces, comparing their IP addresses, and chooses the highest IP address value. Those facts identify the one correct answer. Note that if no loopback interfaces exist, the router uses similar logic, checking all other active interfaces and choosing the highest IP address.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: Refer to the exhibit; this output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line, listing details about the fields inside the respective header. You will need to remember some parts of the various headers and compare those concepts to this output, to answer this question. In describing line A from the graphic with an OSI model perspective, which is the correct label to be used in combination with that PDU? A: Frame Explanation: At Layer 2 of the OSI model, the protocol data units (PDUs), including their header information at that layer, are called frames. Segments refer to PDUs at Layer 4. Packets refer to PDUs at Layer 3. Bits are related to the Physical Layer, which is Layer 1. A PDU represents the...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following answers are true about the rules for abbreviating IPv6 addresses? Each correct answer represents a complete solution. Choose all that apply. A: Multiple consecutive groups of 0000 (between two colons) can be replaced by ::, in one location only in the address, Leading 0s within a set of 4 hex digits between colons can be removed. Explanation: Leading 0s, within a grouping, can be omitted each time they appear in an IPv6 address. Consecutive groups of 0000s can be omitted and represented by a ::, but only one time per IPv6 address (normally used on the section that has the greatest amount of consecutive groups of 0s). Abbreviating an IPv6 address doesn’t make it backward-compatible with IPv4 addresses. Trailing 0s are placeholders, which can’t be removed without changing the rest of the bit values in the respective grouping. The :: technique, if used more than a single time in an IPv6 address, would be ambiguous and isn’...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Refer to the download; which options are true about the OSPF configuration? R2#show ip ospf interface FastEthernet0/0 is up, line protocol is up Internet Address 20.20.20.1/24, Area 0, Attached via Network Statement Process ID 10, Router ID 20.20.20.1, Network Type BROADCAST, Cost: 1 Topology-MTID Cost Disabled Shutdown Topology Name 0 1 no no Base Transmit Delay is 1 sec, State BDR, Priority 1 Designated Router (ID) 20.20.20.2, Interface address 20.20.20.2 Backup Designated router (ID) 20.20.20.1, Interface address 20.20.20.1 Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5 oob-resync timeout 40 Hello due in 00:00:01 Supports Link-local Signaling (LLS) Cisco NSF helper support enabled IETF NSF helper support enabled Index 1/1, flood queue length 0 Next 0x0(0)/0x0(0) Last flood scan length is 1, maximum is 2 Last flood scan time...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which fields are in the IPv4 header? Each correct answer represents a complete solution. Choose all that apply. A: Time to Live, DS, Protocol Explanation: The IPv4 header includes: Version Length DS Packet length Identification Flags Fragment offset Time to Live Protocol Header checksum Source and destination IP Answer A is incorrect. TCP and UDP heads include both a source and destination port field, but the IP header does not include port numbers.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: When looking at an address using classless addressing rules, how do you know the length of the prefix? A: By looking at the number of bits that are binary 1 in the mask Explanation: The subnet mask subdivides the IP addresses in a subnet into two parts: the prefix or subnet part and the host part. The prefix part identifies the addresses that reside in the same subnet because all IP addresses in the same subnet have the same value in the prefix part of their addresses. The class of the address determines the default mask, including the number of default host bits available when a default mask is used.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: In the internetwork shown in the exhibit, R1 is the central site router, and R2 is a typical remote office router. The network manager dictates that the remote routers should all use a default route to forward packets back to the central site, while the central site router should use a static route to forward packets to each remote office's LAN subnet. As soon as the network manager has correctly implemented this design, you connect to R1 and R2 using Telnet and issue the  show ip route  command on each router. Which of the following answers list output you should see in the routers? A: On R2: S* 0.0.0.0/0 [1/0] via S0/0/0 , On R1: S 172.17.6.64 [1/0] via 172.16.1.2 Explanation: On R1: as a central site router, R1 needs a route for R2's specific LAN subnet of 172.17.6.64/26, which can be derived from the information in the exhibit. Of the two answers for router R1, only one lists 172.17.6.64, with a correct next hop of R2's serial I...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Consider the following output: R1#show ipv6 int fa 0/0 FastEthernet0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::200:11FF:FE11:1111 No Virtual link-local address(es): Global unicast address(es): 2001:12:32::1, subnet is 2001:12:32::/64 Joined group address(es): FF02::1 FF02::2 FF02::5 FF02::6 FF02::9 FF02::A FF02::1:FF00:1 FF02::1:FF11:1111 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ICMP unreachables are sent ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds (using 42973) ND advertised reachable time is 0 (unspecified) ND advertised retransmit interval is 0 (unspecified) ND router advertisements are sent every 200 seconds ND router advertisements live for 1800 seconds ND advertised default router preference is Medium Hosts use stateless autoconfig for addresses. R1# What can be determined based on the output provided? E...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Refer to the exhibit. If autonegotiation of the speed and duplex between Host B and the switch works, what would be the resulting speed and duplex?Exhibit A: 100, Full Explanation: When the autonegotiation of both speed and duplex happens, two rules are followed: The two devices use the fastest speed supported by both devices The two devices use the best duplex setting, which is full duplex In this case, Host B is shown as having a 10/100 NIC, with the switch using 10/100/1000 ports. As a result, both use 100 Mbps and both use full duplex.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: Refer to the exhibit; which Cisco IOS command would be configured on R1’s Gi0/0.300 interface so that it handles all non-marked traffic from VLAN 300?Exhibit Explanation: The  encapsulation dot1q   vlan  command is used to assign a specific router subinterface to a trunk VLAN. The addition of the  native  parameter at the end of the command assigns all non-marked traffic to that interface; this VLAN is referred to as the native VLAN. In this scenario, R1’s Gi0/0.300 interface is configured with VLAN 300 and handles all non-marked traffic when configured with the  encapsulation dot1q 300 native  command.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: What is the name of the new RSTP port state that replaces the STP disabled and blocking states? A: Discarding Explanation: When implementing the Rapid Spanning Tree Protocol (RSTP), one of the changes is that the previous disabled and blocking states are replaced by a single discarding state.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which two Wireless LAN Controller (WLC) deployment models provide the  best  scalability to large deployments? A: Unified, Cloud Explanation: Two of the WLC deployment models, unified (centralized) and cloud, provide the most scalability, with the unified model using a stand-alone WLC and the cloud model running the WLC in a private cloud data center. Answers A and B are incorrect. The embedded model runs the WLC inside an access LAN switch, while mobility express takes a similar approach by running the WLC software on one of the APs. Both the embedded and mobility express models support smaller environments with a few hundred APs.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: What is the default aging time for MAC table entries that have not been used? A: 300 seconds Explanation: A switch will remove entries that have not been used for 300 seconds.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Using a cable to connect a workbench PC to the console port of the switch, you notice that the switch is nonresponsive. A co-worker mentioned that the same PC was used with that same switch earlier in the day. The SYST LED on the switch is green. Considering the given scenario, what should a technician do? Each correct answer represents a complete solution. Choose all that apply. A: Make sure the cable is a rollover cable, Verify the correct physical connections have been made. Explanation: A rollover cable is required for console access. The UTP rollover cable has RJ-45 connectors on each end, with pin 1 on one end connected to pin 8 on the other, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5. Making sure the cable is connected to the console port, and not a different RJ-45 jack, is also important. Crossover and straight-through cables are not correct for access to the console port. The serial line of the console port is slow compared t...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which IPv6 addresses represent a global IPv6 address? Each correct answer represents a complete solution. Choose all that apply. A: 2001:db8:85a3::8a2e:370:7334, 2a10::abd:3eb2:1234 Explanation: 2001:db8:85a3::8a2e:370:7334 and 2a10::abd:3eb2:1234 are the global IPv6 address. Global addresses make up most of the IPv6 address space. Originally, IANA reserved prefix 2000::/3 for global unicasts (that is, all addresses that begin with 2 or 3), but have since revised the definition to include all addresses not otherwise reserved. Answers A and B are incorrect. FF02::a is a multicast address and fe80::3af:fe24:4567:890a is a link-local address. Note that IANA also reserves all addresses with the prefix FE80::/10 as link-local addresses, and all addresses that begin with prefix FF00::/8 as multicast addresses.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: A device uses MAC address 000c.42b9.46ee. Which part of the MAC address indicates the originating networking equipment vendor? A: 000c.42 Explanation: The first six hex characters (24 bits) of a MAC address are assigned to the equipment manufacturer, and the second six hex characters are assigned by that vendor. That first half is called the Organizationally Unique Identifier.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: When a wireless frame is sent to an AP, which address is used as the Layer 2 destination address? A: The BSSID Explanation: The BSSID is used as the destination MAC address because the frame is destined for the AP. Answers D, A, and B are incorrect. It would not make sense to use the sender’s own MAC address as the destination. The sending device’s IP address cannot be used either because the Layer 2 destination address in the frame must be in the format of a MAC address. The AP’s Ethernet MAC address should not be used because it represents the address of the wired port and not the wireless radio.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: How does a switch build its MAC address table? A: By listening to incoming frames and examining the source MAC address Explanation: A switch will build its MAC address table by listening to incoming frames and comparing the source MAC address to its address table. If the source MAC is not seen in the table, an entry will be added that will map the MAC address to the port. The switch will not examine the outgoing frames to build its MAC address table.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: Refer to the exhibit; this output comes from a network analysis tool. It lists a group of lines for each header in a PDU, with the frame (data link) header at the top, then the next header (typically the IP header), and so on. The first line in each section has a gray highlight, with the indented lines below each heading line, listing details about the fields inside the respective header. You will need to remember some parts of the various headers and compare those concepts to this output, to answer this question. Based on the packet capture shown, which of the following is true? A: Line C corresponds to the Transport layer of the TCP/IP model. Explanation: The Transmission Control Protocol (TCP) operates at Layer 4 of the OSI model and provides a variety of services between two host computers, including connection establishment and termination, flow control, error recovery, and segmentation of large data blocks into smaller parts for transmi...

NTC/362: Fundamentals of Networking

Image
 Q: The AP in the exhibit supports three separate wireless virtual LANs. What type of link needs to be used between the AP and the LAN switch because this is an autonomous AP?Exhibit A: Trunk port Explanation: The autonomous AP as a layer 2 device, forwarding frames from the wireless LANs to the wired Ethernet. To support multiple VLANs on the wireless side, the AP then needs a VLAN trunk to connect to the switch. Answers D, C, and B are incorrect. The switch could not use an access port, because that configuration would support only a single VLAN. The switch would not use a routed port because the autonomous AP does not act as a layer 3 router. WLC port is not a type of switch port at all.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Your switch is in an air-conditioned locked wiring closet on the first floor of the building. There is a card reader on the door that allows only authorized personnel in the room. On Thursday, you used SSH to connect to this switch and issued the following commands: Switch(config)# hostname SW1 SW1(config)# end SW1# logout The following Monday morning, you telnet into the switch, and run the show version command, and see the following output: Switch#show version Cisco IOS Software, C3560 Software (C3560-IPSERVICESK9-M), Version 12.2(53)SE2, RELEASE SOFTWARE (fc3) Technical Support: Support - Cisco Support and Downloads – Documentation, Tools, Cases Copyright (c) 1986-2010 by Cisco Systems, Inc. Compiled Wed 21-Apr-10 05:33 by prod_rel_team Image text-base: 0x01000000, data-base: 0x02E00000 ROM: Bootstrap program is a C3560 boot loader BOOTLDR: C3560 Boot Loader (C3560-HBOOT-M) Version 12.2(44)SE5, RELEASE SOFTWARE (fc1) Switch uptime is 1 day...

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: How many usable hosts are there per subnet if you have the address 192.168.8.0 with a subnet mask of 255.255.255.240? A: 14 Explanation: A subnet mask of 255.255.255.240 (/28) defines 28 prefix bits and 4 host bits. The number of hosts in the subnet is, therefore, 24 - 2 = 14.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: You are troubleshooting connectivity issues with a router. You type in the command show ip interface brief. You notice that the status is “administratively down” and the protocol is “down.” What is the meaning of this information? A: The interface has a shutdown command configured on it. Explanation: When you notice that the status of an interface is “administratively down,” the interface has a shutdown command configured on it. If the status is “down” and the protocol is “down,” there is a physical layer problem. If the status is “up” and the protocol is “down,” there is a Layer 2 problem. If the status is “up” and the protocol is “up,” the interface is functioning.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Which of the following answers are valid abbreviations of address 2000:0001:0002:0003:0000:0000:1110:2200? Each correct answer represents a complete solution. Choose all that apply. A: 2000:1:2:3:0:0:1110:2200, 2000:1:2:3::1110:2200 Explanation: IPv6 addresses can be abbreviated as follows: Leading 0s inside one quartet (one set of hex digits between colons): Remove the leading 0s. A single quartet of 0s’ (0000): Abbreviate as a single 0. Multiple consecutive quartets of all 0’s: Abbreviate as a double colon (::). In this case, two consecutive quartets of all 0’s exist, so those two quartets can be abbreviated as ::. Several quartets have trailing 0’s, which cannot be removed. The two correct answers, which show correct abbreviations, abbreviate the two consecutive all 0 quartets in two ways. One uses the optimal choice of ::, while the other uses a single 0 for each quartet. Answers C and B are incorrect. The two incorrect answers are invali...

NTC/362: Fundamentals of Networking

 Q: An engineer logs in to a device and wants to ensure that all of the commands that he enters are temporarily recorded in the history buffer. He is configuring a number of repetitive commands and wants to reduce the number of times these commands need to be typed. Which command would be used to ensure this behavior? A: R1(config-line)#history size num-of-lines, R1#terminal history size num-of-lines Explanation: Two main commands are used to configure the command history on a Cisco IOS device: terminal history size num-of-lines and history size num-of-lines. The terminal history size num-of-lines command is used in enable (EXEC) mode and configures the size of the command history buffer for the current session only. The history size num-of-lines command is used in line configuration mode (all line types) to configure the size of the command history buffer for all sessions connecting through that line.

NTC/362: Fundamentals of Networking

Image
 Q: In the network shown in the exhibit, all switches are powered on, and all relevant VLANs have been configured correctly and are working. Based on the output in the download, which of the following statements is true about switch SW2? A: Three interfaces are trunking. Explanation: The show version command states that this switch has 24 FastEthernet and two Gigabit Ethernet interfaces. The show vlan brief command lists the two Gigabit interfaces, plus only 21 FastEthernet interfaces. This command omits interfaces when an interface is currently operating as a trunk. This command also omits a non-trunking interface if its assigned VLAN has been deleted (unconfigured), but the question states that all required VLANs have been configured and are working. From these facts, you can conclude that three interfaces (Fa0/22, 23, and 24) are trunking.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Four OSPF routers connect to the same LAN. In a new election after all routers have been rebooted, which router wins the DR election? A: R4, router-id 4.4.4.4, priority 1 Explanation: First, the DR election always chooses the BDR to become the DR if a BDR exists. However, the question states that all the routers just rebooted, so there should be no BDR to take over for the DR. As worded, the question creates a scenario where all routers compete equally to become DR. The routers choose the router with the highest OSPF interface priority, and if a tie, they then use the router with the highest router ID. In this case, the answers show routers with different priorities, so no ties exist based on priority. As a result, R1, with the highest priority (4), becomes the DR.

NTC/362: Fundamentals of Networking

 NTC/362: Fundamentals of Networking Q: Robust wireless encryption is based on which of the following algorithms? A: AES Explanation: The most robust wireless security methods use the Counter/CBC-MAC Protocol (CCMP) and the Galois/Counter Mode Protocol (GCMP), which are both based on the AES algorithm. WEP does encrypt but is not robust and has been deprecated. DES is also a legacy encryption method usually used in IPsec virtual private networks (VPNs) but has been deprecated. IPsec can involve encryption algorithms but is not one itself. Instead, IPsec is a framework for VPNs.

NTC/362: Fundamentals of Networking

Image
 NTC/362: Fundamentals of Networking Q: The exhibit shows a diagram of a small switched network. All switches use layer 2 switching and no layer 3 switching. The diagram identifies the root switch (switch SW1), and all root ports (RP) and designated ports (DP) for VLAN 10. All switches have the spanning-tree mode rapid-pvst command configured. The answers list ports that are neither root port nor designated port. Choose the answers that list an RSTP port role that is meaningful for that port in this topology. A: SW3's F0/4 could be an RSTP alternate port, SW4's G0/1 could be an RSTP alternate port, SW4's F0/2 could be an RSTP backup port. Explanation: First, for the answers that mention “backup port,” note that for a port to act as a backup port, it must back up a designated port on that same switch. Also, that backup port must connect to the same collision domain. The collision domains include all the point-to-point links between switches and the links connected to the one...