Sei sulla pagina 1di 16

QUIZ 1

Which of the following statement is INCORRECT?

A switch populates the MAC address table based on destination MAC addresses.

The ________________ switches do not support features or options beyond those that
originally came with the switch.

Fixed configuration

Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.

 Daisy Chain

This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.

Distribution layer

The primary function of this layer is to provide network access to the user.

 Access layer 

A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.

Store-and-forward switching 

The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.

Modular configuration

Which of the following statement is INCORRECT?

When selecting the type of switch, rack units should always be considered. Rack units is the
number ports available in the network switch.

TRUE or FALSE. Cut-through switching has two primary characteristics: rapid frame
forwarding and invalid frame processing.

True 

A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.

Cut-through switch method


QUIZ 2

What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.

DHCP spoofing attack

In the Switch port LED status, if the LED is blinking green what is the status of switch?

There is activity and the port is sending or receiving data

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.

DHCP starvation attack 

A protocol that provides an encrypted connection to a remote device.

SSH

What is the command to configure the interface to automatically negotiate speed with the
connected device?

speed auto

What is the command used to determine the status of both physical and virtual interfaces
including IP address?

show ip interface brief 

Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?

Ip default-gateway 172.10.90.1

Global configuration mode is used to configure system globally, or to enter specific


configuration modes to configure specific elements such as protocols. What is the
command to enter global configuration mode?

configure terminal
This attack tries to crack a password on another device. The first phase of this attack starts
with the attacker using a list of common passwords and a program designed to try to
establish a Telnet session using each word on the dictionary list.

Brute force password attack

This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.

Network Time Protocol

PRELIM

Which of the following describes a VLAN?

VLANs are based on logical connections, instead of physical connections. 

Which of the following statement is INCORRECT?

A switch populates the MAC address table based on destination MAC addresses.

Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.

Daisy Chain 

Which of the following describes Dynamic Trunking Protocol?

Dynamic Trunking Protocol is disable by default.

Which of the following is NOT an element of converged network?

None of the choices 

What is the best practice relative to switch port modes?

Do not use the dynamic auto or dynamic desirable. 

A type of VLAN that is defined in the IEEE 802.1Q specification to maintain backward
compatibility with untagged traffic common to legacy LAN scenarios.

Native VLAN

This type of attack takes advantage of the way that hardware on most switches operates.
Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker
to embed a hidden 802.1Q tag inside the frame.

Double Tagging Attack 


This is a conduit for multiple VLANs between switches and routers.

Trunks

Routers support three packet-forwarding mechanisms. These are

Process, Fast, Cisco Express Forwarding

Which statement is true regarding routing metrics?

Routers compare metrics to determine the best path. 

This memory stores router bootup instructions and basic diagnostic software.

ROM

The following are VLAN best practices EXCEPT?

Join native VLAN to VLAN. 

Configurations are stored within a VLAN database file, called

 vlan.dat

In the Switch port LED status, if the LED is blinking green what is the status of switch?

There is an activity and the port is sending or receiving data.  

This is a security technology that determines which devices attached to switch ports can
respond to DHCP requests. This can be used to prevent unauthorized DHCP messages that
contain information such as IP address related data being provided to legitimate network
devices.

DHCP Snooping

In this attack, the attacker exploits a flaw in the Telnet server software running on the switch
that renders the Telnet service unavailable. This sort of attack prevents an administrator
from remotely accessing switch management functions. This can be combined with other
direct attacks on the network as part of a coordinated attempt to prevent the network
administrator from accessing core devices during the breach.

Telnet DoS attack 

This layer provide fault isolation and high-speed backbone onnectivity.

Core layer

What is one feature that distinguishes routers from Layer 2 switches?

Routers support a variety of interface types. Switches typically support Ethernet interfaces. 
A protocol that provides an encrypted connection to a remote device.

 SSH

TRUE or FALSE.
A host can be assigned it IP address information in one of the two way. Statically and
dynamically assigned. In statistically assigned IP address, the DHCP server provides a valid IP
address.

False

Which two statements correctly describe the components of a router?

1. RAM permanently stores the configuration file used during the boot sequence.
2. ROM contains diagnostics executed on hardware modules.
3. NVRAM stores a backup copy of the IOS used during the boot sequence.
4. Flash memory does not lose its contents during a reboot.
5. ROM contains the most current and most complete version of the IOS.
6. Flash contains boot system commands to identify the location of the IOS

2&4

Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?

Ip default-gateway 172.10.90.1 

What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.

DHCP spoofing attack

This layer is considered as the network backbone.

Core layer 

The following are switch port modes that DTP offers EXCEPT

Remote 
In this attack, the attacker exploits a flaw in the Telnet server software running on the switch
that renders the Telnet service unavailable. This sort of attack prevents an administrator
from remotely accessing switch management functions. This can be combined with other
direct attacks on the network as part of a coordinated attempt to prevent the network
administrator from accessing core devices during the breach.

Telnet DoS attack

Network infrastructure devices require IP addresses to enable remote management. Using


the device IP address, the network administrator can remotely connect to the device using
any of the following EXCEPT

None in the choices 

The ________________ switches do not support features or options beyond those that
originally came with the switch.

Fixed configuration 

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.

DHCP starvation attack 

To troubleshoot issues when a trunk is not forming or when VLAN leaking is occurring, what
command to be used to check whether the local and peer native VLANs match?

show interfaces trunk

What type of DHCP attack where in an attacker configures a fake DHCP server on the
network to issue DHCP addresses to clients. The normal reason for this attack is to force the
clients to use false Domain Name System (DNS) or Windows Internet Naming Service
(WINS) servers and to make the clients use the attacker, or a machine under the control of
the attacker, as their default gateway.

DHCP spoofing attack

This is a proprietary protocol that all Cisco devices can be configured to use. This checks
other Cisco devices that are directly connected, which allows the devices to auto-configure
their connection.

Cisco Discovery Protocol


The following are VLAN best practices EXCEPT?

None of the choices 

A switch forwarding method that begins the forwarding process after the destination MAC
address of an incoming frame and the egress port has been determined.

Cut-through switch method 

Which of the following is the command to specify a VLAN name? Name of VLAN is
employee.

name employee 

What is the status of the Port speed LED if the LED light is blinking green?

The port is operating at 1000 Mbps. 

In troubleshooting VLANs, what command should be used to check whether the port
belongs to the expected VLAN?

show vlan 

A switch forwarding method that makes a forwarding decision on a frame after it has
received the entire frame and then checked the frame for errors.

Store-and-forward switching 

If your routing table has a static, a RIP, and an IGRP route to the same network, which route
will be used to route packets by default?

Static route 

This is used between a network device and server or other device that is equipped with an
appropriate 802.1Q-capable NIC.

 Trunks 

The primary function of this layer is to provide network access to the user.

Access layer 

TRUE or FALSE.
Most network interfaces have one or two LED link indicators next to the interface. Typically,
a blinking green LED means a good connection.

False
Which of the following is NOT a characteristics of a network?

 All of the choices 

A network administrator configures the interface fa0/0 on the router R1 with the command
ip address 172.16.1.254 255.255.255.0. However, when the administrator issues the
command show ip route, the routing table does not show the directly connected network.
What is the possible cause of the problem?

The interface fa0/0 has not been activated. 

True of False. VLAN IDs 1 to 1005 are automatically created. ID 1 cannot be removed while
VLAN IDs 1002 to 1005 can still be removed.

False

This type of attack takes advantage of the way that hardware on most switches operates.
Most switches perform only one level of 802.1Q de- encapsulation, which allows an attacker
to embed a hidden 802.1Q tag inside the frame.

Double Tagging Attack 

What route would have the lowest administrative distance?

A directly connected network 

True or False.
The best way to prevent a basic switch spoofing attack is to turn off trunking on all ports,
except the ones that specifically require trunking.

True 

Stackable that are arranged one on top of the other with cables linking the switches in a
_____________ connection.

Daisy Chain 

A type of VLAN that is configured to carry user-generated traffic.

Data VLAN

This is a point-to-point link between two network devices that carries more than one VLAN.

 Trunks 

A collection of interconnected switches forms a _______________________.

Broadcast domain 
Telnet protocol by default uses Port ______.

23

SSH protocol by default uses Port ______.

 22 

A collection of interconnected switches forms a _______________________.

Broadcast domain 

Which of the following is an element of converged network?

All of the choices

What is the command to configure the interface to automatically negotiate speed with the
connected device?

speed auto 

Refer to the exhibit. A network administrator has configured R1 as shown. When the
administrator checks the status of the serial interface, the interface is shown as being
administratively down. What additional command must be entered on the serial interface of
R1 to bring the interface up?

no shutdown 

Which of the following is NOT a benefit of VLAN?


Dividing Layer 1,2 and 3 networks into multiple physical workgroups reduces unnecessary traffic on the
network and boosts performance. 

If your routing table has a static, a RIP, and an OSPF route to the same network, which route
will be used to route packets by default?

Static route 

What is the command to set the IP address (192.168.10.2) and subnet mask (255.255.0.0) for
specific Fast Ethernet interface?

 ip address 192.168.10.2 255.255.0.0 

To enable network access to a remote destination, what three pieces of information must be
configured on a host?
1. default gateway
2. hostname
3. DNS server address
4. DHCP server address
5. IP address
6. subnet mask

1, 5, 6 

True or False.
If two devices in the same VLAN have different subnet addresses, they cannot communicate.

True 

Which of the following describes Dynamic Trunking Protocol?

All of the choices 

Which of the following is the command to configure the switch default gateway with IP
address of 172.10.90.1?

ip default-gateway 172.10.90.1 

This is used between a network device and server or other device that is equipped with an
appropriate 802.1Q-capable NIC.

Trunks 

Which of the following is the command to configure the IP domain name of the network
(mycompany.com)

Ip domain-name mycompany.com 

Refer to the exhibit. According to the routing table, where will the router send a packet
destined for 10.1.5.65?
Network Interface Next-hop
10.1.1.0/24 e0 directly connected
10.1.2.0/24 e1 directly connected
10.1.3.0/25 s0 directly connected
10.1.4.0/24 s1 directly connected
10.1.5.0/24 e0 10.1.1.2
10.1.5.64/28 e1 10.1.2.2
10.1.5.64/29 s0 10.1.3.3
10.1.5.64/27 s1 10.1.4.4

10.1.3.3 
Which of the following is the command to configure the IP domain name of the network
(mycompany.com)

ip domain-name mycompany.com 

The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.

Modular configuration 

The network segments that share the same bandwidth between devices.

Collision domain 

What is the command used to determine the status of both physical and virtual interfaces
including IP address?

show ip interface brief 

Which two features are characteristics of flash memory?


1. Flash receives a copy of the IOS from RAM when a device is powered on.
2. Flash provides nonvolatile storage.
3. The contents of flash may be overwritten.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. The contents of flash may be lost during a power cycle.

 2 & 3 

The default VLAN for Cisco switches is ____________________.

VLAN 1 

This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.

Network Time Protocol

What type of DHCP attack where in an attacker floods the DHCP server with DHCP requests
to use all the available IP addresses that the DHCP server can issue. After these IP addresses
are issued, the server cannot issue any more addresses, and this situation produces a denial-
of-service (DoS) attackas new clients cannot obtain network access.

 DHCP starvation attack 


This attack tries to crack a password on another device. The first phase of this attack starts
with the attacker using a list of common passwords and a program designed to try to
establish a Telnet session using each word on the dictionary list.

Brute force password attack 

Which of the following describes a VLAN?

None of the choices

Which statement describe a characteristicof load balancing?

Load balancing allows a router to forward packets over multiple paths to the same
destination network.

If the port is assigned to the wrong VLAN, what command to be command to change the
VLAN membership on a particular port?

switchport access vlan 

Sometimes switch ports must manually have their duplex mode manually configured. This
duplex mode increases effective bandwidth by allowing both ends of a connection to
transmit and receive data simultaneously.

 Full duplex mode 

Which of the following statement is INCORRECT?


When selecting the type of switch, rack units should always be considered. Rack units is the number
ports available in the network switch. 

In troubleshooting VLANs, what command should be used to check whether the port
belongs to the expected VLAN?

show vlan 

Refer to the exhibit. A network administrator has configured R1 as shown. When the
administrator checks the status of the serial interface, the interface is shown as being
administratively down. What additional command must be entered on the serial interface of
R1 to bring the interface up?

no shutdown 

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?

It is a logical interface internal to the router.


Which two features are characteristics of flash memory?
1. The contents of flash may be lost during a power cycle.
2. Flash provides nonvolatile storage.
3. The contents of flash may be overwritten.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. Flash receives a copy of the IOS from RAM when a device is powered on.

2 & 3 

What is the command to create a VLAN with a valid VLAN ID number 30?

vlan 30 

Which two network parameters are used by EIGRP as metrics to select the best path to
reach a network?
1. Jitter
2. bandwidth
3. resiliency
4. hop count
5. delay
6. Confidentiality

2&5

This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.

Distribution layer

What is the status of the Port speed LED if the LED light is blinking green?

The port is operating at 1000 Mbps.

The extended range of VLAN ID is

between 1006 and 4094 

TRUE or FALSE. Store-and-forward switching has two primary characteristics that distinguish
it from cut-through: error checking and automatic buffering.

True 
Which two statements correctly describe the concepts of administrative distance and
metric?
1. The metric varies depending which Layer 3 protocol is being routed, such as IP.
2. A router first installs routes with higher administrative distances.
3. The value of the administrative distance can not be altered by the network administrator.
4. Routes with the smallest metric to a destination indicate the best path.
5. Administrative distance refers to the trustworthiness of a particular route.
6. The metric is always determined based on hop count.

4 & 5 

If an error occurs while loading the operating system because of missing or damaged
system files, the load loader can be access through a console connection. What button in
the switch you need to press while reconnecting the power cord?

Mode 

What are the 3 layers of the distribution access?

Access, distribution and Core layer 

This is the practice of inserting a VLAN ID into a packet header in order to identify which
VLAN (Virtual Local Area Network) the packet belongs to.

VLAN tagging 

The _____ switches typically come with different sized chassis that allow for the installation of
different numbers of line card.

Modular configuration

Which command is used to configure an IPv6 address on a router interface so that the
router will combine a manually specified network prefix with an automatically generated
interface identifier?

ipv6 address ipv6-address/prefix-length eui-64 

True or False.
When configuring a switch port on a Cisco switch, configure devices so that they send
tagged frames on the native VLAN.

False
This layer provides intelligent switching, routing, and network access policy functions to
access the rest of the network.

Distribution layer 

This layer provide fault isolation and high-speed backbone connectivity.

Core layer 

This is a proprietary protocol that all Cisco devices can be configured to use. This checks
other Cisco devices that are directly connected, which allows the devices to auto-configure
their connection.

Cisco Discovery Protocol

The default VLAN for Cisco switches is ____________________.

VLAN 1 

Configurations are stored within a VLAN database file, called

vlan.dat 

What is the best practice relative to switch port modes?

Do not use the dynamic auto or dynamic desirable. 

Global configuration mode is used to configure system globally, or to enter specific


configuration modes to configure specific elements such as protocols. What is the
command to enter global configuration mode?

configure terminal 

The network segments that share the same bandwidth between devices.

Collision domain 

This memory provides temporary storage for various applications and processes, including
the running IOS, the running configuration file, IP routing table, Ethernet ARP table.

RAM

This is a protocol that is used to synchronize the clocks of computer systems over packet-
switched, variable-latency data networks.

Network Time Protocol


The primary functions of a router are the following?
1. Packet switching
2. Flow control
3. Domain name resolution
4. Path selection
5. Microsegmentation

 1 & 4

Which of the statements describe characteristic of load balancing?

Load balancing allows a router to forward packets over multiple paths to the same
destination network.

A type of VLAN that is configured to carry user-generated traffic.

Data VLAN 

In the Switch port LED status, if the LED is blinking green what is the status of switch?

There is activity and the port is sending or receiving data. 

The ________________ switches do not support features or options beyond those that
originally came with the switch.

Fixed configuration 

Which of the following are 2 primary functions of a router?


1. Packet switching
2. Microsegmentation
3. Domain name resolution
4. Path selection
5. Flow control

2 & 4 

The primary function of this layer is to provide network access to the user.

Access layer 

What is the command to create a VLAN with a valid VLAN ID number 30?

Vlan 30

Potrebbero piacerti anche