Thursday, April 27, 2017

ITN Chapter 6 Exam



Introduction to Networks (Version 5.02) - ITN Chapter 6 Exam
1 Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?
   
the de-encapsulation of headers from lower layers   
the selection of paths for and direct packets toward the destination   
the ability to operate without regard to the data that is carried in each packet   
the ability to manage the data transport between processes running on hosts

2 What are two characteristics of IP? (Choose two.)
   
does not require a dedicated end-to-end connection   
operates independently of the network media   
retransmits packets if errors occur   
re-assembles out of order packets into the correct order at the receiver end   
guarantees delivery of packets

3 When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?
   
Connectionless acknowledgements are used to request retransmission.   
Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.   
Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.   
The best-effort delivery process guarantees that all packets that are sent are received.

4 Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
   
Time-to-Live   
Sequence Number   
Acknowledgment Number   
Differentiated Services

5 What IPv4 header field identifies the upper layer protocol carried in the packet?
   
Protocol   
Identification   
Version   
Differentiated Services

6 What is one advantage that the IPv6 simplified header offers over IPv4?
   
smaller-sized header   
little requirement for processing checksums   
smaller-sized source and destination IP addresses   
efficient packet handling

7 Refer to the exhibit.Which route from the PC1 routing table will be used to reach PC2?



8 Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?



FastEthernet0/0   
FastEthernet0/1   
Serial0/0/0   
Serial0/0/1

9 What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?
   
static route   
default route   
directly connected route   
dynamic route that is learned through EIGRP

10 What routing table entry has a next hop address associated with a destination network?
   
directly-connected routes   
local routes   
remote routes   
C and L source routes

11 Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?
   
It does not have an AUX port.   
It has three FastEthernet interfaces for LAN access.   
It has two types of ports that can be used to access the console.   
It does not require a CPU because it relies on Compact Flash to run the IOS.

12 Following default settings, what is the next step in the router boot sequence after the IOS loads from flash?
   
Perform the POST routine.   
Locate and load the startup-config file from NVRAM.   
Load the bootstrap program from ROM.   
Load the running-config file from RAM.

13 What are two types of router interfaces? (Choose two.)
   
SVI   
LAN   
DHCP   
Telnet   
WAN

14 Which two pieces of information are in the RAM of a Cisco router during normal operation? (Choose two.)
   
Cisco IOS   
backup IOS file   
IP routing table   
basic diagnostic software   
startup configuration file

15 A router boots and enters setup mode. What is the reason for this?
   
The IOS image is corrupt.   
Cisco IOS is missing from flash memory.   
The configuration file is missing from NVRAM.   
The POST process has detected hardware failure.

16 What is the purpose of the startup configuration file on a Cisco router?
   
to facilitate the basic operation of the hardware components of a device   
to contain the commands that are used to initially configure a router on startup   
to contain the configuration commands that the router IOS is currently using   
to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

17 Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
   
interface fastethernet 0/0   
line vty 0 4   
line console 0   
enable secret cisco   
login   
password cisco

18 Which characteristic describes an IPv6 enhancement over IPv4?​
   
IPv6 addresses are based on 128-bit flat addressing as opposed to IPv4 which is based on 32-bit hierarchical addressing.   
The IPv6 header is simpler than the IPv4 header is, which improves packet handling.   
Both IPv4 and IPv6 support authentication, but only IPv6 supports privacy capabilities.   
The IPv6 address space is four times bigger than the IPv4 address space.

19 Open the PT Activity. The enable password on all devices is cisco.
Perform the tasks in the activity instructions and then answer the question.
For what reason is the failure occurring?​
   
PC1 has an incorrect default gateway configured.   
SW1 does not have a default gateway configured.   
The IP address of SW1 is configured in a wrong subnet.​   
PC2 has an incorrect default gateway configured. 

Saturday, April 8, 2017

ITN Chapter 5 Exam

Introduction to Networks (Version 5.02) - ITN Chapter 5 Exam


1 What happens to runt frames received by a Cisco Ethernet switch?
   
The frame is dropped.   
The frame is returned to the originating network device.   
The frame is broadcast to all other devices on the same network.   
The frame is sent to the default gateway.

2 What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)
   
56 bytes   
64 bytes   
128 bytes   
1024 bytes   
1518 bytes

3 What statement describes Ethernet?
   
It defines the most common LAN type in the world.   
It is the required Layer 1 and 2 standard for Internet communication.   
It defines a standard model used to describe how networking works.   
It connects multiple sites such as routers located in different countries.

4 Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)
   
Logical link control is implemented in software.   
Logical link control is specified in the IEEE 802.3 standard.   
The LLC sublayer adds a header and a trailer to the data.   
The data link layer uses LLC to communicate with the upper layers of the protocol suite.   
The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

5 What statement describes a characteristic of MAC addresses?
   
They must be globally unique.   
They are only routable within the private network.   
They are added as part of a Layer 3 PDU.   
They have a 32-bit binary value.

6 Which statement is true about MAC addresses?
   
MAC addresses are implemented by software.   
A NIC only needs a MAC address if connected to a WAN.   
The first three bytes are used by the vendor assigned OUI.   
The ISO is responsible for MAC addresses regulations.

7 Which destination address is used in an ARP request frame?
   
0.0.0.0   
255.255.255.255   
FFFF.FFFF.FFFF   
127.0.0.1   
01-00-5E-00-AA-23

8 What addressing information is recorded by a switch to build its MAC address table?
   
the destination Layer 3 address of incoming packets   
the destination Layer 2 address of outgoing frames   
the source Layer 3 address of outgoing packets   
the source Layer 2 address of incoming frames

9 Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?


The switch will discard the frame.   
The switch will forward the frame only to port 2.   
The switch will forward the frame to all ports except port 4.   
The switch will forward the frame to all ports.   
The switch will forward the frame only to ports 1 and 3.

10 Which switching method uses the CRC value in a frame?
   
cut-through   
fast-forward   
fragment-free   
store-and-forward

11 What is auto-MDIX?
   
a type of Cisco switch   
an Ethernet connector type   
a type of port on a Cisco switch   
a feature that detects Ethernet cable typ​e

12 True or False?
When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway.

true   
false

13 The ARP table in a switch maps which two types of address together?
   
Layer 3 address to a Layer 2 address   
Layer 3 address to a Layer 4 address   
Layer 4 address to a Layer 2 address   
Layer 2 address to a Layer 4 address

14 Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​


PC2 will send an ARP reply with its MAC address.   
RT1 will send an ARP reply with its Fa0/0 MAC address.​   
RT1 will send an ARP reply with the PC2 MAC address.​   
SW1 will send an ARP reply with the PC2 MAC address.​   
SW1 will send an ARP reply with its Fa0/1 MAC address.

15 Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?


Host A sends an ARP request to the MAC address of host D.   
Host D sends an ARP request to host A.   
Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.   
Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

16 Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?



only host D   
only router R1   
only hosts A, B, and C   
only hosts A, B, C, and D   
only hosts B and C   
only hosts B, C, and router R1

17 Which statement describes the treatment of ARP requests on the local link?
   
They must be forwarded by all routers on the local network.   
They are received and processed by every device on the local network.   
They are dropped by all switches on the local network.   
They are received and processed only by the target device.

18 What are two potential network problems that can result from ARP operation? (Choose two.)
   
Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing.   
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays.   
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network.   
Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.

19 Fill in the blank.
A collision fragment, also known as a ---------- frame, is a frame of fewer than 64 bytes in length.​

20 Fill in the blank.
On a Cisco switch, ---------- memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports.​

21 Fill in the blank.
ARP ---------- is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses.

ITN Chapter 4 Exam


Introduction to Networks (Version 5.02) - ITN Chapter 4 Exam 

 

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

application

transport

data link

physical

2. Which statement describes signaling at the physical layer?Sending the signals asynchronously means that they are transmitted without a clock signal.

In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.

Wireless encoding includes sending a series of clicks to delimit the frames.

Signaling is a method of converting a stream of data into a predefined code

3. What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to reduce the number of collisions on the media

to distinguish data bits from control bits

to provide better media error correction

to identify where the frame starts and ends

to increase the media throughput

4. The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?

15 Mb/s

95 Mb/s

55 Mb/s

65 Mb/s

80 Mb/s

5. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI

crosstalk

RFI?

signal attenuation

extended length of cabling

6. How is the magnetic field cancellation effect enhanced in UTP cables?

by increasing the thickness of the PVC sheath that encases all the wires

by increasing and varying the number of twists in each wire pair

by increasing the thickness of the copper wires

by decreasing the number of wires that are used to carry data

7. Refer to the exhibit. What is wrong with the displayed termination?

 

The jack used is an RJ-11 connector instead of an RJ-45 connector.

The cable is not shielded.

The untwisted length of each wire is too long.

The wires are too thick for the connector that is used.

8. Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices??

 

1 – rollover, 2 – crossover, 3 – straight-through

1 – rollover, 2 – straight-through, 3 – crossover

1 – crossover, 2 – straight-through, 3 – rollover

1 – crossover, 2 – rollover, 3 – straight-through

9. Which statement is correct about multimode fiber?

Multimode fiber cables carry signals from multiple connected sending devices.

Multimode fiber commonly uses a laser as a light source.

SC-SC patch cords are used with multimode fiber cables.

Multimode fiber has a thinner core than single-mode fiber..

10. What is one advantage of using fiber optic cabling rather than copper cabling?

It is usually cheaper than copper cabling.

It is able to be installed around sharp bends.

It is easier to terminate and install than copper cabling.

It is able to carry signals much farther than copper cabling.

11. Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading.

They prevent crosstalk from causing interference on the connection.

They increase the speed at which the data can travel.

They allow for full-duplex connectivity.

12. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

mobility options

security

interference

coverage area

extensive cabling

packet collision

13. A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

802.11n

802.11ac

802.11g

802.11b

14. What is one main characteristic of the data link layer?

It generates the electrical or optical signals that represent the 1 and 0 on the media.

It converts a stream of data bits into a predefined code.

It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.

15. As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame??

The transmitting node inserts start and stop bits into the frame.

The transmitting node sends a beacon to notify that a data frame is attached.

The receiving node identifies the beginning of a frame by seeing a physical address.

The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.

16. What is true concerning physical and logical topologies?

The logical topology is always the same as the physical topology.

Physical topologies are concerned with how a network transfers frames.

Physical topologies display the IP addressing scheme of each network.

Logical topologies determine the media access control method used.

17. What are two characteristics of 802.11 wireless networks? (Choose two.)

They use CSMA/CA technology.

They use CSMA/CD technology.

They are collision-free networks.

Stations can transmit at any time.

Collisions can exist in the networks.

18. What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node

to verify the logical address of the sending node

to compute the CRC header for the data field

to determine if errors occurred in the transmission and reception

19. Fill in the blank with a number.

10,000,000,000 b/s can also be written as  __   Gb/s.


20. Fill in the blank.

The term  ____  indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).?


21. Fill in the blank.

 

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?


 

ITN-Chapter 3 Exam

Introduction to Networks (Version 6.0) - ITN Chapter 3 Exam
1 What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
   
encapsulation   
flow control   
access method   
response timeout

2 What type of communication will send a message to all devices on a local area network?
   
broadcast   
multicast   
unicast   
allcast

3 What process is used to place one message inside another message for transfer from the source to the destination?
   
access control   
decoding   
encapsulation   
flow control

4 A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
   
HTTP, IP, TCP, Ethernet   
HTTP, TCP, IP, Ethernet   
Ethernet, TCP, IP, HTTP   
Ethernet, IP, TCP, HTTP

5 Which statement is correct about network protocols?
   
Network protocols define the type of hardware that is used and how it is mounted in racks.   
They define how messages are exchanged between the source and the destination.   
They all function in the network access layer of TCP/IP.   
They are only required for exchange of messages between devices on remote networks.

6  Which statement is true about the TCP/IP and OSI models?​
   
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​   
The TCP/IP network access layer has similar functions to the OSI network layer.​   
The OSI Layer 7 and the TCP/IP application layer provide identical functions.   
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.​

7 What is an advantage of using standards to develop and implement protocols?
   
A particular protocol can only be implemented by one manufacturer.   
Products from different manufacturers can interoperate successfully.   
Different manufacturers are free to apply different requirements when implementing a protocol.   
Standards provide flexibility for manufacturers to create devices that comply with unique requirements.

8 What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
   
ARP   
DHCP   
DNS   
FTP   
NAT   
PPP

9 What are proprietary protocols?
   
protocols developed by private organizations to operate on any vendor hardware   
protocols that can be freely used by any organization or vendor   
protocols developed by organizations who have control over their definition and operation   
a collection of protocols known as the TCP/IP protocol suite

10 What is an advantage of network devices using open standard protocols?
   
Network communications is confined to data transfers between devices from the same vendor.   
A client host and a server running different operating systems can successfully exchange data.   
Internet access can be controlled by a single ISP in each market.   
Competition and innovation are limited to specific types of products.

11 Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?


only application and Internet layers   
only Internet and network access layers   
only application, Internet, and network access layers   
application, transport, Internet, and network access layers   
only application, transport, network, data link, and physical layers   
application, session, transport, network, data link, and physical layers

12 Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
   
application   
presentation   
session   
transport   
data link   
physical   
network

13 At which layer of the OSI model would a logical address be encapsulated?
   
physical layer   
data link layer   
network layer   
transport layer

14 Which PDU format is used when bits are received from the network medium by the NIC of a host?
   
file   
frame   
packet   
segment

15 Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
   
bits   
frame   
packet   
segment

16 Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

 A packet with the destination IP address of RouterB.   
A frame with the destination MAC address of SwitchA.   
A packet with the destination IP address of RouterA.   
A frame with the destination MAC address of RouterA.   
A packet with the destination IP address of ServerB.   
A frame with the destination MAC address of ServerB.

17 Which address does a NIC use when deciding whether to accept a frame?
   
source IP address   
source MAC address   
destination IP address   
destination MAC address   
source Ethernet address

18 What will happen if the default gateway address is incorrectly configured on a host?
   
The host cannot communicate with other hosts in the local network.   
The switch will not forward packets initiated by the host.   
The host will have to use ARP to determine the correct address of the default gateway.   
The host cannot communicate with hosts in other networks.   
A ping from the host to 127.0.0.1 would not be successful. 

19 Which characteristic describes the default gateway of a host computer?
   
the logical address of the router interface on the same network as the host computer   
the physical address of the switch interface connected to the host computer   
the physical address of the router interface on the same network as the host computer   
the logical address assigned to the switch interface connected to the router

20 Match each description to its corresponding term. (Not all options are used.)

21 Match the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)

22 Match the description to the organization. (Not all options are used.)


ITN Chapter 2 Exam


Introduction to Networks (Version 5.02) - ITN Chapter 2 Exam 


1. Which two features are characteristics of flash memory? (Choose two.)

  • Flash provides nonvolatile storage. 
  • Flash receives a copy of the IOS from RAM when a device is powered on.  
  • The contents of flash may be lost during a power cycle.  
  • Flash is a component in Cisco switches but not in Cisco routers.  
  • The contents of flash may be overwritten.
2. A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)
  • Are the devices on the same LAN?
  • Do the devices have enough NVRAM to store the IOS image?
  • What models of routers and switches require upgrades?
  • What ports are installed on the routers and switches?
  • Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? 
  •  What features are required for the devices?
3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
  • Use Telnet to remotely access the switch through the network.
  • Use the console port to locally access the switch from a serial or USB interface of the PC.
  • Use Secure Shell to remotely access the switch through the network​.
  • Use the AUX port to locally access the switch from a serial or USB interface of the PC.
4. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
  • Telnet
  • Console
  • AUX
  • SSH
5. A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
  • global configuration mode
  • setup mode
  • ROM monitor mode 
  • user EXEC mode
6. Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
·  providing an error message when a wrong command is submitted     
·  displaying a list of all available commands within the current mode
·  allowing the user to complete the remainder of an abbreviate command with the TAB key 
·  determining which option, keyword, or argument is available for the entered command    
·  selecting the best command to accomplish a task
7. Why is it important to configure a hostname on a device?
·  a Cisco router or switch only begins to operate when its hostname is set 
·  a hostname must be configured before any other parameters
·  to identify the device during remote access (SSH or telnet)
·  to allow local access to the device through the console port
8. Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
·   numbers 
·   question mark  
·  space
·  tab
·  dash
9. What is a result of using the service password-encryption command on a Cisco network device?
·  The command encrypts the banner message. 
·  The command encrypts the enable mode password.
·  All passwords in the configuration are not shown in clear text when viewing the configuration.
·  A network administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device.
10. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
·  Reboot the device.  Enter CTRL-Z at the privileged mode prompt.  
·  Exit global configuration mode.
·  Power cycle the device.
·  Exit privileged EXEC mode and press Enter.
11. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
·  VTY interface   console interface Ethernet interface
·  boot IOS mode
·  privileged EXEC mode
·  router configuration mode
12. While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
·  Issue the reload command without saving the running configuration.   
·  Delete the vlan.dat file and reboot the device.  
·  Close and reopen the terminal emulation software.
·  Issue the copy startup-config running-config command.
13. Which statement is true about the running configuration file in a Cisco IOS device?
·  It affects the operation of the device immediately when modified. 
·   It is stored in NVRAM. 
·   It should be deleted using the erase running-config command.
·  It is automatically saved when the router reboots.
14. Which interface allows remote management of a Layer 2 switch?
·  the AUX interface  
·  the console port interface
·  the switch virtual interface
·  the first Ethernet port interface

15. Why would a Layer 2 switch need an IP address?
  • to enable the switch to send broadcast frames to attached PCs
  • to enable the switch to function as a default gateway
  • to enable the switch to be managed remotely
  • to enable the switch to receive frames from attached PCs
16. What benefit does DHCP provide to a network?
·  Hosts always have the same IP address and are therefore always reachable.
·  DHCP allows users to refer to locations by a name rather than an IP address.
·  Hosts can connect to the network and get an IP address without manual configuration.
·  Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments.
17. What command can be used on a Windows PC to see the IP configuration of that computer?
·  ping
·  ipconfig
·  show interfaces
·  show ip interface brief
18. What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
·  Each IP address must match the address that is assigned to the host by DNS.
·  Each IP address must be unique within the local network.
·  Each IP address needs to be compatible with the MAC address.
·  Each local host should be assigned an IP address with a unique network component.
19. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?

  • The VLAN IP address and the default gateway IP address are not in the same network.
  • The local DNS server is not functioning correctly.
  • The no shutdown command was not issued for VLAN 1.
  • The ip default-gateway command has to be issued in the VLAN interface configuration mode.
  • The default gateway address must be 192.168.10.1.
20. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
  • if the TCP/IP stack is functioning on the PC without putting traffic on the wire
  • if there is connectivity with the destination device
  • the path that traffic will take to reach the destination
  • what type of device is at the destination

21. Match the description to the common IOS CLI access method. (Not all options are used.)


22. Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

Materi Subnetting