YOU WERE LOOKING FOR: Ccna 2 Chapter 1 Exam Answers
The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN? Choose two. A converged network is one that uses the same infrastructure...
What route would have the lowest administrative distance? Which two statements correctly describe the concepts of administrative distance and metric? Choose two. Administrative distance AD is used when a router has two or more routes to a remote...
A route created with the ip route command is a static route, not a dynamic route. What are two common types of static routes in routing tables? A static route configured on a router can be distributed by the router to other neighboring routers. However, the distributed static route will be a little different in the routing table on neighboring routers. What is the effect of configuring the ipv6 unicast-routing command on a router? Use of this command also assigns the router to the all-routers multicast group. Refer to the exhibit. Match the description with the routing table entries. Not all options are used. Graphic contains output of show ip route as follows: R3 show ip route
What route would have the lowest administrative distance? Which two statements correctly describe the concepts of administrative distance and metric? Choose two. Administrative distance AD is used when a router has two or more routes to a remote destination that were learned from different sources. The source with the lowest AD is installed in the routing table. Consider the following routing table entry for R1: D It is the interface on R1 used to send data that is destined for It is the interface on the final destination router that is directly connected to the It is the interface on the next-hop router when the destination IP address is on the A network administrator issues the show ipv6 route command on R1.
What two conclusions can be drawn from the routing table? It does not know any routes to remote networks. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? No packets with a destination network of The subnet mask is incorrect for the IPv4 address. A directly connected network will be added to the routing table when these three conditions are met: 1 the interface is configured with a valid IP address; 2 it is activated with no shutdown command; and 3 it receives a carrier signal from another device that is connected to the interface. An incorrect subnet mask for an IPv4 address will not prevent its appearance in the routing table, although the error may prevent successful communications.
A network administrator configures a router by the command ip route 0. What is the purpose of this command? When the router receives a packet and does not have a specific route toward the destination, it forwards the packet to the next hop indicated in the default route. A route created with the ip route command is a static route, not a dynamic route. What are two common types of static routes in routing tables? A static route configured on a router can be distributed by the router to other neighboring routers. However, the distributed static route will be a little different in the routing table on neighboring routers. What is the effect of configuring the ipv6 unicast-routing command on a router? Use of this command also assigns the router to the all-routers multicast group.
Refer to the exhibit. Match the description with the routing table entries. Not all options are used. Graphic contains output of show ip route as follows: R3 show ip route
Refer to the exhibit. Consider that the main power has just been restored. To which port will SW1 forward this request? What information is added to the switch table from incoming frames? What is one function of a Layer 2 switch? SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch. SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch. SW1 drops the frame because it does not know the destination MAC address.
What does the term port density represent for an Ethernet switch? ABC, Inc. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?
Which two statements correctly describe the concepts of administrative distance and metric? Choose two. Administrative distance refers to the trustworthiness of a particular route. A router first installs routes with higher administrative distances. The value of the administrative distance cannot be altered by the network administrator. Routes with the smallest metric to a destination indicate the best path. The metric is always determined based on hop count. The metric varies depending on which Layer 3 protocol is being routed. Explanation: A metric is calculated by a routing protocol and is used to determine the best path smallest metric value to a remote network. Administrative distance AD is used when a router has two or more routes to a remote destination that were learned from different sources. The source with the lowest AD is installed in the routing table.
Consider the following routing table entry for R1: D It is the interface on R1 used to send data that is destined for It is the interface on the final destination router that is directly connected to the It is the interface on the next-hop router when the destination IP address is on the Refer to the exhibit.
A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? CCNA2 v6. It does not know any routes to remote networks. However, when the administrator issues the command show ip route, the routing table does not show the directly connected network. What is the possible cause of the problem? The configuration needs to be saved first. No packets with a destination network of The subnet mask is incorrect for the IPv4 address. Explanation: A directly connected network will be added to the routing table when these three conditions are met: 1 the interface is configured with a valid IP address; 2 it is activated with no shutdown command; and 3 it receives a carrier signal from another device that is connected to the interface.
An incorrect subnet mask for an IPv4 address will not prevent its appearance in the routing table, although the error may prevent successful communications. A network administrator configures a router by the command ip route 0. What is the purpose of this command? When the router receives a packet and does not have a specific route toward the destination, it forwards the packet to the next hop indicated in the default route. A route created with the ip route command is a static route, not a dynamic route. What are two common types of static routes in routing tables? Choose two a default static route a built-in static route by IOS a static route to a specific network a static route shared between two neighboring routers a static route converted from a route that is learned through a dynamic routing protocol Explanation: There are two common types of static routes in a routing table, namely, a static route to a specific network and a default static route.
A static route configured on a router can be distributed by the router to other neighboring routers. However, the distributed static route will be a little different in the routing table on neighboring routers. What is the effect of configuring the ipv6 unicast-routing command on a router? Use of this command also assigns the router to the all-routers multicast group.
Which two statements are true regarding switch port security? Choose two. The three configurable violation modes all require user intervention to re-enable ports. The three configurable violation modes all log violations via SNMP. Dynamically learned secure MAC addresses are lost when the switch reboots. The address of the default gateway for this LAN is Users on the The switch is able to forward frames to remote networks. The IP phone and PC work properly. No one is allowed to disconnect the IP phone or the PC and connect some other wired device. The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.
A notification is sent. The interface will go into error-disabled state. A syslog message is logged. Packets with unknown source addresses will be dropped. The interface might be configured as half-duplex. The bandwidth parameter on the interface might be too high. There could be too much electrical interference and noise on the link. There could be an issue with a faulty NIC. Full-duplex communication improves the performance of a switched LAN, increasing effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously.
What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? Which two features of the hierarchical design make it the better choice? Choose two. Consider that the main power has just been restored. To which port will SW1 forward this request? Fill in the blank. There are » 12 » collision domains in the topology. SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch. SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch. SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.
The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?
A new junior network intern connects a laptop to an access layer switch in the wiring closet. What could have been done to better protect the switch? Create a banner message. Use the enable secret command. Use the service password-encryption command. Explanation: Configuring the console line with a password requires the password to be entered before the switch prompt can be accessed.
A banner is only a warning message. The enable secret command encrypts the enable password. The service password-encryption command protects all passwords from being seen when the show running-configuration command is used. Why are routers needed in networking? Each interface on a router belongs to a different network. LAN devices can be connected through switches. Packet delivery, packet delivery status, and acknowledgments are functions of the transport layer. Refer to the exhibit.
What is the purpose of the router port that is shown? The pale blue background behind the icon is also the standard color that is used on Cisco devices to indicate a console connection. What is a gateway of last resort? A gateway of last resort, as seen in a Cisco routing table, is simply the IP address that is used to route packets addressed to networks not explicitly listed in the routing table. A Windows-based computer uses the term default gateway, not gateway of last resort. When a router learns that multiple paths are available to a destination network from the same routing protocol, which factor is considered by a router to choose the best path to forward a packet? What address and prefix length is used when configuring an IPv6 default static route?
Installing antivirus software, antimalware software, and implementing a firewall will usually be the minimum requirements for home networks. Installing a home wireless network will not improve network security, and will require further security actions to be taken. Fill in the blank. A converged network is capable of delivering voice, video, text, and graphics over the same communication channels. Explain: When one network is used for all types of communication such as voice, video, text, and graphics, the network is referred to as a converged network.
The acronym byod refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources. What are two functions of intermediary devices on a network? Choose two. They are the primary source and providers of information and services to end devices. They run applications that support collaboration for business. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. Match the description to the form of network communication. Not all options are used. Match each characteristic to its corresponding internet conectivity type.
Cable uses the same coaxial cable that carries television signals into the home to provide Internet access. Dialup telephone is much slower than either DSL or cable, but is the least expensive option for home users because it can use any telephone line and a simple modem. Satellite requires a clear line of sight and is affected by trees and other obstructions. What is the Internet? It is a network based on Ethernet technology. It provides network access for mobile devices. It provides connections through interconnected global networks. Match the definition to the security goal. A field calculated by the sender is recalculated and verified to be the same by the receiver. Passwords and authorization maintain control over who has access to personal data. Redundant devices and links attempt to provide Integrity is made possible by requiring validation of the sender, not the destination. VPNs are not the only secure method by which data can be transferred confidentially. What type of network must a home user access in order to do online shopping?
Which two statements correctly describe the concepts of administrative distance and metric? Ccna 2 chapter 1 exam answers two. Administrative distance refers to the trustworthiness of a particular route. A router first installs routes with higher administrative distances. The value of the administrative distance cannot be altered by the network administrator. Routes with the smallest metric to a destination indicate the best path. The metric is always determined based on hop count. The metric varies depending on which Layer 3 protocol is being routed. Explanation: A metric is calculated by a routing protocol and is used to determine the best path smallest metric value to a remote network.
No comments:
Post a Comment